Latest CVE Feed
-
10.0
HIGHCVE-2019-5075
An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets sent ... Read more
- Published: Dec. 18, 2019
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2010-3757
Format string vulnerability in the _Eventlog function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to execute arbitrary code via format string ... Read more
Affected Products : tivoli_storage_manager_fastback- Published: Oct. 05, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3761
Unspecified vulnerability in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-700. NOTE: this might overlap CVE-2010-3058 or C... Read more
Affected Products : tivoli_storage_manager_fastback- Published: Oct. 05, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3748
Stack-based buffer overflow in the RichFX component in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, and RealPlayer Enterprise 2.1.2 allows remote attackers to have an unspecified impact via unknown vectors.... Read more
- Published: Oct. 19, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3758
Multiple stack-based buffer overflows in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allow remote attackers to execute arbitrary code via vectors involving the (1) AGI_S... Read more
Affected Products : tivoli_storage_manager_fastback- Published: Oct. 05, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2020-14882
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthent... Read more
Affected Products : weblogic_server- Actively Exploited
- Published: Oct. 21, 2020
- Modified: Feb. 07, 2025
-
10.0
CRITICALCVE-2020-14871
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multip... Read more
- Actively Exploited
- Published: Oct. 21, 2020
- Modified: Feb. 07, 2025
-
10.0
HIGHCVE-2011-4502
The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 ... Read more
Affected Products : wl-153_router_firmware wl-153 br-6104k_router_firmware br-6104k cn-wf512_router_firmware cn-wf514_router_firmware cn-wf512 cn-wf514 6114wg_router_firmware 6114wg +2 more products- Published: Nov. 22, 2011
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2020-4211
IBM Spectrum Protect Plus 10.1.0 and 10.1.5 could allow a remote attacker to execute arbitrary code on the system. By using a specially crafted HTTP command, an attacker could exploit this vulnerability to execute arbitrary command on the system. IBM X-Fo... Read more
- Published: Feb. 24, 2020
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2010-3566
Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was ob... Read more
- Published: Oct. 19, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3565
Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous informat... Read more
- Published: Oct. 19, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3567
Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was ob... Read more
- Published: Oct. 19, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3553
Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the prev... Read more
- Published: Oct. 19, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3554
Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the prev... Read more
- Published: Oct. 19, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3510
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.0, 9.1, 9.2.3, 10.0.2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Node Ma... Read more
Affected Products : fusion_middleware- Published: Jan. 19, 2011
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3509
Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scheduler.... Read more
Affected Products : solaris- Published: Oct. 14, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3414
Google Chrome before 6.0.472.59 on Mac OS X does not properly implement file dialogs, which allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. NOTE: this issue exists because o... Read more
- Published: Sep. 16, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3252
Use-after-free vulnerability in the Notifications presenter in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.... Read more
Affected Products : chrome- Published: Sep. 07, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3253
The implementation of notification permissions in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.... Read more
Affected Products : chrome- Published: Sep. 07, 2010
- Modified: Apr. 11, 2025
-
10.0
HIGHCVE-2010-3254
The WebSockets implementation in Google Chrome before 6.0.472.53 does not properly handle integer values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.... Read more
Affected Products : chrome- Published: Sep. 07, 2010
- Modified: Apr. 11, 2025