Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.8

    MEDIUM
    CVE-2013-5960

    The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0.1 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attack... Read more

    Affected Products : enterprise_security_api
    • Published: Sep. 30, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2013-5999

    Kingsoft KDrive Personal before 1.21.0.1880 on Windows does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.... Read more

    Affected Products : kdrive
    • Published: Nov. 22, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2011-4314

    message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is sign... Read more

    • Published: Jan. 27, 2012
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2013-5761

    Unspecified vulnerability in the Siebel Core - Server BizLogic Script component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Integration - Scripting.... Read more

    Affected Products : siebel_crm
    • Published: Oct. 16, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2013-5606

    The CERT_VerifyCert function in lib/certhigh/certvfy.c in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 provides an unexpected return value for an incompatible key-usage certificate when the CERTVerifyLog argument is valid, which might allow ... Read more

    Affected Products : network_security_services
    • Published: Nov. 18, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2009-2199

    Incomplete blacklist vulnerability in WebKit in Apple Safari before 4.0.3, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms, allows remote attackers to spoof domain names in URLs, and possibly conduct phishing at... Read more

    Affected Products : iphone_os safari ipod_touch
    • Published: Aug. 12, 2009
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2013-5431

    Open redirect vulnerability in IBM Tivoli Federated Identity Manager (TFIM) 6.1.1 before IF 15, 6.2.0 before IF 14, 6.2.1, and 6.2.2 before IF 8 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.1.1 before IF 15, 6.2.0 before IF 14, 6.2.1,... Read more

    • Published: Nov. 01, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2013-1208

    The encryption functionality in Cisco NX-OS on the Nexus 1000V does not properly handle Virtual Supervisor Module (VSM) to Virtual Ethernet Module (VEM) communication, which allows remote attackers to intercept or modify network traffic by leveraging cert... Read more

    Affected Products : nx-os nexus_1000v
    • Published: May. 29, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2013-4762

    Puppet Enterprise before 3.0.1 does not sufficiently invalidate a session when a user logs out, which might allow remote attackers to hijack sessions by obtaining an old session ID.... Read more

    Affected Products : puppet_enterprise
    • Published: Aug. 20, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2013-4700

    The Yahoo! Japan Shopping application 1.4 and earlier for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.... Read more

    Affected Products : japan_shopping
    • Published: Aug. 21, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2013-4596

    The Node Access Keys module 7.x-1.x before 7.x-1.1 for Drupal does not properly check permissions, which allows remote attackers to bypass access restrictions via a node listing.... Read more

    Affected Products : nodeaccesskeys
    • Published: Jun. 02, 2014
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2020-27218

    In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an att... Read more

    • Published: Nov. 28, 2020
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2008-0241

    Open redirect vulnerability in /idm/user/login.jsp in Sun Java System Identity Manager 6.0 SP1 through SP3, 7.0, and 7.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the nextPage parameter.... Read more

    Affected Products : java_system_identity_manager
    • Published: Jan. 11, 2008
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2013-4310

    Apache Struts 2.0.0 through 2.3.15.1 allows remote attackers to bypass access controls via a crafted action: prefix.... Read more

    Affected Products : struts
    • Published: Sep. 30, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2019-8530

    This issue was addressed with improved checks. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2. A malicious application may be able to overwrite arbitrary files.... Read more

    Affected Products : macos mac_os_x iphone_os tvos
    • Published: Dec. 18, 2019
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2013-4200

    The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_site... Read more

    Affected Products : plone
    • Published: Jan. 21, 2014
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2013-4191

    zip.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce access restrictions when including content in a zip archive, which allows remote attackers to obtain sensitive information by reading a generated archi... Read more

    Affected Products : plone
    • Published: Mar. 11, 2014
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2020-3285

    A vulnerability in the Transport Layer Security version 1.3 (TLS 1.3) policy with URL category functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured TLS 1.3 policy to block t... Read more

    Affected Products : firepower_threat_defense
    • Published: May. 06, 2020
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2018-8152

    An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." This affects Microsoft Exchange Server.... Read more

    Affected Products : exchange_server
    • Published: May. 09, 2018
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2013-3925

    Atlassian Crowd 2.5.x before 2.5.4, 2.6.x before 2.6.3, 2.3.8, and 2.4.9 allows remote attackers to read arbitrary files and send HTTP requests to intranet servers via a request to (1) /services/2 or (2) services/latest with a DTD containing an XML extern... Read more

    Affected Products : crowd
    • Published: Jul. 01, 2013
    • Modified: Apr. 11, 2025
Showing 20 of 294846 Results