Export limit exceeded: 345217 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 345217 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (345217 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-32766 1 Astral 2 Astral-tokio-tar, Tokio-tar 2026-04-17 5.3 Medium
astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.6 and earlier, malformed PAX extensions were silently skipped when parsing tar archives. This silent skipping (rather than rejection) of invalid PAX extensions could be used as a building block for a parser differential, for example by silently skipping a malformed GNU “long link” extension so that a subsequent parser would misinterpret the extension. In practice, exploiting this behavior in astral-tokio-tar requires a secondary misbehaving tar parser, i.e. one that insufficiently validates malformed PAX extensions and interprets them rather than skipping or erroring on them. This vulnerability is considered low-severity as it requires a separate vulnerability against any unrelated tar parser. This issue has been fixed in version 0.6.0.
CVE-2026-33060 1 Ondata 2 Ckan-mcp-server, Ckan Mcp Server 2026-04-17 5.3 Medium
CKAN MCP Server is a tool for querying CKAN open data portals. Versions prior to 0.4.85 provide tools including ckan_package_search and sparql_query that accept a base_url parameter, making HTTP requests to arbitrary endpoints without restriction. A CKAN portal client has no legitimate reason to contact cloud metadata or internal network services. There is no URL validation on base_url parameter. No private IP blocking (RFC 1918, link-local 169.254.x.x), no cloud metadata blocking. The sparql_query and ckan_datastore_search_sql tools also accept arbitrary base URLs and expose injection surfaces. An attack can lead to internal network scanning, cloud metadata theft (IAM credentials via IMDS at 169.254.169.254), potential SQL/SPARQL injection via unsanitized query parameters. Attack requires prompt injection to control the base_url parameter. This issue has been fixed in version 0.4.85.
CVE-2025-65734 2 Gunet, Openeclass 2 Open Eclass, Openeclass 2026-04-17 5.4 Medium
An authenticated arbitrary file upload vulnerability in the Courses/Work Assignments module of gunet Open eClass v3.11, and fixed in v3.13, allows attackers to execute arbitrary code via uploading a crafted SVG file.
CVE-2026-23681 2 Sap, Sap Se 2 Solution Tools Plug-in, Sap Support Tools Plug-in 2026-04-17 4.3 Medium
Due to missing authorization check in a function module in SAP Support Tools Plug-In, an authenticated attacker could invoke specific function modules to retrieve information about the system and its configuration. This disclosure of the system information could assist the attacker to plan subsequent attacks. This vulnerability has a low impact on the confidentiality of the application, with no effect on its integrity or availability.
CVE-2026-2260 2 D-link, Dlink 3 Dcs-931l, Dcs-931l, Dcs-931l Firmware 2026-04-17 7.2 High
A vulnerability was found in D-Link DCS-931L up to 1.13.0. This affects an unknown part of the file /goform/setSysAdmin. The manipulation of the argument AdminID results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2026-23684 1 Sap 1 Commerce Cloud 2026-04-17 5.9 Medium
A race condition vulnerability exists in the SAP Commerce cloud. Because of this when an attacker adds products to a cart, it may result in a cart entry being created with erroneous product value which could be checked out. This leads to high impact on data integrity, with no impact on data confidentiality or availability of the application.
CVE-2026-23686 1 Sap 2 Netweaver Application Server Java, Sap Netweaver Application Server Java 2026-04-17 3.4 Low
Due to a CRLF Injection vulnerability in SAP NetWeaver Application Server Java, an authenticated attacker with administrative access could submit specially crafted content to the application. If processed by the application, this content enables injection of untrusted entries into generated configuration, allowing manipulation of application-controlled settings. Successful exploitation leads to a low impact on integrity, while confidentiality and availability remain unaffected.
CVE-2026-23688 2 Sap, Sap Se 2 S4core, Sap Fiori App (manage Service Entry Sheets - Lean Services) 2026-04-17 4.3 Medium
SAP Fiori App Manage Service Entry Sheets does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has low impact on integrity, confidentiality and availability are not impacted.
