Search
Search Results (340546 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2026-32910 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32909 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32908 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32907 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32904 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32903 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32902 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32901 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32900 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32066 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32047 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-32012 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-28483 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-28455 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2026-22173 | 2026-03-23 | N/A | ||
| This CVE ID has been rejected. | ||||
| CVE-2025-52454 | 4 Linux, Microsoft, Salesforce and 1 more | 4 Linux Kernel, Windows, Tableau Server and 1 more | 2026-03-23 | 8.2 High |
| Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (Amazon S3 Connector modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19. | ||||
| CVE-2025-51602 | 1 Videolan | 1 Vlc Media Player | 2026-03-23 | 4.8 Medium |
| mmstu.c in VideoLAN VLC media player before 3.0.22 allows an out-of-bounds read and denial of service via a crafted 0x01 response from an MMS server. | ||||
| CVE-2026-2443 | 3 Gnome, Red Hat, Redhat | 3 Libsoup, Enterprise Linux, Enterprise Linux | 2026-03-23 | 5.3 Medium |
| A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component. | ||||
| CVE-2026-32004 | 1 Openclaw | 1 Openclaw | 2026-03-23 | 6.5 Medium |
| OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass plugin route authentication checks by submitting deeply encoded slash variants such as multi-encoded %2f to access protected /api/channels endpoints. | ||||
| CVE-2026-32014 | 1 Openclaw | 1 Openclaw | 2026-03-23 | 8 High |
| OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadata to bypass platform-based node command policies and gain access to restricted commands. | ||||