Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    HIGH
    CVE-2015-5014

    IBM Cognos Disclosure Management (CDM) 10.1.x and 10.2.x before 10.2.4 IF10 allows man-in-the-middle attackers to obtain access by spoofing an executable file during a client upload operation.... Read more

    Affected Products : cognos_disclosure_management
    • Published: Oct. 26, 2015
    • Modified: Apr. 12, 2025
  • 9.3

    HIGH
    CVE-2009-2362

    Stack-based buffer overflow in KUDRSOFT AudioPLUS 2.0.0.215 allows remote attackers to execute arbitrary code via a long string in a (1) .lst or (2) .m3u playlist file.... Read more

    Affected Products : audioplus
    • Published: Jul. 08, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2014-9962

    In all Android releases from CAF using the Linux kernel, a vulnerability exists in the parsing of a DRM provisioning command.... Read more

    Affected Products : android
    • Published: Jun. 13, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2014-9964

    In all Android releases from CAF using the Linux kernel, an integer overflow vulnerability exists in debug functionality.... Read more

    Affected Products : android
    • Published: Jun. 13, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2009-2617

    Stack-based buffer overflow in medialib.dll in BaoFeng Storm 3.9.62 allows remote attackers to execute arbitrary code via a long pathname in the source attribute of an item element in a .smpl playlist file.... Read more

    Affected Products : storm
    • Published: Jul. 27, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2009-3176

    Buffer overflow in the ActiveX control in Novell iPrint Client 4.38 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors, as demonstrated by a certain module in VulnDisco Pack Professi... Read more

    Affected Products : iprint
    • Published: Sep. 11, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2017-6223

    Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileg... Read more

    • Published: Oct. 13, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2008-5534

    ESET NOD32 Antivirus 3662 and possibly 3440, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1... Read more

    Affected Products : internet_explorer nod32_antivirus
    • Published: Dec. 12, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-5540

    Secure Computing Secure Web Gateway (aka Webwasher), when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to... Read more

    • Published: Dec. 12, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2008-5756

    Buffer overflow in BreakPoint Software Hex Workshop 5.1.4 allows user-assisted attackers to cause a denial of service and possibly execute arbitrary code via a long mapping reference in a Color Mapping (.cmap) file.... Read more

    Affected Products : hex_workshop
    • Published: Dec. 30, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2017-8141

    The Touch Panel (TP) driver in P10 Plus smart phones with software versions earlier than VKY-AL00C00B153 has a memory double free vulnerability. An attacker with the root privilege of the Android system tricks a user into installing a malicious applicatio... Read more

    Affected Products : p10_plus_firmware p10_plus
    • Published: Nov. 22, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2017-2267

    Untrusted search path vulnerability in FileCapsule Deluxe Portable Ver.1.0.5.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : filecapsule_deluxe_portable
    • Published: Jul. 17, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2017-2272

    Untrusted search path vulnerability in Self-extracting encrypted files created by AttacheCase ver.3.2.2.6 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : attachecase
    • Published: Jul. 17, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2008-6441

    Format string vulnerability in the Epic Games Unreal engine client, as used in multiple games, allows remote servers to execute arbitrary code via (1) the CLASS parameter in a DLMGR command, (2) a malformed package (PKG), and possibly (3) the LEVEL parame... Read more

    Affected Products : unreal_engine
    • Published: Mar. 09, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2013-2808

    Heap-based buffer overflow in Xper in Philips Xper Information Management Physiomonitoring 5 components, Xper Information Management Vascular Monitoring 5 components, and Xper Information Management servers and workstations for Flex Cardio products before... Read more

    • Published: Oct. 05, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2011-4266

    Untrusted search path vulnerability in FFFTP before 1.98d allows local users to gain privileges via a Trojan horse executable file in a directory that is accessed for reading an extensionless file, as demonstrated by executing the README.exe file when a u... Read more

    Affected Products : ffftp
    • Published: Dec. 13, 2011
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2009-0218

    Insecure method vulnerability in Particle Software IntraLaunch Application Launcher ActiveX control in IntraLaunch.ocx, as used in LDRA TBbrowse and possibly other products, allows remote attackers to execute arbitrary code via unknown vectors.... Read more

    Affected Products : intralaunch tbbrowse
    • Published: Apr. 13, 2009
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2018-9527

    In vorbis_book_decodev_set of codebook.c there is a possible out of bounds write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: An... Read more

    Affected Products : android
    • Published: Nov. 14, 2018
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2017-6037

    A Heap-Based Buffer Overflow issue was discovered in Wecon Technologies LEVI Studio HMI Editor before 1.8.1. This vulnerability causes a buffer overflow when a maliciously crafted project file is run by the system.... Read more

    Affected Products : levi_studio_hmi_editor
    • Published: Apr. 27, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2017-6224

    Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulne... Read more

    • Published: Oct. 13, 2017
    • Modified: Apr. 20, 2025
Showing 20 of 292850 Results