Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.9

    CRITICAL
    CVE-2021-28476

    Windows Hyper-V Remote Code Execution Vulnerability... Read more

    • Published: May. 11, 2021
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-37271

    RestrictedPython is a tool that helps to define a subset of the Python language which allows users to provide a program input into a trusted environment. RestrictedPython does not check access to stack frames and their attributes. Stack frames are accessi... Read more

    Affected Products : restrictedpython
    • Published: Jul. 11, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-40714

    A relative path traversal in Fortinet FortiSIEM versions 7.0.0, 6.7.0 through 6.7.2, 6.6.0 through 6.6.3, 6.5.1, 6.5.0 allows attacker to escalate privilege via uploading certain GUI elements... Read more

    Affected Products : fortisiem
    • Published: Apr. 02, 2025
    • Modified: Jul. 15, 2025
    • Vuln Type: Path Traversal
  • 9.9

    CRITICAL
    CVE-2024-42327

    A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called fro... Read more

    Affected Products : zabbix
    • Published: Nov. 27, 2024
    • Modified: Nov. 27, 2024
  • 9.9

    CRITICAL
    CVE-2024-39931

    Gogs through 0.13.0 allows deletion of internal files.... Read more

    Affected Products : gogs
    • Published: Jul. 04, 2024
    • Modified: Apr. 10, 2025
  • 9.9

    CRITICAL
    CVE-2024-12828

    Webmin CGI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Webmin. Authentication is required to exploit this vulnerability. The specific flaw exist... Read more

    Affected Products : webmin
    • Published: Dec. 30, 2024
    • Modified: Aug. 14, 2025
  • 9.9

    CRITICAL
    CVE-2023-36468

    XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When an XWiki installation is upgraded and that upgrade contains a fix for a bug in a document, just a new version of that document is added. In some ... Read more

    Affected Products : xwiki
    • Published: Jun. 29, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2018-3919

    An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process insecurely extracts the fi... Read more

    Affected Products : sth-eth-250_firmware sth-eth-250
    • Published: Aug. 23, 2018
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2018-3865

    An exploitable buffer overflow vulnerability exists in the Samsung WifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy overflows the destination buffer, which has a size of 40 bytes. A... Read more

    Affected Products : sth-eth-250_firmware sth-eth-250
    • Published: Sep. 20, 2018
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-34063

    Aria Automation contains a Missing Access Control vulnerability. An authenticated malicious actor may exploit this vulnerability leading to unauthorized access to remote organizations and workflows. ... Read more

    Affected Products : cloud_foundation aria_automation
    • Published: Jan. 16, 2024
    • Modified: Jun. 20, 2025
  • 9.9

    CRITICAL
    CVE-2023-31415

    Kibana version 8.7.0 contains an arbitrary code execution flaw. An attacker with All privileges to the Uptime/Synthetics feature could send a request that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary command... Read more

    Affected Products : kibana
    • Published: May. 04, 2023
    • Modified: Jan. 29, 2025
  • 9.9

    CRITICAL
    CVE-2023-25765

    In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code ... Read more

    Affected Products : email_extension
    • Published: Feb. 15, 2023
    • Modified: Mar. 19, 2025
  • 9.9

    CRITICAL
    CVE-2023-25616

    In some scenario, SAP Business Objects Business Intelligence Platform (CMC) - versions 420, 430, Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileg... Read more

    • Published: Mar. 14, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-35926

    Backstage is an open platform for building developer portals. The Backstage scaffolder-backend plugin uses a templating library that requires sandbox, as it by design allows for code injection. The library used for this sandbox so far has been `vm2`, but ... Read more

    Affected Products : backstage backstage
    • Published: Jun. 22, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-23857

    Due to missing authentication check, SAP NetWeaver AS for Java - version 7.50, allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized ... Read more

    • Published: Mar. 14, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2022-41267

    SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing ... Read more

    • Published: Dec. 13, 2022
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-34465

    XWiki Platform is a generic wiki platform. Starting in version 11.8-rc-1 and prior to versions 14.4.8, 14.10.6, and 15.2, `Mail.MailConfig` can be edited by any logged-in user by default. Consequently, they can change the mail obfuscation configuration an... Read more

    Affected Products : xwiki
    • Published: Jun. 23, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-34251

    Grav is a flat-file content management system. Versions prior to 1.7.42 are vulnerable to server side template injection. Remote code execution is possible by embedding malicious PHP code on the administrator screen by a user with page editing privileges.... Read more

    Affected Products : grav
    • Published: Jun. 14, 2023
    • Modified: Nov. 21, 2024
  • 9.9

    CRITICAL
    CVE-2023-41265

    An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attac... Read more

    Affected Products : qlik_sense
    • Actively Exploited
    • Published: Aug. 29, 2023
    • Modified: Nov. 29, 2024
  • 9.9

    CRITICAL
    CVE-2023-32713

    In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and includ... Read more

    Affected Products : splunk_app_for_stream
    • Published: Jun. 01, 2023
    • Modified: Nov. 21, 2024
Showing 20 of 293354 Results