Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2024-24455

    An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sendin... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 9.8

    CRITICAL
    CVE-2025-52581

    An integer overflow vulnerability exists in the GDF parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted GDF file can lead to arbitrary code execution. An attacker can provide a malicious file to tr... Read more

    Affected Products : libbiosig
    • Published: Aug. 25, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 9.8

    CRITICAL
    CVE-2025-53511

    A heap-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious... Read more

    Affected Products : libbiosig
    • Published: Aug. 25, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2025-57800

    Audiobookshelf is an open-source self-hosted audiobook server. In versions 2.6.0 through 2.26.3, the application does not properly restrict redirect callback URLs during OIDC authentication. An attacker can craft a login link that causes Audiobookshelf to... Read more

    Affected Products : audiobookshelf
    • Published: Aug. 22, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Authentication
  • 7.4

    HIGH
    CVE-2024-23342

    The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA (Elliptic Curve Digital Signature Algorithm), EdDSA (Edwards-curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman). ... Read more

    Affected Products : ecdsa
    • Published: Jan. 23, 2024
    • Modified: Aug. 26, 2025
  • 5.4

    MEDIUM
    CVE-2025-54812

    Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using HTMLLayout, logger names are not properly escaped when writing out to the HTML file. If untrusted data is used to retrieve the name of a logger, an attacker could theore... Read more

    Affected Products : log4cxx
    • Published: Aug. 22, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Cross-Site Scripting
  • 7.5

    HIGH
    CVE-2025-54813

    Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using JSONLayout, not all payload bytes are properly escaped. If an attacker-supplied message contains certain non-printable characters, these will be passed along in the messa... Read more

    Affected Products : log4cxx
    • Published: Aug. 22, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Information Disclosure
  • 7.5

    HIGH
    CVE-2024-24454

    An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a craf... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 7.5

    HIGH
    CVE-2024-24453

    An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connec... Read more

    Affected Products :
    • Published: Nov. 15, 2024
    • Modified: Aug. 26, 2025
  • 8.8

    HIGH
    CVE-2024-23973

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication is not required to exploit this vulnerability.  The specific flaw exists within the handling of HTTP GET req... Read more

    Affected Products : gecko_os
    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2024-23971

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handlin... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Authentication
  • 6.5

    MEDIUM
    CVE-2024-23970

    This vulnerability allows network-adjacent attackers to compromise transport security on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Cryptography
  • 8.8

    HIGH
    CVE-2024-23969

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the wlanchn... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2024-23968

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SrvrToS... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2024-23934

    Sony XAV-AX5500 WMV/ASF Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. User interaction is required to exp... Read more

    Affected Products : xav-ax5500_firmware
    • Published: Sep. 23, 2024
    • Modified: Aug. 26, 2025
  • 6.8

    MEDIUM
    CVE-2024-23933

    Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Sony XAV-AX5500 devices. Authentication is not requ... Read more

    Affected Products : xav-ax5500_firmware
    • Published: Sep. 23, 2024
    • Modified: Aug. 26, 2025
  • 6.5

    MEDIUM
    CVE-2024-23930

    This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Med... Read more

    • Published: Jan. 31, 2025
    • Modified: Aug. 26, 2025
    • Vuln Type: Denial of Service
  • 8.8

    HIGH
    CVE-2024-23159

    A maliciously crafted STP file, when parsed in stp_aim_x64_vc15d.dll through Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.... Read more

    • Published: Jun. 25, 2024
    • Modified: Aug. 26, 2025
  • 7.8

    HIGH
    CVE-2024-23158

    A maliciously crafted IGES file, when parsed in ASMImport229A.dll through Autodesk applications, can be used to cause a use-after-free vulnerability. A malicious actor can leverage this vulnerability to cause a crash or execute arbitrary code in the conte... Read more

    • Published: Jun. 25, 2024
    • Modified: Aug. 26, 2025
  • 8.8

    HIGH
    CVE-2024-23157

    A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, along with other vulnerabilities, can lead to code execut... Read more

    • Published: Jun. 25, 2024
    • Modified: Aug. 26, 2025
Showing 20 of 293334 Results