Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2018-1000074

    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in ow... Read more

    Affected Products : rubygems bundler
    • Published: Mar. 13, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-1000073

    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location... Read more

    Affected Products : rubygems bundler
    • Published: Mar. 13, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-1000072

    iRedMail version prior to commit f04b8ef contains a Insecure Permissions vulnerability in Roundcube Webmail that can result in Exfiltrate a user's password protected secret GPG key file and other important configuration files.. This attack appear to be ex... Read more

    Affected Products : roundcube_webmail iredmail
    • Published: Mar. 13, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-1000071

    roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.... Read more

    Affected Products : webmail roundcube_webmail
    • Published: Mar. 13, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-1000070

    Bitmessage PyBitmessage version v0.6.2 (and introduced in or after commit 8ce72d8d2d25973b7064b1cf76a6b0b3d62f0ba0) contains a Eval injection vulnerability in main program, file src/messagetypes/__init__.py function constructObject that can result in Code... Read more

    Affected Products : pybitmessage
    • Published: Mar. 13, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2018-1000069

    FreePlane version 1.5.9 and earlier contains a XML External Entity (XXE) vulnerability in XML Parser in mindmap loader that can result in stealing data from victim's machine. This attack appears to require the victim to open a specially crafted mind map f... Read more

    Affected Products : debian_linux freeplane
    • Published: Mar. 13, 2018
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2018-1000068

    An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenk... Read more

    • Published: Feb. 16, 2018
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2018-1000067

    An improper authorization vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to have Jenkins submit HTTP GET requests and get limited information about the response.... Read more

    • Published: Feb. 16, 2018
    • Modified: Nov. 21, 2024
  • 4.4

    MEDIUM
    CVE-2018-1000062

    WonderCMS version 2.4.0 contains a Stored Cross-Site Scripting on File Upload through SVG vulnerability in uploadFileAction(), 'svg' => 'image/svg+xml' that can result in An attacker can execute arbitrary script on an unsuspecting user's browser. This att... Read more

    Affected Products : wondercms
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-1000060

    Sensu, Inc. Sensu Core version Before 1.2.0 & before commit 46ff10023e8cbf1b6978838f47c51b20b98fe30b contains a CWE-522 vulnerability in Sensu::Utilities.redact_sensitive() that can result in sensitive configuration data (e.g. passwords) may be logged in ... Read more

    Affected Products : sensu_core
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-1000059

    ValidFormBuilder version 4.5.4 contains a PHP Object Injection vulnerability in Valid Form unserialize method that can result in Possible to execute unauthorised system commands remotely and disclose file contents in file system.... Read more

    Affected Products : validform_builder
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-1000058

    Jenkins Pipeline: Supporting APIs Plugin 2.17 and earlier have an arbitrary code execution due to incomplete sandbox protection: Methods related to Java deserialization like readResolve implemented in Pipeline scripts were not subject to sandbox protectio... Read more

    Affected Products : pipeline_supporting_apis
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2018-1000057

    Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values diffe... Read more

    Affected Products : credentials_binding
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 8.3

    HIGH
    CVE-2018-1000056

    Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or ... Read more

    Affected Products : junit
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 8.3

    HIGH
    CVE-2018-1000055

    Jenkins Android Lint Plugin 2.5 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forger... Read more

    Affected Products : android_lint
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 8.3

    HIGH
    CVE-2018-1000054

    Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or den... Read more

    Affected Products : ccm
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-1000053

    LimeSurvey version 3.0.0-beta.3+17110 contains a Cross ite Request Forgery (CSRF) vulnerability in Theme Uninstallation that can result in CSRF causing LimeSurvey admins to delete all their themes, rendering the website unusable. This attack appear to be ... Read more

    Affected Products : limesurvey
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-1000052

    fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be ex... Read more

    Affected Products : fmt
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-1000051

    Artifex Mupdf version 1.12.0 contains a Use After Free vulnerability in fz_keep_key_storable that can result in DOS / Possible code execution. This attack appear to be exploitable via Victim opens a specially crafted PDF.... Read more

    Affected Products : debian_linux mupdf
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-1000050

    Sean Barrett stb_vorbis version 1.12 and earlier contains a Buffer Overflow vulnerability in All vorbis decoding paths. that can result in memory corruption, denial of service, comprised execution of host program. This attack appear to be exploitable via ... Read more

    Affected Products : stb_vorbis
    • Published: Feb. 09, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293646 Results