Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    HIGH
    CVE-2019-15505

    drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).... Read more

    Affected Products : linux_kernel ubuntu_linux debian_linux
    • Published: Aug. 23, 2019
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2015-2590

    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CV... Read more

    • Actively Exploited
    • Published: Jul. 16, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2018-12812

    Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user... Read more

    • Published: Jul. 20, 2018
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2016-3427

    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.... Read more

    • Actively Exploited
    • Published: Apr. 21, 2016
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2016-3586

    Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a dif... Read more

    Affected Products : weblogic_server
    • Published: Jul. 21, 2016
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-2342

    The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.... Read more

    Affected Products : vcenter_server
    • Published: Oct. 12, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2016-4101

    Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service... Read more

    • Published: May. 11, 2016
    • Modified: Apr. 12, 2025
  • 10.0

    CRITICAL
    CVE-2020-28609

    Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker ca... Read more

    • Published: Apr. 18, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2011-0084

    The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which... Read more

    Affected Products : firefox thunderbird seamonkey
    • Published: Aug. 18, 2011
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2015-2113

    Unspecified vulnerability in HP Easy Deploy, as distributed standalone and in HP Easy Tools before 3.0.1.1650, on HP Thin Client t5540, t5740, and t5740e devices and HP Flexible Thin Client t510, t520, t610, t620, and t820 devices allows remote attackers ... Read more

    • Published: Apr. 14, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-2135

    Unspecified vulnerability in HP Intelligent Provisioning 1.00 through 1.62(a), 2.00, and 2.10 allows remote attackers to execute arbitrary code via unknown vectors.... Read more

    Affected Products : intelligent_provisioning
    • Published: Aug. 31, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2013-4822

    Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Branch Intelligent Management System Software Module (aka BIMS) allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1606.... Read more

    • Published: Oct. 13, 2013
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2015-2052

    Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface.... Read more

    Affected Products : dir-645_firmware dir-645
    • Published: Feb. 23, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-2033

    Anyterm Daemon in Infoblox Network Automation NetMRI before NETMRI-23483 allows remote attackers to execute arbitrary commands with root privileges via a crafted terminal/anyterm-module request.... Read more

    Affected Products : netmri
    • Published: Feb. 20, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-2051

    The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.... Read more

    Affected Products : dir-645_firmware dir-645
    • Actively Exploited
    • Published: Feb. 23, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2011-0547

    Multiple integer overflows in vxsvc.exe in the Veritas Enterprise Administrator service in Symantec Veritas Storage Foundation 5.1 and earlier, Veritas Storage Foundation Cluster File System (SFCFS) 5.1 and earlier, Veritas Storage Foundation Cluster File... Read more

    • Published: Aug. 19, 2011
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2013-2863

    Google Chrome before 27.0.1453.110 does not properly handle SSL sockets, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.... Read more

    Affected Products : debian_linux chrome
    • Published: Jun. 05, 2013
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2015-1938

    The server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to execute arbitrary commands via unspecified vectors, a different vulnerability than CVE-2015-1986.... Read more

    Affected Products : tivoli_storage_manager_fastback
    • Published: Jun. 30, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-1949

    The server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to execute arbitrary commands with SYSTEM privileges via unspecified vectors.... Read more

    Affected Products : tivoli_storage_manager_fastback
    • Published: Jun. 30, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-1902

    Stack-based buffer overflow in IBM Domino 8.5 before 8.5.3 FP6 IF7 and 9.0 before 9.0.1 FP3 IF3 allows remote attackers to execute arbitrary code via a crafted BMP image, aka SPR KLYH9TSMLA.... Read more

    Affected Products : domino
    • Published: May. 20, 2015
    • Modified: Apr. 12, 2025
Showing 20 of 293225 Results