Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.0

    MEDIUM
    CVE-2024-43090

    In multiple locations, there is a possible cross-user image read due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.... Read more

    Affected Products : android
    • Published: Nov. 13, 2024
    • Modified: Aug. 26, 2025
  • 6.8

    MEDIUM
    CVE-2024-0032

    In multiple locations, there is a possible way to request access to directories that should be hidden due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for ... Read more

    Affected Products : android
    • EPSS Score: %0.02
    • Published: Feb. 16, 2024
    • Modified: Aug. 26, 2025
  • 7.5

    HIGH
    CVE-2024-24459

    An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted p... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 7.5

    HIGH
    CVE-2024-24458

    An invalid memory access when handling the ENB Configuration Transfer messages containing invalid PLMN Identities in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections ... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 7.5

    HIGH
    CVE-2024-24457

    An invalid memory access when handling the ProtocolIE_ID field of E-RAB Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and send... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 7.5

    HIGH
    CVE-2024-24455

    An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sendin... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 9.8

    CRITICAL
    CVE-2025-52581

    An integer overflow vulnerability exists in the GDF parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted GDF file can lead to arbitrary code execution. An attacker can provide a malicious file to tr... Read more

    Affected Products : libbiosig
    • Published: Aug. 25, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 9.8

    CRITICAL
    CVE-2025-53511

    A heap-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious... Read more

    Affected Products : libbiosig
    • Published: Aug. 25, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2025-57800

    Audiobookshelf is an open-source self-hosted audiobook server. In versions 2.6.0 through 2.26.3, the application does not properly restrict redirect callback URLs during OIDC authentication. An attacker can craft a login link that causes Audiobookshelf to... Read more

    Affected Products : audiobookshelf
    • Published: Aug. 22, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Authentication
  • 7.4

    HIGH
    CVE-2024-23342

    The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA (Elliptic Curve Digital Signature Algorithm), EdDSA (Edwards-curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman). ... Read more

    Affected Products : ecdsa
    • EPSS Score: %0.62
    • Published: Jan. 23, 2024
    • Modified: Aug. 26, 2025
  • 5.4

    MEDIUM
    CVE-2025-54812

    Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using HTMLLayout, logger names are not properly escaped when writing out to the HTML file. If untrusted data is used to retrieve the name of a logger, an attacker could theore... Read more

    Affected Products : log4cxx
    • Published: Aug. 22, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Cross-Site Scripting
  • 7.5

    HIGH
    CVE-2025-54813

    Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using JSONLayout, not all payload bytes are properly escaped. If an attacker-supplied message contains certain non-printable characters, these will be passed along in the messa... Read more

    Affected Products : log4cxx
    • Published: Aug. 22, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Information Disclosure
  • 7.5

    HIGH
    CVE-2024-24454

    An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a craf... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 7.5

    HIGH
    CVE-2024-24453

    An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connec... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 8.8

    HIGH
    CVE-2024-23973

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.  The specific flaw exists within the handling of HTTP GET req... Read more

    Affected Products : gecko_os
    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2024-23971

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handlin... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Authentication
  • 6.5

    MEDIUM
    CVE-2024-23970

    This vulnerability allows network-adjacent attackers to compromise transport security on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Cryptography
  • 8.8

    HIGH
    CVE-2024-23969

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the wlanchn... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2024-23968

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SrvrToS... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2024-23934

    Sony XAV-AX5500 WMV/ASF Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. User interaction is required to exp... Read more

    Affected Products : xav-ax5500_firmware
    • Published: Sep. 23, 2024
    • Modified: Aug. 26, 2025
Showing 20 of 292228 Results