Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.8

    MEDIUM
    CVE-2016-5013

    In Moodle 2.x and 3.x, text injection can occur in email headers, potentially leading to outbound spam.... Read more

    Affected Products : moodle
    • Published: Jan. 20, 2017
    • Modified: Apr. 20, 2025
  • 5.8

    MEDIUM
    CVE-2016-5014

    In Moodle 2.x and 3.x, an unenrolled user still receives event monitor notifications even though they can no longer access the course.... Read more

    Affected Products : moodle
    • Published: Jan. 20, 2017
    • Modified: Apr. 20, 2025
  • 5.8

    MEDIUM
    CVE-2016-3715

    The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.... Read more

    • Actively Exploited
    • Published: May. 05, 2016
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2016-3467

    Unspecified vulnerability in the Application Express component in Oracle Database Server before 5.0.4 allows remote attackers to affect availability via unknown vectors.... Read more

    Affected Products : application_express
    • Published: Jul. 21, 2016
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2016-2809

    The Mozilla Maintenance Service updater in Mozilla Firefox before 46.0 on Windows allows user-assisted remote attackers to delete arbitrary files by leveraging certain local file execution.... Read more

    Affected Products : firefox windows
    • Published: Apr. 30, 2016
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2023-20246

    Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occu... Read more

    • Published: Nov. 01, 2023
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2021-20220

    A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attack... Read more

    • Published: Feb. 23, 2021
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2024-38490

    Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.... Read more

    Affected Products : emc_idrac_service_module
    • Published: Aug. 01, 2024
    • Modified: Aug. 02, 2024
  • 5.8

    MEDIUM
    CVE-2020-2966

    Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attac... Read more

    Affected Products : weblogic_server
    • Published: Jul. 15, 2020
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2020-2706

    Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Project Manager). Supported versions that are affected are 16.2.0.0 - 16.2.19.3, 17.12.0.0 - 17.12.17.0, 18.8.0.0 - 18.8.1... Read more

    • Published: Apr. 15, 2020
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2019-15988

    A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due t... Read more

    • Published: Nov. 26, 2019
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2015-8140

    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.... Read more

    Affected Products : ntp
    • Published: Jan. 30, 2017
    • Modified: Apr. 20, 2025
  • 5.8

    MEDIUM
    CVE-2021-0225

    An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An administra... Read more

    Affected Products : junos_os_evolved
    • Published: Apr. 22, 2021
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2021-0205

    When the "Intrusion Detection Service" (IDS) feature is configured on Juniper Networks MX series with a dynamic firewall filter using IPv6 source or destination prefix, it may incorrectly match the prefix as /32, causing the filter to block unexpected tra... Read more

    Affected Products : junos mx10 mx104 mx2010 mx2020 mx240 mx40 mx480 mx80 mx960 +6 more products
    • Published: Jan. 15, 2021
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2015-2783

    ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value ... Read more

    • Published: Jun. 09, 2015
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2015-1638

    Microsoft Active Directory Federation Services (AD FS) 3.0 on Windows Server 2012 R2 does not properly handle logoff actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation, aka "Active Directo... Read more

    Affected Products : windows_server_2012
    • Published: Apr. 14, 2015
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2015-0480

    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.... Read more

    Affected Products : jdk jre
    • Published: Apr. 16, 2015
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2014-6316

    core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php.... Read more

    Affected Products : mantisbt
    • Published: Dec. 12, 2014
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2014-2249

    Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims ... Read more

    Affected Products : simatic_s7-1500_cpu_firmware
    • Published: Mar. 16, 2014
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2013-6418

    PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.... Read more

    Affected Products : pywbem
    • Published: May. 05, 2014
    • Modified: Apr. 12, 2025
Showing 20 of 294848 Results