Latest CVE Feed
-
7.1
HIGHCVE-2024-38572
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() Currently, there is no terminator entry for ath12k_qmi_msg_handlers hence facing below KASAN warning, ===================... Read more
Affected Products : linux_kernel- Published: Jun. 19, 2024
- Modified: Sep. 17, 2025
-
5.5
MEDIUMCVE-2024-38566
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix verifier assumptions about socket->sk The verifier assumes that 'sk' field in 'struct socket' is valid and non-NULL when 'socket' pointer itself is trusted and non-NULL. That m... Read more
Affected Products : linux_kernel- Published: Jun. 19, 2024
- Modified: Sep. 17, 2025
-
7.8
HIGHCVE-2024-36963
In the Linux kernel, the following vulnerability has been resolved: tracefs: Reset permissions on remount if permissions are options There's an inconsistency with the way permissions are handled in tracefs. Because the permissions are generated when acc... Read more
Affected Products : linux_kernel- Published: Jun. 03, 2024
- Modified: Sep. 17, 2025
-
5.6
MEDIUMCVE-2025-57569
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the portList parameter in /goform/setNAT.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Injection
-
5.6
MEDIUMCVE-2025-57570
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the QosList parameter in goform/setQoS.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
5.6
MEDIUMCVE-2025-57571
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow. via the macFilterList parameter in goform/setNAT.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
5.6
MEDIUMCVE-2025-57572
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the onlineList parameter in goform/setParentControl.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
5.6
MEDIUMCVE-2025-57573
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the wifiTimeClose parameter in goform/setWifi.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-58447
rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sendin... Read more
Affected Products : rathena- Published: Sep. 09, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-58448
rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 0d89ae0 have a SQL Injection in the PartyBooking component via `WorldName` parameter. Commit 0d89ae0 fixes the issue.... Read more
Affected Products : rathena- Published: Sep. 09, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Injection
-
9.1
CRITICALCVE-2025-58750
rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 0cc348b are missing a bound check in `chclif_parse_moveCharSlot` that can result in reading and writing out of bounds using i... Read more
Affected Products : rathena- Published: Sep. 09, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-59139
Hono is a Web application framework that provides support for any JavaScript runtime. In versions prior to 4.9.7, a flaw in the `bodyLimit` middleware could allow bypassing the configured request body size limit when conflicting HTTP headers were present.... Read more
Affected Products : hono- Published: Sep. 12, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-58362
Hono is a Web application framework that provides support for any JavaScript runtime. Versions 4.8.0 through 4.9.5 contain a flaw in the getPath utility function which could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx locatio... Read more
Affected Products : hono- Published: Sep. 05, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Path Traversal
-
5.9
MEDIUMCVE-2024-48913
Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request ... Read more
Affected Products : hono- Published: Oct. 15, 2024
- Modified: Sep. 17, 2025
-
5.0
MEDIUMCVE-2024-43787
Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a res... Read more
Affected Products : hono- Published: Aug. 22, 2024
- Modified: Sep. 17, 2025
-
5.3
MEDIUMCVE-2024-32869
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected... Read more
Affected Products : hono- Published: Apr. 23, 2024
- Modified: Sep. 17, 2025
-
7.5
HIGHCVE-2024-32652
The adapter @hono/node-server allows you to run your Hono application on Node.js. Prior to 1.10.1, the application hangs when receiving a Host header with a value that `@hono/node-server` can't handle well. Invalid values are those that cannot be parsed b... Read more
Affected Products : node-server- Published: Apr. 19, 2024
- Modified: Sep. 17, 2025
-
7.5
HIGHCVE-2025-56404
An issue was discovered in MariaDB MCP 0.1.0 allowing attackers to gain sensitive information via the SSE service as the SSE service lacks user validation.... Read more
Affected Products : model_context_protocol- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2025-56405
An issue was discovered in litmusautomation litmus-mcp-server thru 0.0.1 allowing unauthorized attackers to control the target's MCP service through the SSE protocol.... Read more
Affected Products : mcp_server- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Authentication
-
8.6
HIGHCVE-2024-25713
yyjson through 0.8.0 has a double free, leading to remote code execution in some cases, because the pool_free function lacks loop checks. (pool_free is part of the pool series allocator, along with pool_malloc and pool_realloc.)... Read more
- Published: Feb. 29, 2024
- Modified: Sep. 17, 2025