Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    CRITICAL
    CVE-2020-14871

    Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multip... Read more

    Affected Products : solaris solaris
    • Actively Exploited
    • Published: Oct. 21, 2020
    • Modified: Feb. 07, 2025
  • 10.0

    HIGH
    CVE-2011-4502

    The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 ... Read more

    • Published: Nov. 22, 2011
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2020-4211

    IBM Spectrum Protect Plus 10.1.0 and 10.1.5 could allow a remote attacker to execute arbitrary code on the system. By using a specially crafted HTTP command, an attacker could exploit this vulnerability to execute arbitrary command on the system. IBM X-Fo... Read more

    • Published: Feb. 24, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2010-3566

    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was ob... Read more

    Affected Products : jre jdk
    • Published: Oct. 19, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3565

    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous informat... Read more

    Affected Products : jre sdk jdk
    • Published: Oct. 19, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3567

    Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was ob... Read more

    Affected Products : jre jdk
    • Published: Oct. 19, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3553

    Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the prev... Read more

    Affected Products : jre sdk jdk
    • Published: Oct. 19, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3554

    Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the prev... Read more

    Affected Products : jre sdk jdk
    • Published: Oct. 19, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3510

    Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.0, 9.1, 9.2.3, 10.0.2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Node Ma... Read more

    Affected Products : fusion_middleware
    • Published: Jan. 19, 2011
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3509

    Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scheduler.... Read more

    Affected Products : solaris
    • Published: Oct. 14, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3414

    Google Chrome before 6.0.472.59 on Mac OS X does not properly implement file dialogs, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. NOTE: this issue exists because o... Read more

    Affected Products : chrome macos
    • Published: Sep. 16, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3252

    Use-after-free vulnerability in the Notifications presenter in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.... Read more

    Affected Products : chrome
    • Published: Sep. 07, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3253

    The implementation of notification permissions in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.... Read more

    Affected Products : chrome
    • Published: Sep. 07, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3254

    The WebSockets implementation in Google Chrome before 6.0.472.53 does not properly handle integer values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.... Read more

    Affected Products : chrome
    • Published: Sep. 07, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3119

    Google Chrome before 5.0.375.127 and webkitgtk before 1.2.6 do not properly support the Ruby language, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.... Read more

    Affected Products : chrome webkitgtk
    • Published: Aug. 24, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3112

    Google Chrome before 5.0.375.127 does not properly implement file dialogs, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.... Read more

    Affected Products : chrome
    • Published: Aug. 24, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-3031

    Buffer overflow in Wyse ThinOS HF 4.4.079i, and possibly other versions before ThinOS 6.5, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the LPD service.... Read more

    Affected Products : thinos_hf
    • Published: Aug. 17, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-2994

    Stack-based buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.14 and 1.2.0 through 1.2.9 has unknown impact and remote attack vectors. NOTE: this issue exists because of a CVE-2010-2284 regression.... Read more

    Affected Products : wireshark
    • Published: Aug. 13, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-2984

    Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 4404 series controllers does not properly implement the WEBAUTH_REQD state, which allows remote attackers to bypass intended access restrictions via WLAN traffic, aka Bug ID CSCtb75305.... Read more

    • Published: Aug. 10, 2010
    • Modified: Apr. 11, 2025
  • 10.0

    HIGH
    CVE-2010-2977

    Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 does not properly implement TLS and SSL, which has unspecified impact and remote attack vectors, aka Bug ID CSCtd01611.... Read more

    • Published: Aug. 10, 2010
    • Modified: Apr. 11, 2025
Showing 20 of 292795 Results