Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    HIGH
    CVE-2018-0692

    Untrusted search path vulnerability in Baidu Browser Version 43.23.1000.500 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : spark_browser
    • Published: Nov. 15, 2018
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2017-0763

    A remote code execution vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62534693.... Read more

    Affected Products : android
    • Published: Sep. 08, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    HIGH
    CVE-2017-0801

    A elevation of privilege vulnerability in the MediaTek libmtkomxvdec. Product: Android. Versions: Android kernel. Android ID: A-38447970. References: M-ALPS03337980.... Read more

    Affected Products : android
    • Published: Sep. 08, 2017
    • Modified: Apr. 20, 2025
  • 9.3

    CRITICAL
    CVE-2023-30438

    An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead ... Read more

    • Published: May. 17, 2023
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2013-4772

    D-Link DIR-505L SharePort Mobile Companion 1.01 and DIR-826L Wireless N600 Cloud Router 1.02 allows remote attackers to bypass authentication via a direct request when an authorized session is active.... Read more

    • Published: May. 12, 2014
    • Modified: Apr. 12, 2025
  • 9.3

    HIGH
    CVE-2013-2785

    Multiple buffer overflows in CimWebServer.exe in the WebView component in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.0 SIM 27, 8.1 before SIM 25, and 8.2 before SIM 19, and Proficy Process Systems with CIMPLICITY, allow remote attack... Read more

    • Published: Jul. 31, 2013
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2016-10232

    An elevation of privilege vulnerability in the Qualcomm video driver. Product: Android. Versions: Android kernel. Android ID: A-34386696. References: QC-CR#1024872.... Read more

    Affected Products : android
    • Published: Apr. 04, 2018
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2013-2817

    An ActiveX control in IcoLaunch.dll in Mitsubishi Electric Automation MC-WorX Suite 8.02 allows user-assisted remote attackers to execute arbitrary programs via a crafted HTML document in conjunction with a Login Client button click.... Read more

    Affected Products : mc-worx_suite
    • Published: Feb. 24, 2014
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-3142

    Untrusted search path vulnerability in Microsoft Office PowerPoint 2007 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse rpawinet.dll that is located in the same folder as a ... Read more

    Affected Products : powerpoint
    • Published: Aug. 27, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2019-2013

    In rw_t3t_act_handle_sro_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.P... Read more

    Affected Products : android
    • Published: Jun. 19, 2019
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2020-9621

    Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.... Read more

    • Published: Jun. 26, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2018-18638

    A command injection vulnerability in the setup API in the Neato Botvac Connected 2.2.0 allows network attackers to execute arbitrary commands via shell metacharacters in the ntp field within JSON data to the /robot/initialize endpoint.... Read more

    • Published: Oct. 24, 2018
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-1999-0572

    .reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.... Read more

    Affected Products : windows_2000 windows_nt
    • Published: Jan. 01, 1997
    • Modified: Apr. 03, 2025
  • 9.3

    HIGH
    CVE-2007-0879

    Buffer overflow in SmidgeonSoft PEBrowse Professional 8.2.1.0 allows user-assisted remote attackers to execute arbitrary code via certain executable files in PE format. NOTE: the provenance of this information is unknown; the details are obtained solely ... Read more

    Affected Products : pebrowse
    • Published: Feb. 12, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-1784

    The JNILoader ActiveX control (STJNILoader.ocx) 3.1.0.26 in IBM Lotus Notes Sametime before 7.5 allows remote attackers to load arbitrary DLL libraries and execute arbitrary code via arbitrary arguments to the loadLibrary function.... Read more

    • Published: Mar. 31, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-3924

    Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Netscape installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metac... Read more

    Affected Products : internet_explorer navigator
    • Published: Jul. 21, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-5213

    Multiple cross-site request forgery (CSRF) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware 2.43 and earlier allow remote attackers to perform actions as administrators, as demonstrated by (1) an SMTP server change through the conf_SMTP_... Read more

    • Published: Oct. 04, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-5687

    Multiple buffer overflows in the rich text processing functionality in JustSystems Ichitaro 2004 through 2007, 11 through 13, and other versions allow remote attackers to execute arbitrary code via a long (1) pard field or (2) font name in the fcharset0 f... Read more

    Affected Products : ichitaro ichitaro
    • Published: Oct. 28, 2007
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-6254

    Stack-based buffer overflow in the SAP Business Objects BusinessObjects RptViewerAX ActiveX control in RptViewerAX.dll in Business Objects 6.5 before CHF74 allows remote attackers to execute arbitrary code via unspecified vectors.... Read more

    Affected Products : businessobjects business_objects
    • Published: Mar. 20, 2008
    • Modified: Apr. 09, 2025
  • 9.3

    HIGH
    CVE-2007-6278

    Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allows user-assisted remote attackers to force a client to download arbitrary files via the MIME-Type URL flag (-->) for the FLAC image file in a crafted .FLAC file.... Read more

    Affected Products : libflac
    • Published: Dec. 07, 2007
    • Modified: Apr. 09, 2025
Showing 20 of 293182 Results