Latest CVE Feed
-
7.5
HIGHCVE-2024-24455
An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sendin... Read more
Affected Products :- Published: Nov. 15, 2024
- Modified: Aug. 26, 2025
-
9.8
CRITICALCVE-2025-52581
An integer overflow vulnerability exists in the GDF parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted GDF file can lead to arbitrary code execution. An attacker can provide a malicious file to tr... Read more
Affected Products : libbiosig- Published: Aug. 25, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-53511
A heap-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious... Read more
Affected Products : libbiosig- Published: Aug. 25, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-57800
Audiobookshelf is an open-source self-hosted audiobook server. In versions 2.6.0 through 2.26.3, the application does not properly restrict redirect callback URLs during OIDC authentication. An attacker can craft a login link that causes Audiobookshelf to... Read more
Affected Products : audiobookshelf- Published: Aug. 22, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Authentication
-
7.4
HIGHCVE-2024-23342
The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA (Elliptic Curve Digital Signature Algorithm), EdDSA (Edwards-curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman). ... Read more
Affected Products : ecdsa- Published: Jan. 23, 2024
- Modified: Aug. 26, 2025
-
5.4
MEDIUMCVE-2025-54812
Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using HTMLLayout, logger names are not properly escaped when writing out to the HTML file. If untrusted data is used to retrieve the name of a logger, an attacker could theore... Read more
Affected Products : log4cxx- Published: Aug. 22, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-54813
Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using JSONLayout, not all payload bytes are properly escaped. If an attacker-supplied message contains certain non-printable characters, these will be passed along in the messa... Read more
Affected Products : log4cxx- Published: Aug. 22, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2024-24454
An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a craf... Read more
Affected Products :- Published: Nov. 15, 2024
- Modified: Aug. 26, 2025
-
7.5
HIGHCVE-2024-24453
An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connec... Read more
Affected Products :- Published: Nov. 15, 2024
- Modified: Aug. 26, 2025
-
8.8
HIGHCVE-2024-23973
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HTTP GET req... Read more
Affected Products : gecko_os- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2024-23971
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handlin... Read more
- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2024-23970
This vulnerability allows network-adjacent attackers to compromise transport security on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ... Read more
- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Cryptography
-
8.8
HIGHCVE-2024-23969
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the wlanchn... Read more
- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2024-23968
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SrvrToS... Read more
- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2024-23934
Sony XAV-AX5500 WMV/ASF Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. User interaction is required to exp... Read more
Affected Products : xav-ax5500_firmware- Published: Sep. 23, 2024
- Modified: Aug. 26, 2025
-
6.8
MEDIUMCVE-2024-23933
Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not requ... Read more
Affected Products : xav-ax5500_firmware- Published: Sep. 23, 2024
- Modified: Aug. 26, 2025
-
6.5
MEDIUMCVE-2024-23930
This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Med... Read more
- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2024-23159
A maliciously crafted STP file, when parsed in stp_aim_x64_vc15d.dll through Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.... Read more
- Published: Jun. 25, 2024
- Modified: Aug. 26, 2025
-
7.8
HIGHCVE-2024-23158
A maliciously crafted IGES file, when parsed in ASMImport229A.dll through Autodesk applications, can be used to cause a use-after-free vulnerability. A malicious actor can leverage this vulnerability to cause a crash or execute arbitrary code in the conte... Read more
- Published: Jun. 25, 2024
- Modified: Aug. 26, 2025
-
8.8
HIGHCVE-2024-23157
A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, along with other vulnerabilities, can lead to code execut... Read more
- Published: Jun. 25, 2024
- Modified: Aug. 26, 2025