Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    HIGH
    CVE-2020-4589

    IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. IBM X-Force ID: 184585.... Read more

    Affected Products : websphere_application_server
    • Published: Aug. 13, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3847

    An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.3. A remote attacker may be able to leak memory.... Read more

    Affected Products : macos mac_os_x
    • Published: Apr. 01, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3760

    Adobe Digital Editions versions 4.5.10 and below have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution.... Read more

    Affected Products : windows digital_editions
    • Published: Feb. 13, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3740

    Adobe Framemaker versions 2019.0.4 and below have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.... Read more

    Affected Products : windows framemaker
    • Published: Feb. 13, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3470

    Multiple vulnerabilities in the API subsystem of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges. The vulnerabilities are due to improper boundary checks for certa... Read more

    • Published: Nov. 18, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2023-29199

    There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run ... Read more

    Affected Products : vm2
    • Published: Apr. 14, 2023
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3375

    A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by ... Read more

    Affected Products : sd-wan sd-wan_vmanage ios_xe_sd-wan
    • Published: Jul. 31, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3357

    A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause th... Read more

    • Published: Jul. 16, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3331

    A vulnerability in the web-based management interface of Cisco RV110W Wireless-N VPN Firewall and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due ... Read more

    • Published: Jul. 16, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3227

    A vulnerability in the authorization controls for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute Cisco IOx API commands without proper authorization. The vulnerability i... Read more

    Affected Products : ios_xe ios_xe
    • Published: Jun. 03, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-3198

    Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker or an authenticated, local... Read more

    Affected Products : ios 1120 1240 809 829
    • Published: Jun. 03, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-28907

    Incorrect SSL certificate validation in Nagios Fusion 4.1.8 and earlier allows for Escalation of Privileges or Code Execution as root via vectors related to download of an untrusted update package in upgrade_to_latest.sh.... Read more

    Affected Products : fusion
    • Published: May. 24, 2021
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2020-28630

    Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker ca... Read more

    • Published: Apr. 18, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2020-28624

    Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker ca... Read more

    • Published: Apr. 18, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2020-28622

    Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker ca... Read more

    • Published: Apr. 18, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2020-28610

    Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker ca... Read more

    • Published: Apr. 18, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2019-16455

    Adobe Acrobat and Reader versions , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an untrusted pointer dereference vulnerability. Successful expl... Read more

    • Published: Dec. 19, 2019
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2020-27780

    A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.... Read more

    Affected Products : linux-pam
    • Published: Dec. 18, 2020
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2023-29017

    vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. Prior to version 3.9.15, vm2 was not properly handling host objects passed to `Error.prepareStackTrace` in case of unhandled async errors. A threat actor could bypass t... Read more

    Affected Products : vm2
    • Published: Apr. 06, 2023
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2020-26829

    SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedica... Read more

    • Published: Dec. 09, 2020
    • Modified: Nov. 21, 2024
Showing 20 of 292813 Results