CVE-2026-24312 1 Sap 2 Business Workflow, Sap Basis 2026-04-17 5.2 Medium
An erroneous authorization check in SAP Business Workflow leads to privilege escalation. An authenticated administrative user can bypass role restrictions by leveraging permissions from a less sensitive function to execute unauthorized, high-privilege actions. This has a high impact on data integrity, with low impact on confidentiality and no impact on availability of the application.
CVE-2026-24319 2 Sap, Sap Se 2 Business One, Sap Business One (b1 Client Memory Dump Files) 2026-04-17 5.8 Medium
In SAP Business One, sensitive information is written to the application�s memory dump files without obfuscation. Gaining access to this information could potentially lead to unauthorized operations within the B1 environment, including modification of company data. This issue results in a high impact on confidentiality and integrity, with no impact on availability.
CVE-2026-24320 2 Sap, Sap Se 4 Netweaver As Abap Kernel, Netweaver As Abap Krnl64nuc, Netweaver As Abap Krnl64uc and 1 more 2026-04-17 3.1 Low
Due to improper memory management in SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker could exploit logical errors in memory management by supplying specially crafted input containing unique characters, which are improperly converted. This may result in memory corruption and the potential leakage of memory content. Successful exploitation of this vulnerability would have a low impact on the confidentiality of the application, with no effect on its integrity or availability.
CVE-2026-24322 2 Sap, Sap Se 2 Solution Tools Plug-in, Sap Solution Tools Plug-in (st-pi) 2026-04-17 7.7 High
SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality and does not affect integrity or availability.
CVE-2026-24323 2 Sap, Sap Se 4 Document Management System, Erp, S4core and 1 more 2026-04-17 6.1 Medium
The BSP applications allow an unauthenticated user to inject malicious script content via user-controlled URL parameters that are not sufficiently sanitized. When a victim accesses a crafted URL, the injected script is executed in the victim�s browser, leading to a low impact on confidentiality and integrity, and no impact on the availability of the application.
CVE-2026-24324 2 Sap, Sap Se 2 Businessobjects Business Intelligence Platform, Sap Business Objects Business Intelligence Platform 2026-04-17 6.5 Medium
SAP BusinessObjects Business Intelligence Platform (AdminTools) allows an authenticated attacker with user privileges to execute a specific query in AdminTools that could cause the Content Management Server (CMS) to crash, rendering the CMS partially or completely unavailable and resulting in the denial of service of the Content Management Server (CMS). Successful exploitation impacts system availability, while confidentiality and integrity remain unaffected.
CVE-2026-24325 2 Sap, Sap Se 2 Businessobjects Enterprise, Sap Businessobjects Enterprise (central Management Console) 2026-04-17 4.8 Medium
SAP BusinessObjects Enterprise does not sufficiently encode user-controlled inputs, leading to Stored Cross-Site Scripting (XSS) vulnerability. This enables an admin user to inject malicious JavaScript into a website and the injected script gets executed when the user visits the compromised page.This vulnerability has low impact on confidentiality and integrity of the data. There is no impact on the availability of the application.
CVE-2026-24326 2 Sap, Sap Se 2 S\/4hana Defense \& Security, Sap S/4hana Defense & Security (disconnected Operations) 2026-04-17 4.3 Medium
Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.
CVE-2026-24327 2 Sap, Sap Se 2 Strategic Enterprise Management, Sap Strategic Enterprise Management (balanced Scorecard In Bsp Application) 2026-04-17 4.3 Medium
Due to missing authorization check in SAP Strategic Enterprise Management (Balanced Scorecard in Business Server Pages), an authenticated attacker could access information that they are otherwise unauthorized to view. This leads to low impact on confidentiality and no effect on integrity or availability.
CVE-2026-24328 2 Sap, Sap Se 2 Business Server Pages, Business Server Pages Application (taf Applauncher) 2026-04-17 6.1 Medium
SAP TAF_APPLAUNCHER within Business Server Pages allows unauthenticated attacker to craft malicious links that, when clicked by a victim, redirect them to attacker?controlled sites, potentially exposing or altering sensitive information in the victim�s browser. This results in a low impact on confidentiality and integrity, with no impact on the availability of the application.
CVE-2026-2093 1 Flowring 1 Docpedia 2026-04-17 7.5 High
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
CVE-2026-2094 1 Flowring 1 Docpedia 2026-04-17 8.8 High
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.