Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2024-32065

    A vulnerability has been identified in Simcenter Femap (All versions < V2406). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted IGS files. This could allow an attacker to execut... Read more

    • Published: May. 14, 2024
    • Modified: Aug. 20, 2025
  • 7.8

    HIGH
    CVE-2024-32066

    A vulnerability has been identified in Simcenter Femap (All versions < V2406). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted IGS files. This could allow an attacker to execut... Read more

    • Published: May. 14, 2024
    • Modified: Aug. 20, 2025
  • 7.8

    HIGH
    CVE-2025-40764

    A vulnerability has been identified in Simcenter Femap V2406 (All versions < V2406.0003), Simcenter Femap V2412 (All versions < V2412.0002). The affected applications contains an out of bounds read vulnerability while parsing specially crafted BMP files. ... Read more

    Affected Products : simcenter_femap
    • Published: Aug. 12, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2025-40762

    A vulnerability has been identified in Simcenter Femap V2406 (All versions < V2406.0003), Simcenter Femap V2412 (All versions < V2412.0002). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted STP file. ... Read more

    Affected Products : simcenter_femap
    • Published: Aug. 12, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Memory Corruption
  • 8.1

    HIGH
    CVE-2024-31853

    A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check the extended key usage attribute of that device's cer... Read more

    Affected Products : sicam_toolbox_ii
    • Published: Jul. 08, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Misconfiguration
  • 8.1

    HIGH
    CVE-2024-31854

    A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check device's certificate common name against an expected ... Read more

    Affected Products : sicam_toolbox_ii
    • Published: Jul. 08, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Misconfiguration
  • 5.3

    MEDIUM
    CVE-2025-9176

    A security flaw has been discovered in neurobin shc up to 4.0.3. Impacted is the function make of the file src/shc.c of the component Environment Variable Handler. The manipulation results in os command injection. The attack is only possible with local ac... Read more

    Affected Products :
    • Published: Aug. 20, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Injection
  • 5.3

    MEDIUM
    CVE-2025-9175

    A vulnerability was identified in neurobin shc up to 4.0.3. This issue affects the function make of the file src/shc.c. The manipulation leads to stack-based buffer overflow. The attack can only be performed from a local environment. The exploit is public... Read more

    Affected Products :
    • Published: Aug. 19, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Memory Corruption
  • 5.3

    MEDIUM
    CVE-2025-9174

    A vulnerability was determined in neurobin shc up to 4.0.3. This vulnerability affects the function make of the file src/shc.c of the component Filename Handler. Executing manipulation can lead to os command injection. The attack can only be executed loca... Read more

    Affected Products :
    • Published: Aug. 19, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Injection
  • 9.8

    CRITICAL
    CVE-2025-8042

    Firefox for Android allowed a sandboxed iframe without the `allow-downloads` attribute to start downloads. This vulnerability affects Firefox < 141.... Read more

    Affected Products : firefox
    • Published: Aug. 19, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Misconfiguration
  • 5.3

    MEDIUM
    CVE-2025-8041

    In the address bar, Firefox for Android truncated the display of URLs from the end instead of prioritizing the origin. This vulnerability affects Firefox < 141.... Read more

    Affected Products : firefox
    • Published: Aug. 19, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Information Disclosure
  • 6.5

    MEDIUM
    CVE-2025-7777

    The mirror-registry doesn't properly sanitize the host header HTTP header in HTTP request received, allowing an attacker to perform malicious redirects to attacker-controlled domains or phishing campaigns.... Read more

    Affected Products :
    • Published: Aug. 20, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Misconfiguration
  • 6.5

    MEDIUM
    CVE-2024-27239

    Use after free in some Zoom Workplace Apps and SDKs may allow an authenticated user to conduct a denial of service via network access.... Read more

    • Published: Feb. 25, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Denial of Service
  • 6.5

    MEDIUM
    CVE-2024-27245

    Buffer overflow in some Zoom Workplace Apps and SDKs may allow an authenticated user to conduct a denial of service via network access.... Read more

    • Published: Feb. 25, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Denial of Service
  • 6.5

    MEDIUM
    CVE-2024-27246

    Use after free in some Zoom Workplace Apps and SDKs may allow an authenticated user to conduct a denial of service via network access.... Read more

    • Published: Feb. 25, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Denial of Service
  • 5.3

    MEDIUM
    CVE-2024-40536

    Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 were discovered to contain a stack overflow via the pin_3g_code parameter in the config_3g_para function.... Read more

    • Published: Jul. 16, 2024
    • Modified: Aug. 20, 2025
  • 9.8

    CRITICAL
    CVE-2024-40535

    Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 was discovered to contain a stack overflow via the apn_name_3g parameter in the config_3g_para function.... Read more

    • Published: Jul. 16, 2024
    • Modified: Aug. 20, 2025
  • 7.5

    HIGH
    CVE-2024-27241

    Improper input validation in some Zoom Apps and SDKs may allow an authenticated user to conduct a denial of service via network access.... Read more

    • Published: Jul. 15, 2024
    • Modified: Aug. 20, 2025
  • 6.5

    MEDIUM
    CVE-2024-39181

    Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 was discovered to contain a buffer overflow via the ApCliSsid parameter in thegenerate_conf_router() function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POS... Read more

    • Published: Jul. 09, 2024
    • Modified: Aug. 20, 2025
  • 5.3

    MEDIUM
    CVE-2024-36402

    Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR before version 1.3.5 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to th... Read more

    Affected Products : matrix-media-repo
    • Published: Jan. 16, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Authorization
Showing 20 of 292238 Results