Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.3

    CRITICAL
    CVE-2020-15231

    In mapfish-print before version 3.24, a user can use the JSONP support to do a Cross-site scripting.... Read more

    Affected Products : print
    • Published: Oct. 02, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    CRITICAL
    CVE-2020-15232

    In mapfish-print before version 3.24, a user can do to an XML External Entity (XXE) attack with the provided SDL style.... Read more

    Affected Products : print
    • Published: Oct. 02, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    CRITICAL
    CVE-2020-15229

    Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the hos... Read more

    Affected Products : leap backports_sle singularity
    • Published: Oct. 14, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2010-5194

    Stack-based buffer overflow in the Image2PDF function in the SCRIBBLE.ScribbleCtrl.1 ActiveX control (ImageViewer2.ocx) in Viscom Image Viewer CP Pro 8.0, Gold 5.5, Gold 6.0, and earlier allows remote attackers to execute arbitrary code via a long strPDFF... Read more

    • Published: Aug. 31, 2012
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2019-8523

    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary c... Read more

    Affected Products : itunes iphone_os tvos safari icloud
    • Published: Dec. 18, 2019
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2010-5081

    Stack-based buffer overflow in Mini-Stream RM-MP3 Converter 3.1.2.1 allows remote attackers to execute arbitrary code via a long URL in a .pls file.... Read more

    Affected Products : rm-mp3_converter
    • Published: Dec. 25, 2011
    • Modified: Apr. 11, 2025
  • 9.3

    CRITICAL
    CVE-2020-15178

    In PrestaShop contactform module (prestashop/contactform) before version 4.3.0, an attacker is able to inject JavaScript while using the contact form. The `message` field was incorrectly unescaped, possibly allowing attackers to execute arbitrary JavaScri... Read more

    Affected Products : contactform
    • Published: Sep. 15, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2010-1262

    Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, related to the CStyleSheet object and a fre... Read more

    • Published: Jun. 08, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2020-9759

    A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configurat... Read more

    Affected Products : webos
    • Published: Mar. 23, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2020-0851

    A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0850, CVE-2020-0852, CVE-2020-0855, C... Read more

    Affected Products : office office_365_proplus
    • Published: Mar. 12, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2020-0855

    A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0850, CVE-2020-0851, CVE-2020-0852, C... Read more

    Affected Products : office office_365_proplus
    • Published: Mar. 12, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2020-0979

    A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0906.... Read more

    Affected Products : office_365_proplus
    • Published: Apr. 15, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    CRITICAL
    CVE-2020-15165

    Version 1.1.6-free of Chameleon Mini Live Debugger on Google Play Store may have had it's sources or permissions tampered by a malicious actor. The official maintainer of the package is recommending all users upgrade to v1.1.8 as soon as possible. For mor... Read more

    Affected Products : chameleon_mini_live_debugger
    • Published: Aug. 28, 2020
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2016-0992

    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers... Read more

    • Published: Mar. 12, 2016
    • Modified: Apr. 12, 2025
  • 9.3

    HIGH
    CVE-2010-1792

    WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application... Read more

    • Published: Jul. 30, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-1807

    WebKit in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2; Android before 2.2; and webkitgtk before 1.2.6; does not properly validate floating-point data, which allows remote attackers to execute arbitrary code or cause a denial of service (application... Read more

    Affected Products : android safari webkitgtk
    • Published: Sep. 10, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-2168

    Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" ... Read more

    Affected Products : mac_os_x acrobat acrobat_reader windows
    • Published: Jun. 30, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-2183

    Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2181.... Read more

    Affected Products : flash_player flash_player air
    • Published: Jun. 15, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2010-2212

    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted ... Read more

    Affected Products : mac_os_x acrobat acrobat_reader windows
    • Published: Jun. 30, 2010
    • Modified: Apr. 11, 2025
  • 9.3

    HIGH
    CVE-2011-3081

    Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3078... Read more

    Affected Products : chrome itunes iphone_os safari
    • Published: May. 01, 2012
    • Modified: Apr. 11, 2025
Showing 20 of 294273 Results