| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. |
| Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code. |
| The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used. |
| Apache Doris MCP Server versions earlier than 0.6.1 are affected by an improper neutralization flaw in query context handling that may allow execution of unintended SQL statements and bypass of intended query validation and access restrictions through the MCP query execution interface. Version 0.6.1 and later are not affected. |
| REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API provisional and unused. Secondly it has been discovered that the NIS+ cold start cache (/var/nis/NIS_COLD_START) cannot be bypassed and as such the API can only be called with a trusted server from the pre-populated cache. The use of a trusted server means no trust boundary is crossed and this is therefore considered a normal bug. |
| The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a "Detour" attack. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |
| This CVE has the been REJECTED and will not be published by the CNA. |