Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    HIGH
    CVE-2018-13806

    A vulnerability has been identified in SIEMENS TD Keypad Designer (All versions). A DLL hijacking vulnerability exists in all versions of SIEMENS TD Keypad Designer which could allow an attacker to execute code with the permission of the user running TD D... Read more

    Affected Products : td_keypad_designer
    • Published: Sep. 12, 2018
    • Modified: Nov. 21, 2024
  • 9.3

    CRITICAL
    CVE-2024-9166

    The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access.... Read more

    Affected Products :
    • Published: Sep. 26, 2024
    • Modified: Sep. 30, 2024
  • 9.3

    HIGH
    CVE-2019-1641

    A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected softwa... Read more

    • Published: Jan. 23, 2019
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2010-2348

    Stack-based buffer overflow in Batch Audio Converter Lite Edition 1.0.0.0 and earlier allows remote attackers to execute arbitrary code via a long line in a .WAV file.... Read more

    Affected Products : batch_audio_converter
    • Published: Jun. 21, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2009-5109

    Stack-based buffer overflow in Mini-Stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long entry in a .pls file.... Read more

    Affected Products : ripper
    • Published: Dec. 25, 2011
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2009-1260

    Multiple stack-based buffer overflows in UltraISO 9.3.3.2685 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted (1) CCD or (2) IMG file.... Read more

    Affected Products : ultraiso
    • Published: Apr. 07, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-0509

    Multiple unspecified vulnerabilities in MaklerPlus before 1.2 have unknown impact and attack vectors, possibly relating to cross-site scripting (XSS) in the slogan parameter in main.tpl, or information leaks in error messages.... Read more

    Affected Products : maklerplus
    • Published: Jan. 26, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2010-2434

    Buffer overflow in Arcext.dll 2.16.1 and earlier in pon software Explzh 5.62 and earlier allows remote attackers to execute arbitrary code via an LZH LHA file with a crafted header that is not properly handled during expansion.... Read more

    Affected Products : explzh
    • Published: Jun. 25, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-2590

    Heap-based buffer overflow in the CrystalReports12.CrystalPrintControl.1 ActiveX control in PrintControl.dll 12.3.2.753 in SAP Crystal Reports 2008 SP3 Fix Pack 3.2 allows remote attackers to execute arbitrary code via a long ServerResourceVersion propert... Read more

    Affected Products : crystal_reports
    • Published: Dec. 22, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2007-3210

    Stack-based buffer overflow in nptoken.mox in the Cellosoft Tokens Object 2.0.0.6 extension for Vitalize! allows remote attackers to execute arbitrary code via a long string argument to the RemoveChr method. NOTE: the provenance of this information is un... Read more

    Affected Products : cellosoft_tokens_object
    • Published: Jun. 14, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-2864

    Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file.... Read more

    • Published: Jun. 06, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2016-1894

    NetApp OnCommand Workflow Automation before 3.1P2 allows remote attackers to bypass authentication via unspecified vectors.... Read more

    Affected Products : oncommand_workflow_automation
    • Published: Feb. 07, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2010-2974

    Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated D... Read more

    • Published: Aug. 05, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    CRITICAL
    CVE-2024-49305

    Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPFactory Email Verification for WooCommerce allows SQL Injection.This issue affects Email Verification for WooCommerce: from n/a through 2.8.10.... Read more

    • Published: Oct. 17, 2024
    • Modified: Oct. 18, 2024
  • 9.3

    HIGH
    CVE-2020-1458

    A remote code execution vulnerability exists when Microsoft Office improperly validates input before loading dynamic link library (DLL) files, aka 'Microsoft Office Remote Code Execution Vulnerability'.... Read more

    Affected Products : 365_apps
    • Published: Jul. 14, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2017-13162

    An elevation of privilege vulnerability in the kernel binder. Product: Android. Versions: Android kernel. Android ID A-64216036.... Read more

    Affected Products : android
    • Published: Dec. 06, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2013-5021

    Multiple absolute path traversal vulnerabilities in National Instruments cwui.ocx, as used in National Instruments LabWindows/CVI 2012 SP1 and earlier, National Instruments LabVIEW 2012 SP1 and earlier, the Data Analysis component in ABB DataManager 1 thr... Read more

    • Published: Aug. 06, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3975

    Untrusted search path vulnerability in Adobe Flash Player 9 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse schannel.dll that is located in the same folder as a file that is... Read more

    Affected Products : flash_player
    • Published: Oct. 19, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2014-6261

    Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote attackers to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session,... Read more

    Affected Products : zenoss_core
    • Published: Dec. 15, 2014
    • Modified: Apr. 12, 2025
  • 9.3

    CRITICAL
    CVE-2022-31513

    The BolunHan/Krypton repository through 2021-06-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.... Read more

    Affected Products : krypton
    • Published: Jul. 11, 2022
    • Modified: Nov. 21, 2024
Showing 20 of 292803 Results