Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 2.1

    LOW
    CVE-2005-2499

    slocate before 2.7 does not properly process very long paths, which allows local users to cause a denial of service (updatedb exit and incomplete slocate database) via a certain crafted directory structure.... Read more

    Affected Products : slocate
    • Published: Aug. 23, 2005
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2010-0223

    Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext d... Read more

    • Published: Jan. 07, 2010
    • Modified: Apr. 09, 2025
  • 2.1

    LOW
    CVE-2010-1995

    Multiple cross-site scripting (XSS) vulnerabilities in index.php in TomatoCMS before 2.0.5 allow remote authenticated users, with "Add new article" privileges, to inject arbitrary web script or HTML via the (1) title, (2) subTitle, and (3) author paramete... Read more

    Affected Products : tomatocms
    • Published: May. 20, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-2038

    Cross-site scripting (XSS) vulnerability in include/tool/editing_files.php in gpEasy CMS 1.6.2 allows remote authenticated users, with Edit privileges, to inject arbitrary web script or HTML via the gpcontent parameter to index.php. NOTE: some of these d... Read more

    Affected Products : gpeasy_cms
    • Published: May. 25, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-2123

    Multiple cross-site scripting (XSS) vulnerabilities in the Storm module 5.x and 6.x before 6.x-1.33 for Drupal allow remote authenticated users, with certain module privileges, to inject arbitrary web script or HTML via the (1) fullname, (2) address, (3) ... Read more

    Affected Products : drupal storm
    • Published: Jun. 01, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-1984

    Cross-site scripting (XSS) vulnerability in the Taxonomy Breadcrumb module 5.x before 5.x-1.5 and 6.x before 6.x-1.1 for Drupal allows remote authenticated users, with administer taxonomy permissions, to inject arbitrary web script or HTML via the taxonom... Read more

    Affected Products : drupal taxonomy_breadcrumb
    • Published: May. 19, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-0854

    Unspecified vulnerability in the Audit component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote authenticated users to affect integrity, related to "SELECT, INSERT or DELETE on tables subject to auditing."... Read more

    Affected Products : database_server
    • Published: Apr. 13, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-1451

    The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, whi... Read more

    Affected Products : linux_kernel debian_linux
    • Published: May. 07, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-3245

    The automated-backup functionality in Blackboard Transact Suite (formerly Blackboard Commerce Suite) stores the (1) database username and (2) database password in cleartext in (a) script and (b) batch (.bat) files, which allows local users to obtain sensi... Read more

    Affected Products : transact_suite
    • Published: Sep. 07, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-3277

    The installer in VMware Workstation 7.x before 7.1.2 build 301548 and VMware Player 3.x before 3.1.2 build 301548 renders an index.htm file if present in the installation directory, which might allow local users to trigger unintended interpretation of web... Read more

    Affected Products : player workstation
    • Published: Sep. 28, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2009-1679

    The Profiles component in Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1, when installing a configuration profile, can replace the password policy from Exchange ActiveSync with a weaker password policy, which allows physi... Read more

    Affected Products : iphone_os ipod_touch
    • Published: Jun. 19, 2009
    • Modified: Apr. 09, 2025
  • 2.1

    LOW
    CVE-2010-2223

    Virtual Desktop Server Manager (VDSM) in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 does not properly perform VM post-zeroing after the removal of a virtual machine's data, which allows guest OS users to ob... Read more

    • Published: Jun. 24, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-1539

    Cross-site scripting (XSS) vulnerability in the Workflow module 5.x-2.x before 5.x-2.6 and 6.x-1.x before 6.x-1.4 for Drupal, when used with the Token module, might allow remote authenticated users to inject arbitrary web script or HTML via a certain Comm... Read more

    Affected Products : drupal workflow
    • Published: Apr. 26, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2009-1435

    NTRtScan.exe in Trend Micro OfficeScan Client 8.0 SP1 and 8.0 SP1 Patch 1 allows local users to cause a denial of service (application crash) via directories with long pathnames. NOTE: some of these details are obtained from third party information.... Read more

    Affected Products : officescan
    • Published: Apr. 27, 2009
    • Modified: Apr. 09, 2025
  • 2.1

    LOW
    CVE-2010-2000

    Cross-site scripting (XSS) vulnerability in the Bibliography (Biblio) module 5.x through 5.x-1.17 and 6.x through 6.x-1.9 for Drupal allows remote authenticated users, with "administer biblio" privileges, to inject arbitrary web script or HTML via unspeci... Read more

    Affected Products : drupal bibliography
    • Published: May. 20, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-2242

    Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying an... Read more

    Affected Products : libvirt
    • Published: Aug. 19, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2012-0097

    Unspecified vulnerability in Oracle Solaris 11 Express allows local users to affect confidentiality via unknown vectors related to ksh93 Shell.... Read more

    Affected Products : sunos solaris
    • Published: Jan. 18, 2012
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-0890

    Unspecified vulnerability in the Solaris component in Oracle Sun Product Suite 10 and OpenSolaris snv_01 through snv_98 allows local users to affect availability via unknown vectors related to the Kernel.... Read more

    Affected Products : sun_products_suite opensolaris
    • Published: Apr. 13, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-2157

    Unspecified vulnerability in CA ARCserve Backup r11.5 SP4, r12.0 SP2, and r12.5 SP1 on Windows allows local users to obtain sensitive information via unknown vectors.... Read more

    Affected Products : windows
    • Published: Jun. 07, 2010
    • Modified: Apr. 11, 2025
  • 2.1

    LOW
    CVE-2010-2224

    The snapshot merging functionality in Red Hat Enterprise Virtualization Manager (aka RHEV-M) before 2.2 does not properly pass the postzero parameter during operations on deleted volumes, which allows guest OS users to obtain sensitive information by exam... Read more

    • Published: Jun. 24, 2010
    • Modified: Apr. 11, 2025
Showing 20 of 293508 Results