Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 1.8

    LOW
    CVE-2024-2567

    ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in jurecapuder AndroidWeatherApp 1.0.0 on Android. Affected is an unknown function of the file androidmanifest.xml of the component Backup File Handler. The ma... Read more

    Affected Products :
    • Published: Mar. 17, 2024
    • Modified: Nov. 21, 2024
  • 1.8

    LOW
    CVE-2025-23206

    The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprin... Read more

    Affected Products : aws_cloud_development_kit
    • Published: Jan. 17, 2025
    • Modified: Jan. 17, 2025
    • Vuln Type: Misconfiguration
  • 1.8

    LOW
    CVE-2025-21520

    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker wi... Read more

    Affected Products : mysql_server mysql_cluster
    • Published: Jan. 21, 2025
    • Modified: Apr. 09, 2025
    • Vuln Type: Information Disclosure
  • 1.8

    LOW
    CVE-2025-0885

    Incorrect Authorization vulnerability in OpenText™ GroupWise allows Exploiting Incorrectly Configured Access Control Security Levels. The vulnerability could allow unauthorized access to calendar items marked private. This issue affects GroupWise versio... Read more

    Affected Products :
    • Published: Jul. 03, 2025
    • Modified: Jul. 03, 2025
    • Vuln Type: Authorization
  • 1.8

    LOW
    CVE-2024-12057

    User credentials (login & password) are inserted into log files when a user tries to authenticate using a version of a Web client that is not compatible with that of the PcVue Web back end. By exploiting this vulnerability, an attacker could retrieve the ... Read more

    Affected Products :
    • Published: Dec. 09, 2024
    • Modified: Dec. 09, 2024
  • 1.8

    LOW
    CVE-2025-47278

    Flask is a web server gateway interface (WSGI) web application framework. In Flask 3.1.0, the way fallback key configuration was handled resulted in the last fallback key being used for signing, rather than the current signing key. Signing is provided by ... Read more

    Affected Products : flask
    • Published: May. 13, 2025
    • Modified: May. 13, 2025
    • Vuln Type: Cryptography
  • 1.8

    LOW
    CVE-2014-4812

    The installer in IBM Security AppScan Source 8.x and 9.x through 9.0.1 has an open network port for a debug service, which allows remote attackers to obtain sensitive information by connecting to this port.... Read more

    Affected Products : security_appscan_source
    • Published: Oct. 26, 2014
    • Modified: Apr. 12, 2025
  • 1.8

    LOW
    CVE-2013-7290

    The do_item_get function in items.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the ... Read more

    Affected Products : memcached
    • Published: Jan. 13, 2014
    • Modified: Apr. 11, 2025
  • 1.8

    LOW
    CVE-2015-1798

    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MA... Read more

    Affected Products : ntp
    • Published: Apr. 08, 2015
    • Modified: Apr. 12, 2025
  • 1.8

    LOW
    CVE-2013-7291

    memcached before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (crash) via a request that triggers an "unbounded key print" during logging, related to an issue that was "quickly grepped out of the source tree,"... Read more

    Affected Products : memcached
    • Published: Jan. 13, 2014
    • Modified: Apr. 11, 2025
  • 1.8

    LOW
    CVE-2016-0453

    Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 3.1.2 allows remote attackers to affect integrity via unknown vectors related to Embedded Server.... Read more

    Affected Products : glassfish_server fusion_middleware
    • Published: Jan. 21, 2016
    • Modified: Apr. 12, 2025
  • 1.8

    LOW
    CVE-2021-2147

    Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component: Installation). The supported version that is affected is 8.8. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure w... Read more

    • Published: Apr. 22, 2021
    • Modified: Nov. 21, 2024
  • 1.7

    LOW
    CVE-2006-1601

    Unspecified vulnerability in SunPlex Manager in Sun Cluster 3.1 4/04 allows local users with solaris.cluster.gui authorization to view arbitrary files via unspecified vectors.... Read more

    Affected Products : cluster
    • Published: Apr. 04, 2006
    • Modified: Apr. 03, 2025
  • 1.7

    LOW
    CVE-2009-1990

    Unspecified vulnerability in the Business Intelligence Enterprise Edition component in Oracle Application Server 10.1.3.4.1 allows local users to affect confidentiality via unknown vectors.... Read more

    Affected Products : application_server
    • Published: Oct. 22, 2009
    • Modified: Apr. 09, 2025
  • 1.7

    LOW
    CVE-2012-0174

    Windows Firewall in tcpip.sys in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly enforce firewall rules for outbound broadcast packets, which allows remote attackers to obtain potentially ... Read more

    • Published: May. 09, 2012
    • Modified: Apr. 11, 2025
  • 1.7

    LOW
    CVE-2006-5749

    The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash.... Read more

    Affected Products : linux_kernel
    • Published: Dec. 31, 2006
    • Modified: Apr. 09, 2025
  • 1.7

    LOW
    CVE-2006-0920

    Oi! Email Marketing System 3.0 (aka Oi! 3) stores the server's FTP password in cleartext on a Configuration web page, which allows local users with superadministrator privileges, or attackers who have obtained access to the web page, to view the password.... Read more

    Affected Products : email_marketing_system
    • Published: Feb. 28, 2006
    • Modified: Apr. 03, 2025
  • 1.7

    LOW
    CVE-2010-3406

    Unspecified vulnerability in sa_snap in the bos.esagent fileset in IBM AIX 5.3 allows local users to leverage system group membership and delete files via unknown vectors.... Read more

    Affected Products : aix
    • Published: Sep. 16, 2010
    • Modified: Apr. 11, 2025
  • 1.7

    LOW
    CVE-2014-2926

    kapfa.sys in Kaseya Virtual System Administrator (VSA) 6.5 before 6.5.0.17 and 7.0 before 7.0.0.16 allows local users to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.... Read more

    Affected Products : virtual_system_administrator
    • Published: Jul. 14, 2014
    • Modified: Apr. 12, 2025
  • 1.7

    LOW
    CVE-2002-0415

    Directory traversal vulnerability in the web server used in RealPlayer 6.0.7, and possibly other versions, may allow local users to read files that are accessible to RealPlayer via a .. (dot dot) in an HTTP GET request to port 1275.... Read more

    Affected Products : realplayer
    • Published: Aug. 12, 2002
    • Modified: Apr. 03, 2025
Showing 20 of 294514 Results