Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.8

    CRITICAL
    CVE-2018-0608

    Buffer overflow in H2O version 2.2.4 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via unspecified vectors.... Read more

    Affected Products : h2o
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-0607

    SQL injection vulnerability in the Notifications application in the Cybozu Garoon 3.5.0 to 4.6.2 allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors.... Read more

    Affected Products : garoon
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2018-0606

    SQL injection vulnerability in the Pixelpost v1.7.3 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors.... Read more

    Affected Products : pixelpost
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2018-0605

    Cross-site scripting vulnerability in Pixelpost v1.7.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.... Read more

    Affected Products : pixelpost
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2018-0604

    Pixelpost v1.7.3 and earlier allows remote code execution via unspecified vectors.... Read more

    Affected Products : pixelpost
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2018-0603

    Cross-site scripting vulnerability in Site Reviews versions prior to 2.15.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.... Read more

    Affected Products : site_reviews
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2018-0602

    Cross-site scripting vulnerability in Email Subscribers & Newsletters versions prior to 3.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.... Read more

    Affected Products : email_subscribers_\&_newsletters
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2018-0601

    Untrusted search path vulnerability in axpdfium v0.01 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : axpdfium
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0600

    Untrusted search path vulnerability in the installer of PlayMemories Home for Windows ver.5.5.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : windows playmemories_home
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2018-0599

    Untrusted search path vulnerability in the installer of Visual C++ Redistributable allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : windows
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2018-0598

    Untrusted search path vulnerability in Self-extracting archive files created by IExpress bundled with Microsoft Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : windows
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0597

    Untrusted search path vulnerability in the installer of Visual Studio Code allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : visual_studio_code
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0596

    Untrusted search path vulnerability in the installer of Visual Studio Community allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : visual_studio_community
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0595

    Untrusted search path vulnerability in the installer of Skype for Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : windows skype
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0594

    Untrusted search path vulnerability in Skype for Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : windows skype
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0593

    Untrusted search path vulnerability in the installer of Microsoft OneDrive allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : onedrive
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0592

    Untrusted search path vulnerability in Microsoft OneDrive allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : onedrive
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2018-0591

    The KINEPASS App for Android Ver 3.1.1 and earlier, and for iOS Ver 3.1.2 and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.... Read more

    Affected Products : kinepass
    • Published: May. 14, 2018
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2018-0590

    Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to bypass access restriction to modify the other users profiles via unspecified vectors.... Read more

    • Published: May. 14, 2018
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2018-0589

    Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to bypass access restriction to add a new form in the 'Forms' page via unspecified vectors.... Read more

    • Published: May. 14, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293562 Results