Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2025-1273

    A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the co... Read more

    Affected Products : revit
    • Published: Apr. 15, 2025
    • Modified: Aug. 19, 2025
  • 9.8

    CRITICAL
    CVE-2025-27071

    Memory corruption while processing specific files in Powerline Communication Firmware.... Read more

    • Published: Aug. 06, 2025
    • Modified: Aug. 19, 2025
  • 7.8

    HIGH
    CVE-2025-27076

    Memory corruption while processing simultaneous requests via escape path.... Read more

    • Published: Aug. 06, 2025
    • Modified: Aug. 19, 2025
  • 5.4

    MEDIUM
    CVE-2024-49785

    IBM watsonx.ai 1.1 through 2.0.3 and IBM watsonx.ai on Cloud Pak for Data 4.8 through 5.0.3 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended ... Read more

    • Published: Jan. 12, 2025
    • Modified: Aug. 19, 2025
  • 8.5

    HIGH
    CVE-2025-49797

    Multiple Brother driver installers for Windows contain a privilege escalation vulnerability. If exploited, an arbitrary program may be executed with the administrative privilege. As for the details of affected product names, model numbers, and versions, r... Read more

    Affected Products :
    • Published: Jun. 25, 2025
    • Modified: Aug. 19, 2025
  • 5.4

    MEDIUM
    CVE-2025-7867

    A vulnerability has been found in Portabilis i-Educar 2.9.0/2.10.0. This vulnerability affects unknown code of the file /intranet/agenda.php of the component Agenda Module. The manipulation of the argument novo_titulo/novo_descricao leads to cross site sc... Read more

    Affected Products : i-educar
    • Published: Jul. 20, 2025
    • Modified: Aug. 19, 2025
  • 0.0

    NA
    CVE-2025-38349

    In the Linux kernel, the following vulnerability has been resolved: eventpoll: don't decrement ep refcount while still holding the ep mutex Jann Horn points out that epoll is decrementing the ep refcount and then doing a mutex_unlock(&ep->mtx); af... Read more

    Affected Products : linux_kernel
    • Published: Jul. 18, 2025
    • Modified: Aug. 19, 2025
  • 4.8

    MEDIUM
    CVE-2025-8734

    A vulnerability has been found in GNU Bison up to 3.8.2. This impacts the function code_free of the file src/scan-code.c. The manipulation leads to double free. An attack has to be approached locally. The exploit has been disclosed to the public and may b... Read more

    Affected Products : bison
    • Published: Aug. 08, 2025
    • Modified: Aug. 19, 2025
  • 4.8

    MEDIUM
    CVE-2025-8733

    A flaw has been found in GNU Bison up to 3.8.2. This affects the function __obstack_vprintf_internal of the file obprintf.c. Executing manipulation can lead to reachable assertion. The attack requires local access. The exploit has been published and may b... Read more

    Affected Products : bison
    • Published: Aug. 08, 2025
    • Modified: Aug. 19, 2025
  • 10.0

    CRITICAL
    CVE-2024-3094

    Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which ... Read more

    Affected Products : xz
    • Published: Mar. 29, 2024
    • Modified: Aug. 19, 2025
  • 9.8

    CRITICAL
    CVE-2025-54948

    A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.... Read more

    Affected Products : apex_one
    • Actively Exploited
    • Published: Aug. 05, 2025
    • Modified: Aug. 19, 2025
  • 9.8

    CRITICAL
    CVE-2025-3277

    An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild... Read more

    Affected Products : sqlite
    • Published: Apr. 14, 2025
    • Modified: Aug. 18, 2025
  • 8.5

    HIGH
    CVE-2025-32992

    Thermo Fisher Scientific ePort through 3.0.0 has Incorrect Access Control.... Read more

    Affected Products :
    • Published: Aug. 18, 2025
    • Modified: Aug. 18, 2025
  • 7.8

    HIGH
    CVE-2024-9500

    A maliciously crafted DLL file when placed in temporary files and folders that are leveraged by the Autodesk Installer could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to insecure privilege management.... Read more

    Affected Products : installer
    • Published: Nov. 15, 2024
    • Modified: Aug. 18, 2025
  • 7.8

    HIGH
    CVE-2024-7995

    A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the VRED Design application. Exploitation of this vulnerability may lead to code execution.... Read more

    Affected Products : vred
    • Published: Nov. 05, 2024
    • Modified: Aug. 18, 2025
  • 5.5

    MEDIUM
    CVE-2024-11268

    A maliciously crafted PDF file, when parsed through Autodesk Revit, can force an Out-of-Bounds Read. A malicious actor can leverage this vulnerability to cause a crash or could lead to an arbitrary memory leak.... Read more

    Affected Products : revit
    • Published: Dec. 09, 2024
    • Modified: Aug. 18, 2025
  • 8.8

    HIGH
    CVE-2023-7298

    A maliciously crafted FBX file, when parsed through Autodesk FBX SDK, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of th... Read more

    Affected Products : fbx_software_development_kit
    • Published: Dec. 09, 2024
    • Modified: Aug. 18, 2025
  • 10.0

    CRITICAL
    CVE-2011-10019

    Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send ... Read more

    Affected Products :
    • Published: Aug. 13, 2025
    • Modified: Aug. 18, 2025
  • 6.5

    MEDIUM
    CVE-2025-5998

    The PPWP – Password Protect Pages WordPress plugin before version 1.9.11 allows to put the site content behind a password authorization, however users with subscriber or greater roles can view content via the REST API.... Read more

    Affected Products : password_protect_wordpress
    • Published: Aug. 14, 2025
    • Modified: Aug. 18, 2025
  • 0.0

    NA
    CVE-2023-32249

    In the Linux kernel, the following vulnerability has been resolved: ksmbd: not allow guest user on multichannel This patch return STATUS_NOT_SUPPORTED if binding session is guest.... Read more

    Affected Products : linux_kernel
    • Published: Aug. 16, 2025
    • Modified: Aug. 18, 2025
Showing 20 of 290983 Results