Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.5

    MEDIUM
    CVE-2022-20199

    In multiple locations of NfcService.java, there is a possible disclosure of NFC tags due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Dec. 16, 2022
    • Modified: Apr. 21, 2025
  • 5.5

    MEDIUM
    CVE-2022-20552

    In btif_a2dp_sink_command_ready of btif_a2dp_sink.cc, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploi... Read more

    Affected Products : android
    • Published: Dec. 16, 2022
    • Modified: Apr. 18, 2025
  • 5.5

    MEDIUM
    CVE-2022-20592

    In ppmp_validate_secbuf of drm_fw.c, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitati... Read more

    Affected Products : android
    • Published: Dec. 16, 2022
    • Modified: Apr. 18, 2025
  • 5.5

    MEDIUM
    CVE-2022-4619

    The Sidebar Widgets by CodeLights plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Extra CSS class’ parameter in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possibl... Read more

    Affected Products : codelights-shortcodes-and-widgets
    • Published: Dec. 20, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-4641

    A vulnerability was found in pig-vector and classified as problematic. Affected by this issue is the function LogisticRegression of the file src/main/java/org/apache/mahout/pig/LogisticRegression.java. The manipulation leads to insecure temporary file. Th... Read more

    Affected Products : pig-vector
    • Published: Dec. 21, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2023-0162

    The CPO Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of its content type settings parameters in versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping. This makes it possi... Read more

    Affected Products : cpo_companion
    • Published: Jan. 10, 2023
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-26346

    Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.... Read more

    • Published: Jan. 11, 2023
    • Modified: Apr. 09, 2025
  • 5.5

    MEDIUM
    CVE-2021-26355

    Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service. ... Read more

    • Published: Jan. 11, 2023
    • Modified: Apr. 09, 2025
  • 5.5

    MEDIUM
    CVE-2021-26404

    Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure. ... Read more

    • Published: Jan. 11, 2023
    • Modified: Apr. 08, 2025
  • 5.5

    MEDIUM
    CVE-2018-15809

    AccuPOS 2017.8 is installed with the insecure "Authenticated Users: Modify" permission for files within the installation path. This may allow local attackers to compromise the integrity of critical resource and executable files.... Read more

    Affected Products : accupos
    • Published: Aug. 23, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2018-6599

    An issue was discovered on Orbic Wonder Orbic/RC555L/RC555L:7.1.2/N2G47H/329100b:user/release-keys devices, allowing attackers to obtain sensitive information (such as text-message content) by reading a copy of the Android log on the SD card. The system-w... Read more

    • Published: Aug. 29, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-41146

    This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    • Published: Jan. 26, 2023
    • Modified: Nov. 27, 2024
  • 5.5

    MEDIUM
    CVE-2022-20213

    In ApplicationsDetailsActivity of AndroidManifest.xml, there is a possible DoS due to a tapjacking/overlay attack. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Produ... Read more

    Affected Products : android
    • Published: Jan. 26, 2023
    • Modified: Apr. 02, 2025
  • 5.5

    MEDIUM
    CVE-2023-20908

    In several functions of SettingsState.java, there is a possible system crash loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Produc... Read more

    Affected Products : android
    • Published: Jan. 26, 2023
    • Modified: Apr. 03, 2025
  • 5.5

    MEDIUM
    CVE-2023-20923

    In exported content providers of ShannonRcs, there is a possible way to get access to protected content providers due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction... Read more

    Affected Products : android
    • Published: Jan. 26, 2023
    • Modified: Apr. 02, 2025
  • 5.5

    MEDIUM
    CVE-2022-42407

    This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious fil... Read more

    • Published: Jan. 26, 2023
    • Modified: Nov. 27, 2024
  • 5.5

    MEDIUM
    CVE-2019-15361

    The Infinix Note 5 Android device with a build fingerprint of Infinix/H632C/Infinix-X605_sprout:8.1.0/O11019/CE-180914V59:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) t... Read more

    Affected Products : note_5_firmware note_5
    • Published: Nov. 14, 2019
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-43665

    A denial of service vulnerability exists in the malware scan functionality of ESTsoft Alyac 2.5.8.645. A specially-crafted PE file can lead to killing target process. An attacker can provide a malicious file to trigger this vulnerability.... Read more

    Affected Products : alyac
    • Published: Feb. 02, 2023
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-36535

    Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf.... Read more

    Affected Products : mjs
    • Published: Feb. 03, 2023
    • Modified: Mar. 26, 2025
  • 5.5

    MEDIUM
    CVE-2020-3674

    Information can leak into userspace due to improper transfer of data from kernel to userspace in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in ... Read more

    • Published: Sep. 09, 2020
    • Modified: Nov. 21, 2024
Showing 20 of 294759 Results