Export limit exceeded: 344763 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (344763 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-0385 1 Microsoft 3 Edge, Edge Chromium, Edge For Android 2026-04-14 5 Medium
Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
CVE-2026-33551 1 Openstack 1 Keystone 2026-04-14 3.5 Low
An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with only a reader role may obtain an EC2/S3 credential that carries the full set of the parent user's S3 permissions, effectively bypassing the role restrictions imposed on the application credential. Only deployments that use restricted application credentials in combination with the EC2/S3 compatibility API (swift3 / s3api) are affected.
CVE-2026-26133 1 Microsoft 35 365 Copilot, 365 Copilot Android, 365 Copilot For Android and 32 more 2026-04-14 7.1 High
AI command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
CVE-2026-23780 1 Bmc 1 Control-m 2026-04-14 8.8 High
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A SQL injection vulnerability in the MFT API's debug interface allows an authenticated attacker to inject malicious queries due to improper input validation and unsafe dynamic SQL handling. Successful exploitation can enable arbitrary file read/write operations and potentially lead to remote code execution.
CVE-2026-26144 1 Microsoft 1 365 Apps 2026-04-14 7.5 High
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.
CVE-2026-23782 1 Bmc 1 Control-m 2026-04-14 7.5 High
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API management endpoint allows unauthenticated users to obtain both an API identifier and its corresponding secret value. With these exposed secrets, an attacker could invoke privileged API operations, potentially leading to unauthorized access.
CVE-2026-26141 1 Microsoft 1 Azure Automation Hybrid Worker Windows Extension 2026-04-14 7.8 High
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.
CVE-2026-26130 2 Microsoft, Redhat 2 Asp.net Core, Enterprise Linux 2026-04-14 7.5 High
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.
CVE-2026-26123 1 Microsoft 3 Authenticator, Authenticator For Android, Authenticator For Ios 2026-04-14 5.5 Medium
Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized attacker to disclose information locally.
CVE-2026-26118 1 Microsoft 4 Azure Mcp Server, Azure Mcp Server Tools, Azure Mcp Server Tools 1 and 1 more 2026-04-14 8.8 High
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-26117 1 Microsoft 1 Arc Enabled Servers Azure Connected Machine Agent 2026-04-14 7.8 High
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2026-29861 1 Keerti1924 1 Php-mysql-user-login-system 2026-04-14 9.8 Critical
PHP-MYSQL-User-Login-System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter at login.php.
CVE-2026-26110 1 Microsoft 9 365 Apps, Office, Office 2016 and 6 more 2026-04-14 8.4 High
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-40200 1 Musl-libc 1 Musl 2026-04-14 8.1 High
An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).
CVE-2026-26109 1 Microsoft 13 365 Apps, Excel, Excel 2016 and 10 more 2026-04-14 8.4 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-26108 1 Microsoft 11 365 Apps, Excel, Excel 2016 and 8 more 2026-04-14 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-14545 2 Icopydoc, Wordpress 2 Yml For Yandex Market, Wordpress 2026-04-14 6.5 Medium
The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote Code Execution via the feed generation process.
CVE-2026-26107 1 Microsoft 11 365 Apps, Excel, Excel 2016 and 8 more 2026-04-14 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-4432 2 Wordpress, Yithemes 2 Wordpress, Yith Woocommerce Wishlist 2026-04-14 6.5 Medium
The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.
CVE-2026-26106 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-04-14 8.8 High
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.