Search

Search Results (346123 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2017-11357 1 Progress 1 Telerik Ui For Asp.net Ajax 2026-04-22 9.8 Critical
Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
CVE-2026-33750 1 Juliangruber 1 Brace-expansion 2026-04-22 6.5 Medium
The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used.
CVE-2025-66335 1 Apache 1 Doris Mcp Server 2026-04-22 5.3 Medium
Apache Doris MCP Server versions earlier than 0.6.1 are affected by an improper neutralization flaw in query context handling that may allow execution of unintended SQL statements and bypass of intended query validation and access restrictions through the MCP query execution interface. Version 0.6.1 and later are not affected.
CVE-2026-5358 1 The Gnu C Library 1 Glibc 2026-04-22 8.2 High
REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API provisional and unused. Secondly it has been discovered that the NIS+ cold start cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API can only be called with a trusted server from the pre-populated cache. The use of a trusted server means no trust boundary is crossed and this is therefore considered a normal bug.
CVE-2026-39808 1 Fortinet 3 Fortisandbox, Fortisandbox Paas, Fortisandboxpaas 2026-04-22 9.1 Critical
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>
CVE-2026-35587 1 Nicolargo 1 Glances 2026-04-22 N/A
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, a Server-Side Request Forgery (SSRF) vulnerability exists in the Glances IP plugin due to improper validation of the public_api configuration parameter. The value of public_api is used directly in outbound HTTP requests without any scheme restriction or hostname/IP validation. An attacker who can modify the Glances configuration can force the application to send requests to arbitrary internal or external endpoints. Additionally, when public_username and public_password are set, Glances automatically includes these credentials in the Authorization: Basic header, resulting in credential leakage to attacker-controlled servers. This vulnerability can be exploited to access internal network services, retrieve sensitive data from cloud metadata endpoints, and/or exfiltrate credentials via outbound HTTP requests. The issue arises because public_api is passed directly to the HTTP client (urlopen_auth) without validation, allowing unrestricted outbound connections and unintended disclosure of sensitive information. Version 4.5.4 contains a patch.
CVE-2026-31527 1 Linux 1 Linux Kernel 2026-04-22 N/A
In the Linux kernel, the following vulnerability has been resolved: driver core: platform: use generic driver_override infrastructure When a driver is probed through __driver_attach(), the bus' match() callback is called without the device lock held, thus accessing the driver_override field without a lock, which can cause a UAF. Fix this by using the driver-core driver_override infrastructure taking care of proper locking internally. Note that calling match() from __driver_attach() without the device lock held is intentional. [1]
CVE-2026-31493 1 Linux 1 Linux Kernel 2026-04-22 N/A
In the Linux kernel, the following vulnerability has been resolved: RDMA/efa: Fix use of completion ctx after free On admin queue completion handling, if the admin command completed with error we print data from the completion context. The issue is that we already freed the completion context in polling/interrupts handler which means we print data from context in an unknown state (it might be already used again). Change the admin submission flow so alloc/dealloc of the context will be symmetric and dealloc will be called after any potential use of the context.
CVE-2010-5326 1 Sap 1 Netweaver Application Server Java 2026-04-22 10 Critical
The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a "Detour" attack.
CVE-2014-125120 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2013-10056 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2013-10045 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2013-10041 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2011-10031 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2010-20124 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2010-20118 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2010-20117 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2010-20116 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2010-20110 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.
CVE-2009-20012 2026-04-22 N/A
This CVE has the been REJECTED and will not be published by the CNA.