Latest CVE Feed
-
9.8
CRITICALCVE-2024-1917
Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.... Read more
Affected Products :- Published: Mar. 15, 2024
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2020-6994
A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP request... Read more
Affected Products : hirschmann_hios hirschmann_hisecos hirschmann_rail_switch_power_lite hirschmann_rail_switch_power_smart hirschmann_eagle20 hirschmann_eagle30 hirschmann_embedded_ethernet_switch hirschmann_embedded_ethernet_switch_extended hirschmann_greyhound_swtich hirschmann_mice_switch_power +4 more products- Published: Apr. 03, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2020-6880
A ZXELINK wireless controller has a SQL injection vulnerability. A remote attacker does not need to log in. By sending malicious SQL statements, because the device does not properly filter parameters, successful use can obtain management rights. This affe... Read more
- Published: Dec. 01, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2015-5244
The NSSCipherSuite option with ciphersuites enabled in mod_nss before 1.0.12 allows remote attackers to bypass application restrictions.... Read more
Affected Products : mod_nss- Published: Aug. 07, 2017
- Modified: Apr. 20, 2025
-
9.8
CRITICALCVE-2017-8380
Buffer overflow in the "megasas_mmio_write" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.... Read more
Affected Products : qemu- Published: Aug. 28, 2017
- Modified: Apr. 20, 2025
-
9.8
CRITICALCVE-2015-5297
An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.... Read more
Affected Products : pixman- Published: Jul. 31, 2019
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2020-6875
A ZTE product is impacted by the improper access control vulnerability. Due to lack of an authentication protection mechanism in the program, attackers could use this vulnerability to gain access right through brute-force attacks. This affects: <ZXONE 197... Read more
- Published: Oct. 05, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-5689
The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of NULL pointer checks.... Read more
- Published: Dec. 13, 2016
- Modified: Apr. 12, 2025
-
9.8
CRITICALCVE-2015-5254
Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.... Read more
- Published: Jan. 08, 2016
- Modified: Apr. 12, 2025
-
9.8
CRITICALCVE-2020-6839
In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in string.c.... Read more
Affected Products : mruby- Published: Jan. 11, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2015-5172
Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.... Read more
- Published: Oct. 24, 2017
- Modified: Apr. 20, 2025
-
9.8
CRITICALCVE-2020-6838
In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c.... Read more
Affected Products : mruby- Published: Jan. 11, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2023-39352
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an invalid offset validation leading to Out Of Bound Write. This can be triggered when the values `rect->left` and `... Read more
- Published: Aug. 31, 2023
- Modified: Apr. 11, 2025
-
9.8
CRITICALCVE-2014-5044
Multiple integer overflows in libgfortran might allow remote attackers to execute arbitrary code or cause a denial of service (Fortran application crash) via vectors related to array allocation.... Read more
Affected Products : libgfortran- Published: Mar. 07, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2024-47010
Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication.... Read more
Affected Products : avalanche- Published: Oct. 08, 2024
- Modified: Oct. 16, 2024
-
9.8
CRITICALCVE-2015-4852
The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/mo... Read more
Affected Products : weblogic_server storagetek_tape_analytics_sw_tool virtual_desktop_infrastructure- Actively Exploited
- Published: Nov. 18, 2015
- Modified: Apr. 12, 2025
-
9.8
CRITICALCVE-2020-6826
Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to ru... Read more
Affected Products : firefox- Published: Apr. 24, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2020-6823
A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability... Read more
Affected Products : firefox- Published: Apr. 24, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2015-4719
The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request.... Read more
Affected Products : pexip_infinity- Published: Sep. 24, 2020
- Modified: Nov. 21, 2024
-
9.8
CRITICAL- Published: Sep. 25, 2017
- Modified: Apr. 20, 2025