Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    HIGH
    CVE-2022-24706

    In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, includin... Read more

    Affected Products : couchdb
    • Actively Exploited
    • EPSS Score: %94.39
    • Published: Apr. 26, 2022
    • Modified: Jan. 29, 2025
  • 10.0

    HIGH
    CVE-2022-24086

    Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary co... Read more

    Affected Products : magento commerce magento_commerce
    • Actively Exploited
    • EPSS Score: %90.15
    • Published: Feb. 16, 2022
    • Modified: Feb. 13, 2025
  • 10.0

    CRITICAL
    CVE-2022-23658

    A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manager that address this sec... Read more

    Affected Products : clearpass_policy_manager
    • EPSS Score: %2.11
    • Published: May. 16, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2022-23227

    NUUO NVRmini2 through 3.11 allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users because of the lack of handle_import_user.php authentication. When combined with another flaw (CVE-2011-5325), it ... Read more

    Affected Products : nvrmini2_firmware nvrmini_2 nvrmini2
    • Actively Exploited
    • EPSS Score: %52.85
    • Published: Jan. 14, 2022
    • Modified: Mar. 13, 2025
  • 10.0

    CRITICAL
    • Actively Exploited
    • EPSS Score: %94.46
    • Published: Mar. 03, 2022
    • Modified: Mar. 13, 2025
  • 10.0

    HIGH
    CVE-2022-22586

    An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges.... Read more

    Affected Products : macos
    • EPSS Score: %0.84
    • Published: Mar. 18, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2022-20749

    Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization... Read more

    • EPSS Score: %0.80
    • Published: Feb. 10, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2022-20712

    Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization... Read more

    • EPSS Score: %2.18
    • Published: Feb. 10, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2022-20699

    Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization... Read more

    • Actively Exploited
    • EPSS Score: %88.83
    • Published: Feb. 10, 2022
    • Modified: Mar. 13, 2025
  • 10.0

    HIGH
    CVE-2021-45382

    A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all... Read more

    • Actively Exploited
    • EPSS Score: %94.23
    • Published: Feb. 17, 2022
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-2734

    webadmin-apache.conf in Novell Web Manager of Novell NetWare 6.5 uses an uppercase Alias tag with an inconsistent lowercase directory tag for a volume, which allows remote attackers to bypass access control to the WEB-INF folder.... Read more

    Affected Products : netware
    • EPSS Score: %0.92
    • Published: Dec. 31, 2004
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-2689

    NewsPHP allows remote attackers to gain unauthorized administrative access by setting a cookie to the "autorized=admin; root=admin" value.... Read more

    Affected Products : newsphp
    • EPSS Score: %0.84
    • Published: Dec. 31, 2004
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-2644

    Unspecified vulnerability in ASN.1 Compiler (asn1c) before 0.9.7 has unknown impact and attack vectors when processing "ANY" type tags.... Read more

    Affected Products : asn.1_compiler
    • EPSS Score: %0.62
    • Published: Dec. 31, 2004
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-2645

    Unspecified vulnerability in ASN.1 Compiler (asn1c) before 0.9.7 has unknown impact and attack vectors when processing "CHOICE" types with "indefinite length structures."... Read more

    Affected Products : asn.1_compiler
    • EPSS Score: %0.62
    • Published: Dec. 31, 2004
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-2623

    Unknown vulnerability in Rippy the Aggregator before 0.10, when register_globals is enabled, has unknown attack vectors and impact, possibly related to the "user-controlled filter."... Read more

    Affected Products : rippy_the_aggregator
    • EPSS Score: %0.86
    • Published: Dec. 31, 2004
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2021-3331

    WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// U... Read more

    Affected Products : winscp
    • EPSS Score: %5.58
    • Published: Jan. 27, 2021
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2004-2470

    Unspecified vulnerability in MadBMS before 1.1.5 has unknown impact and attack vectors, related to logins.... Read more

    Affected Products : madbms
    • EPSS Score: %0.40
    • Published: Dec. 31, 2004
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2004-2453

    Unknown vulnerability in Tutti Nova 0.10 through 0.12 (Beta) and 0.9.4, when register_globals is enabled, has unknown impact and attack vectors.... Read more

    Affected Products : tutti_nova
    • EPSS Score: %0.40
    • Published: Dec. 31, 2004
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2021-3064

    A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The ... Read more

    Affected Products : pan-os prisma_access
    • EPSS Score: %49.22
    • Published: Nov. 10, 2021
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2023-30856

    eDEX-UI is a science fiction terminal emulator. Versions 2.2.8 and prior are vulnerable to cross-site websocket hijacking. When running eDEX-UI and browsing the web, a malicious website can connect to eDEX's internal terminal control websocket, and send a... Read more

    Affected Products : edex-ui
    • EPSS Score: %0.14
    • Published: Apr. 28, 2023
    • Modified: Nov. 21, 2024
Showing 20 of 292425 Results