Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2024-5293

    D-Link DIR-2640 HTTP Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640-US routers. Authentication is not req... Read more

    Affected Products : dir-2640_firmware dir-2640
    • Published: May. 23, 2024
    • Modified: Aug. 06, 2025
  • 6.5

    MEDIUM
    CVE-2024-5294

    D-Link DIR-3040 prog.cgi websSecurityHandler Memory Leak Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of D-Link DIR-3040 routers. Authentication is ... Read more

    Affected Products : dir-3040_firmware dir-3040
    • Published: May. 23, 2024
    • Modified: Aug. 06, 2025
  • 9.8

    CRITICAL
    CVE-2024-5296

    D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerabi... Read more

    Affected Products : d-view_8
    • Published: May. 23, 2024
    • Modified: Aug. 06, 2025
  • 8.8

    HIGH
    CVE-2024-5297

    D-Link D-View executeWmicCmd Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Although authentication is required to exploit this vulner... Read more

    Affected Products : d-view_8
    • Published: May. 23, 2024
    • Modified: Aug. 06, 2025
  • 8.8

    HIGH
    CVE-2024-5298

    D-Link D-View queryDeviceCustomMonitorResult Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Although authentication is required... Read more

    Affected Products : d-view_8
    • Published: May. 23, 2024
    • Modified: Aug. 06, 2025
  • 8.8

    HIGH
    CVE-2024-5299

    D-Link D-View execMonitorScript Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Although authentication is required to exploit t... Read more

    Affected Products : d-view_8
    • Published: May. 23, 2024
    • Modified: Aug. 06, 2025
  • 8.8

    HIGH
    CVE-2023-27332

    TP-Link Archer AX21 tdpServer Logging Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer AX21 routers. Authentication ... Read more

    Affected Products : archer_ax21_firmware archer_ax21
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 6.8

    MEDIUM
    CVE-2023-27333

    TP-Link Archer AX21 tmpServer Command 0x422 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer AX21 routers. Authentic... Read more

    Affected Products : archer_ax21_firmware archer_ax21
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 8.8

    HIGH
    CVE-2023-27346

    TP-Link AX1800 Firmware Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AX1800 routers. Authentication is not requ... Read more

    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 9.8

    CRITICAL
    CVE-2023-27359

    TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vul... Read more

    Affected Products : archer_ax21_firmware archer_ax21
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 6.8

    MEDIUM
    CVE-2023-32147

    D-Link DIR-2640 LocalIPAddress Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640 routers. Although authentication is required ... Read more

    Affected Products : dir-2640_firmware dir-2640
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 6.5

    MEDIUM
    CVE-2023-32148

    D-Link DIR-2640 HNAP PrivateLogin Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-2640 routers. Authentication is not required to exploit this vulne... Read more

    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 9.8

    CRITICAL
    CVE-2024-2048

    Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as trusted certificate. In this configuration, an attacker may be able to craft a malicious certifica... Read more

    Affected Products : vault
    • Published: Mar. 04, 2024
    • Modified: Aug. 06, 2025
  • 8.8

    HIGH
    CVE-2023-32149

    D-Link DIR-2640 prog.cgi Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640 routers. Authentication ... Read more

    Affected Products : dir-2640_firmware dir-2640
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 6.8

    MEDIUM
    CVE-2023-32150

    D-Link DIR-2640 PrefixLen Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640 routers. Although authentication is required to ex... Read more

    Affected Products : dir-2640_firmware dir-2640
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 6.8

    MEDIUM
    CVE-2023-32151

    D-Link DIR-2640 DestNetwork Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640 routers. Although authentication is required to ... Read more

    Affected Products : dir-2640_firmware dir-2640
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 6.5

    MEDIUM
    CVE-2023-32152

    D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-2640 routers. Authentication is not required to exploit this vuln... Read more

    Affected Products : dir-2640_firmware dir-2640
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 6.8

    MEDIUM
    CVE-2023-32153

    D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640 routers. Although authentication is required to ex... Read more

    Affected Products : dir-2640_firmware dir-2640
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 3.3

    LOW
    CVE-2023-51612

    Kofax Power PDF JP2 File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this v... Read more

    Affected Products : kofax_power_pdf power_pdf
    • Published: May. 03, 2024
    • Modified: Aug. 06, 2025
  • 6.9

    MEDIUM
    CVE-2013-10062

    A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST paramete... Read more

    Affected Products :
    • Published: Aug. 01, 2025
    • Modified: Aug. 06, 2025
    • Vuln Type: Path Traversal
Showing 20 of 291601 Results