Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.4

    MEDIUM
    CVE-2024-5074

    The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin... Read more

    Affected Products : wp_emember
    • Published: Jul. 13, 2024
    • Modified: May. 02, 2025
  • 7.6

    HIGH
    CVE-2006-5175

    Cross-site request forgery (CSRF) vulnerability in the administrative interface for the TeraStation HD-HTGL firmware 2.05 beta 1 and earlier allows remote attackers to modify configurations or delete arbitrary data via unspecified vectors.... Read more

    • EPSS Score: %0.30
    • Published: Oct. 10, 2006
    • Modified: May. 02, 2025
  • 9.8

    CRITICAL
    CVE-2024-48510

    Directory Traversal vulnerability in DotNetZip v.1.16.0 and before allows a remote attacker to execute arbitrary code via the src/Zip.Shared/ZipEntry.Extract.cs component NOTE: This vulnerability only affects products that are no longer supported by the m... Read more

    Affected Products : dotnetzip.semverd prodotnetzip
    • Published: Nov. 13, 2024
    • Modified: May. 02, 2025
  • 8.8

    HIGH
    CVE-2023-33265

    In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, executor services don't check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.... Read more

    Affected Products : hazelcast imdg
    • EPSS Score: %0.17
    • Published: Jul. 18, 2023
    • Modified: May. 02, 2025
  • 0.0

    NA
    CVE-2025-39989

    In the Linux kernel, the following vulnerability has been resolved: x86/mce: use is_copy_from_user() to determine copy-from-user context Patch series "mm/hwpoison: Fix regressions in memory failure handling", v4. ## 1. What am I trying to do: This pat... Read more

    Affected Products : linux_kernel
    • Published: Apr. 18, 2025
    • Modified: May. 02, 2025
  • 7.8

    HIGH
    CVE-2025-37838

    In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip... Read more

    Affected Products : linux_kernel
    • Published: Apr. 18, 2025
    • Modified: May. 02, 2025
  • 7.1

    HIGH
    CVE-2025-37785

    In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later o... Read more

    Affected Products : linux_kernel
    • Published: Apr. 18, 2025
    • Modified: May. 02, 2025
  • 0.0

    NA
    CVE-2025-22120

    In the Linux kernel, the following vulnerability has been resolved: ext4: goto right label 'out_mmap_sem' in ext4_setattr() Otherwise, if ext4_inode_attach_jinode() fails, a hung task will happen because filemap_invalidate_unlock() isn't called to unloc... Read more

    Affected Products : linux_kernel
    • Published: Apr. 16, 2025
    • Modified: May. 02, 2025
  • 0.0

    NA
    CVE-2025-22028

    In the Linux kernel, the following vulnerability has been resolved: media: vimc: skip .s_stream() for stopped entities Syzbot reported [1] a warning prompted by a check in call_s_stream() that checks whether .s_stream() operation is warranted for unstar... Read more

    Affected Products : linux_kernel
    • Published: Apr. 16, 2025
    • Modified: May. 02, 2025
  • 0.0

    NA
    CVE-2025-22013

    In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state There are several problems with the way hyp code lazily saves the host's FPSIMD/SVE state, including: * Host SVE being ... Read more

    Affected Products : linux_kernel
    • Published: Apr. 08, 2025
    • Modified: May. 02, 2025
  • 5.5

    MEDIUM
    CVE-2025-21853

    In the Linux kernel, the following vulnerability has been resolved: bpf: avoid holding freeze_mutex during mmap operation We use map->freeze_mutex to prevent races between map_freeze() and memory mapping BPF map contents with writable permissions. The w... Read more

    Affected Products : linux_kernel
    • Published: Mar. 12, 2025
    • Modified: May. 02, 2025
  • 5.5

    MEDIUM
    CVE-2025-21681

    In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix lockup on tx to unregistering netdev with carrier Commit in a fixes tag attempted to fix the issue in the following sequence of calls: do_output -> ovs_vport_s... Read more

    Affected Products : linux_kernel
    • Published: Jan. 31, 2025
    • Modified: May. 02, 2025
  • 5.5

    MEDIUM
    CVE-2024-56751

    In the Linux kernel, the following vulnerability has been resolved: ipv6: release nexthop on device removal The CI is hitting some aperiodic hangup at device removal time in the pmtu.sh self-test: unregister_netdevice: waiting for veth_A-R1 to become f... Read more

    Affected Products : linux_kernel
    • Published: Dec. 29, 2024
    • Modified: May. 02, 2025
  • 7.8

    HIGH
    CVE-2024-56658

    In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-after-free in dst_destroy [1] Issue is in xfrm6_net_init() and xfrm4_net_init() : They copy xfrm[46]_dst... Read more

    Affected Products : linux_kernel
    • Published: Dec. 27, 2024
    • Modified: May. 02, 2025
  • 0.0

    NA
    CVE-2024-56609

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb When removing kernel modules by: rmmod rtw88_8723cs rtw88_8703b rtw88_8723x rtw88_sdio rtw88_core Driver uses skb_queue_p... Read more

    Affected Products : linux_kernel
    • Published: Dec. 27, 2024
    • Modified: May. 02, 2025
  • 7.8

    HIGH
    CVE-2024-56608

    In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' An issue was identified in the dcn21_link_encoder_create function where an out-of-bounds access could occur when... Read more

    Affected Products : linux_kernel
    • Published: Dec. 27, 2024
    • Modified: May. 02, 2025
  • 5.5

    MEDIUM
    CVE-2024-56599

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: avoid NULL pointer error during sdio remove When running 'rmmod ath10k', ath10k_sdio_remove() will free sdio workqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_D... Read more

    Affected Products : linux_kernel
    • Published: Dec. 27, 2024
    • Modified: May. 02, 2025
  • 7.8

    HIGH
    CVE-2024-56551

    In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000027] Read of size 8 at addr ffff8881b8605f... Read more

    Affected Products : linux_kernel
    • Published: Dec. 27, 2024
    • Modified: May. 02, 2025
  • 7.8

    HIGH
    CVE-2024-54458

    In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent potent... Read more

    Affected Products : linux_kernel
    • Published: Feb. 27, 2025
    • Modified: May. 02, 2025
  • 7.8

    HIGH
    CVE-2024-53185

    In the Linux kernel, the following vulnerability has been resolved: smb: client: fix NULL ptr deref in crypto_aead_setkey() Neither SMB3.0 or SMB3.02 supports encryption negotiate context, so when SMB2_GLOBAL_CAP_ENCRYPTION flag is set in the negotiate ... Read more

    Affected Products : linux_kernel
    • Published: Dec. 27, 2024
    • Modified: May. 02, 2025
Showing 20 of 291058 Results