Total CVEs

126,094

Critical Severity

2,287

High Severity

7,907

Last 7 Days

1,156
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 341 - 360 of 897 CVEs

HCL Aftermarket DPC is affected by Use of Vulnerable/Outdated Versions vulnerability using which an attacker may make use of the exploits available across the internet and craft attacks against the application.

Vendor: HCL
Product: Aftermarket DPC
Published: Mar 26, 2026
Source: NVD

HCL Aftermarket DPC is affected by Internal IP Disclosure vulnerability will give attackers a clearer map of the organization’s network layout.

Vendor: HCL
Product: Aftermarket DPC
Published: Mar 26, 2026
Source: NVD

HCL Aftermarket DPC is affected by Admin Session Concurrency vulnerability using which an attacker can exploit concurrent sessions to hijack or impersonate an admin user.

Vendor: HCL
Product: Aftermarket DPC
Published: Mar 26, 2026
Source: NVD

HCL Aftermarket DPC is affected by Cross-Origin Resource Sharing vulnerability. CORS misconfigurations includes the exposure of sensitive user information to attackers, unauthorized access to APIs, and possible data manipulation or leakage. If an attacker to exploit CORS misconfiguration, they could...

Vendor: HCL
Product: Aftermarket DPC
Published: Mar 26, 2026
Source: NVD

HCL Aftermarket DPC is affected by Banner Disclosure vulnerability where attackers gain insights into the system’s software and version details which would allow them to craft software specific attacks.

Vendor: HCL
Product: Aftermarket DPC
Published: Mar 26, 2026
Source: NVD

HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability where in depending on how the web application handles the split response, an attacker may be able to execute arbitrary commands or inject harmful content into the response..

Vendor: HCL
Product: Aftermarket DPC
Published: Mar 26, 2026
Source: NVD

HCL Aftermarket DPC is affected by Improper Input Validation which allows an attacker to inject executable code and can carry out attacks such as XSS, SQL Injection, Command Injection etc.

Vendor: HCL
Product: Aftermarket DPC
Published: Mar 26, 2026
Source: NVD
CVE-2026-4874 LOW - 3.1

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session...

Vendor: redhat
Product: build_of_keycloak
Published: Mar 26, 2026
Source: NVD
CVE-2026-4835 LOW - 3.5

A security vulnerability has been detected in code-projects Accounting System 1.0. Impacted is an unknown function of the file /my_account/add_costumer.php of the component Web Application Interface. Such manipulation of the argument costumer_name leads to cross site scripting. The attack may be per...

Published: Mar 26, 2026
Source: NVD
CVE-2026-4833 LOW - 3.3

A weakness has been identified in Orc discount up to 3.0.1.2. This issue affects the function compile of the file markdown.c of the component Markdown Handler. This manipulation causes uncontrolled recursion. The attack is restricted to local execution. The exploit has been made available to the pub...

Published: Mar 26, 2026
Source: NVD
CVE-2026-4831 LOW - 3.7

A security flaw has been discovered in kalcaddle kodbox 1.64. Impacted is the function can of the file /workspace/source-code/app/controller/explorer/auth.class.php of the component Password-protected Share Handler. Performing a manipulation results in improper authentication. The attack is possible...

Published: Mar 26, 2026
Source: NVD
CVE-2026-4823 LOW - 2.5

A flaw has been found in Enter Software Iperius Backup up to 8.7.3. Affected by this vulnerability is an unknown functionality of the component NTLM2 Handler. Executing a manipulation can lead to information disclosure. The attack is restricted to local execution. Attacks of this nature are highly c...

Published: Mar 25, 2026
Source: NVD

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques.

Vendor: IBM
Product: InfoSphere Information Server
Published: Mar 25, 2026
Source: NVD

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 Active Storage's proxy controller does not limit the number of byte ranges in an HTTP Range header. A request with thousands of small ranges causes disproportionate...

Vendor: rubygems
Product: activestorage
Published: Mar 25, 2026
Source: GitHub

Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. Prior to version 3.3.2, an authenticated path traversal vulnerability in the configuration import endpoint allows an authenticated user to write arbitrary files outside the config directory, which can lead to RCE by creating a plugi...

Vendor: go
Product: github.com/tobychui/zoraxy
Published: Mar 25, 2026
Source: GitHub

PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5 and 9.1.0 improperly use the validation framework. Versions 8.2.5 and 9.1.0 contain a fix. No known workarounds are available.

Vendor: composer
Product: prestashop/prestashop
Published: Mar 25, 2026
Source: GitHub
CVE-2026-4363 LOW - 3.7

GitLab has remediated an issue in GitLab EE affecting all versions from 18.1 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that under certain conditions could have allowed an authenticated user to gain unauthorized access to resources due to improper caching of authorization decisions.

Vendor: gitlab
Product: gitlab
Published: Mar 25, 2026
Source: NVD

A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Tahoe 26.4. A document may be written to a temporary file when using print preview.

Vendor: Apple
Product: macOS
Published: Mar 25, 2026
Source: NVD

This issue was addressed with improved permissions checking. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. A local attacker may gain access to user's Keychain items.

Vendor: Apple
Product: iOS and iPadOS, macOS, visionOS, watchOS
Published: Mar 25, 2026
Source: NVD

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26.4. An app may bypass Gatekeeper checks.

Vendor: Apple
Product: macOS
Published: Mar 25, 2026
Source: NVD