Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.0

    HIGH
    CVE-2018-0625

    Aterm WG1200HP firmware Ver1.0.31 and earlier allows attacker with administrator rights to execute arbitrary OS commands via formSysCmd parameter.... Read more

    • Published: Jan. 09, 2019
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0624

    Untrusted search path vulnerability in Multiple Yayoi 17 Series products (Yayoi Kaikei 17 Series Ver.23.1.1 and earlier, Yayoi Aoiro Shinkoku 17 Ver.23.1.1 and earlier, Yayoi Kyuuyo 17 Ver.20.1.4 and earlier, Yayoi Kyuuyo Keisan 17 Ver.20.1.4 and earlier,... Read more

    • Published: Sep. 07, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0623

    Untrusted search path vulnerability in Multiple Yayoi 17 Series products (Yayoi Kaikei 17 Series Ver.23.1.1 and earlier, Yayoi Aoiro Shinkoku 17 Ver.23.1.1 and earlier, Yayoi Kyuuyo 17 Ver.20.1.4 and earlier, Yayoi Kyuuyo Keisan 17 Ver.20.1.4 and earlier,... Read more

    • Published: Sep. 07, 2018
    • Modified: Nov. 21, 2024
  • 7.4

    HIGH
    CVE-2018-0622

    The DHC Online Shop App for Android version 3.2.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.... Read more

    Affected Products : dhc_online_shop
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0621

    Untrusted search path vulnerability in LOGICOOL CONNECTION UTILITY SOFTWARE versions before 2.30.9 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : connection_utility_software
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0620

    Untrusted search path vulnerability in LOGICOOL Game Software versions before 8.87.116 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : game_software
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0619

    Untrusted search path vulnerability in the installer of Glarysoft Glary Utilities (Glary Utilities 5.99 and earlier and Glary Utilities Pro 5.99 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : glary_utilities
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 5.4

    MEDIUM
    CVE-2018-0618

    Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.... Read more

    Affected Products : debian_linux mailman
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-0617

    Directory traversal vulnerability in ChamaNet MemoCGI v2.1800 to v2.2200 allows remote attackers to read arbitrary files via unspecified vectors.... Read more

    Affected Products : memocgi
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2018-0614

    Cross-site scripting vulnerability in NEC Platforms Calsos CSDX and CSDJ series products (CSDX 1.37210411 and earlier, CSDX(P) 4.37210411 and earlier, CSDX(D) 3.37210411 and earlier, CSDX(S) 2.37210411 and earlier, CSDJ-B 01.03.00 and earlier, CSDJ-H 01.0... Read more

    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-0613

    NEC Platforms Calsos CSDX and CSDJ series products (CSDX 1.37210411 and earlier, CSDX(P) 4.37210411 and earlier, CSDX(D) 3.37210411 and earlier, CSDX(S) 2.37210411 and earlier, CSDJ-B 01.03.00 and earlier, CSDJ-H 01.03.00 and earlier, CSDJ-D 01.03.00 and ... Read more

    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2018-0612

    Cross-site scripting vulnerability in 5000 trillion yen converter v1.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.... Read more

    Affected Products : 5000_trillion_yen_converter
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.4

    HIGH
    CVE-2018-0611

    The ANA App for iOS version 4.0.22 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.... Read more

    Affected Products : ana
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2018-0610

    Local file inclusion vulnerability in Zenphoto 1.4.14 and earlier allows a remote attacker with an administrative privilege to execute arbitrary code or obtain sensitive information.... Read more

    Affected Products : zenphoto
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2018-0609

    Untrusted search path vulnerability in LINE for Windows versions before 5.8.0 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.... Read more

    Affected Products : line
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-0608

    Buffer overflow in H2O version 2.2.4 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via unspecified vectors.... Read more

    Affected Products : h2o
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-0607

    SQL injection vulnerability in the Notifications application in the Cybozu Garoon 3.5.0 to 4.6.2 allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors.... Read more

    Affected Products : garoon
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2018-0606

    SQL injection vulnerability in the Pixelpost v1.7.3 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors.... Read more

    Affected Products : pixelpost
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2018-0605

    Cross-site scripting vulnerability in Pixelpost v1.7.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.... Read more

    Affected Products : pixelpost
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2018-0604

    Pixelpost v1.7.3 and earlier allows remote code execution via unspecified vectors.... Read more

    Affected Products : pixelpost
    • Published: Jun. 26, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293577 Results