Latest CVE Feed
-
7.5
HIGHCVE-2024-45671
IBM Security Verify Information Queue 10.0.5, 10.0.6, 10.0.7, and 10.0.8 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Cryptography
-
7.8
HIGHCVE-2024-38586
In the Linux kernel, the following vulnerability has been resolved: r8169: Fix possible ring buffer corruption on fragmented Tx packets. An issue was found on the RTL8125b when transmitting small fragmented packets, whereby invalid entries were inserted... Read more
Affected Products : linux_kernel- Published: Jun. 19, 2024
- Modified: Sep. 17, 2025
-
7.1
HIGHCVE-2024-38585
In the Linux kernel, the following vulnerability has been resolved: tools/nolibc/stdlib: fix memory error in realloc() Pass user_p_len to memcpy() instead of heap->len to prevent realloc() from copying an extra sizeof(heap) bytes from beyond the allocat... Read more
Affected Products : linux_kernel- Published: Jun. 19, 2024
- Modified: Sep. 17, 2025
-
7.8
HIGHCVE-2024-38578
In the Linux kernel, the following vulnerability has been resolved: ecryptfs: Fix buffer size for tag 66 packet The 'TAG 66 Packet Format' description is missing the cipher code and checksum fields that are packed into the message packet. As a result, t... Read more
Affected Products : linux_kernel- Published: Jun. 19, 2024
- Modified: Sep. 17, 2025
-
7.1
HIGHCVE-2024-38572
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() Currently, there is no terminator entry for ath12k_qmi_msg_handlers hence facing below KASAN warning, ===================... Read more
Affected Products : linux_kernel- Published: Jun. 19, 2024
- Modified: Sep. 17, 2025
-
5.5
MEDIUMCVE-2024-38566
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix verifier assumptions about socket->sk The verifier assumes that 'sk' field in 'struct socket' is valid and non-NULL when 'socket' pointer itself is trusted and non-NULL. That m... Read more
Affected Products : linux_kernel- Published: Jun. 19, 2024
- Modified: Sep. 17, 2025
-
7.8
HIGHCVE-2024-36963
In the Linux kernel, the following vulnerability has been resolved: tracefs: Reset permissions on remount if permissions are options There's an inconsistency with the way permissions are handled in tracefs. Because the permissions are generated when acc... Read more
Affected Products : linux_kernel- Published: Jun. 03, 2024
- Modified: Sep. 17, 2025
-
5.6
MEDIUMCVE-2025-57569
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the portList parameter in /goform/setNAT.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Injection
-
5.6
MEDIUMCVE-2025-57570
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the QosList parameter in goform/setQoS.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
5.6
MEDIUMCVE-2025-57571
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow. via the macFilterList parameter in goform/setNAT.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
5.6
MEDIUMCVE-2025-57572
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the onlineList parameter in goform/setParentControl.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
5.6
MEDIUMCVE-2025-57573
Tenda F3 V12.01.01.48_multi and after is vulnerable to Buffer Overflow via the wifiTimeClose parameter in goform/setWifi.... Read more
- Published: Sep. 10, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-58447
rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sendin... Read more
Affected Products : rathena- Published: Sep. 09, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-58448
rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 0d89ae0 have a SQL Injection in the PartyBooking component via `WorldName` parameter. Commit 0d89ae0 fixes the issue.... Read more
Affected Products : rathena- Published: Sep. 09, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Injection
-
9.1
CRITICALCVE-2025-58750
rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 0cc348b are missing a bound check in `chclif_parse_moveCharSlot` that can result in reading and writing out of bounds using i... Read more
Affected Products : rathena- Published: Sep. 09, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-59139
Hono is a Web application framework that provides support for any JavaScript runtime. In versions prior to 4.9.7, a flaw in the `bodyLimit` middleware could allow bypassing the configured request body size limit when conflicting HTTP headers were present.... Read more
Affected Products : hono- Published: Sep. 12, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-58362
Hono is a Web application framework that provides support for any JavaScript runtime. Versions 4.8.0 through 4.9.5 contain a flaw in the getPath utility function which could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx locatio... Read more
Affected Products : hono- Published: Sep. 05, 2025
- Modified: Sep. 17, 2025
- Vuln Type: Path Traversal
-
5.9
MEDIUMCVE-2024-48913
Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request ... Read more
Affected Products : hono- Published: Oct. 15, 2024
- Modified: Sep. 17, 2025
-
5.0
MEDIUMCVE-2024-43787
Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a res... Read more
Affected Products : hono- Published: Aug. 22, 2024
- Modified: Sep. 17, 2025
-
5.3
MEDIUMCVE-2024-32869
Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected... Read more
Affected Products : hono- Published: Apr. 23, 2024
- Modified: Sep. 17, 2025