Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    HIGH
    CVE-2015-0352

    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differ... Read more

    • Published: Apr. 14, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-0342

    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability... Read more

    • Published: Mar. 13, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-0339

    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differ... Read more

    • Published: Mar. 13, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-0328

    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknow... Read more

    • Published: Feb. 06, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-0327

    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability t... Read more

    • Published: Feb. 06, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-0323

    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability t... Read more

    • Published: Feb. 06, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-0319

    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-... Read more

    • Published: Feb. 06, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2015-0309

    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SD... Read more

    • Published: Jan. 13, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2014-9164

    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differ... Read more

    • Published: Dec. 10, 2014
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2014-8817

    coresymbolicationd in CoreSymbolication in Apple OS X before 10.10.2 does not verify that expected data types are present in XPC messages, which allows attackers to execute arbitrary code in a privileged context via a crafted app, as demonstrated by lack ... Read more

    Affected Products : mac_os_x mac_os_x
    • Published: Jan. 30, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2014-8741

    Directory traversal vulnerability in the GfdFileUploadServerlet servlet in Lexmark MarkVision Enterprise before 2.1 allows remote attackers to write to arbitrary files via unspecified vectors.... Read more

    Affected Products : markvision_enterprise
    • Published: Jan. 27, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2014-8165

    scripts/amsvis/powerpcAMS/amsnet.py in powerpc-utils-python uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.... Read more

    Affected Products : powerpc-utils
    • Published: Feb. 19, 2015
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2014-6513

    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.... Read more

    Affected Products : jdk jre
    • Published: Oct. 15, 2014
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2006-4305

    Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client.... Read more

    Affected Products : maxdb sap-db
    • Published: Aug. 30, 2006
    • Modified: Apr. 03, 2025
  • 10.0

    CRITICAL
    CVE-2023-40044

    In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.... Read more

    Affected Products : ws_ftp_server
    • Actively Exploited
    • Published: Sep. 27, 2023
    • Modified: Feb. 13, 2025
  • 10.0

    CRITICAL
    CVE-2023-3991

    An OS command injection vulnerability exists in the httpd iperfrun.cgi functionality of FreshTomato 2023.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.... Read more

    Affected Products : freshtomato
    • Published: Oct. 16, 2023
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2023-3941

    Relative Path Traversal vulnerability in ZkTeco-based OEM devices allows an attacker to write any file on the system with root privileges. This issue affects ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possib... Read more

    Affected Products :
    • Published: May. 21, 2024
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2014-2977

    Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.13 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface... Read more

    • Published: Jun. 11, 2014
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2014-2967

    Autodesk VRED Professional 2014 before SR1 SP8 allows remote attackers to execute arbitrary code via Python os library calls in Python API commands to the integrated web server.... Read more

    Affected Products : vred
    • Published: Jul. 07, 2014
    • Modified: Apr. 12, 2025
  • 10.0

    HIGH
    CVE-2018-8154

    A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server. This CVE ID is uniq... Read more

    Affected Products : exchange_server
    • Published: May. 09, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 292795 Results