Latest CVE Feed
-
9.0
HIGHCVE-2025-9253
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RP_doSpecifySiteSurvey of the file /goform/RP_doSpecify... Read more
Affected Products : re6500_firmware re6300_firmware re9000_firmware re6250_firmware re6350_firmware re7000_firmware- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
9.1
CRITICALCVE-2025-9288
Improper Input Validation vulnerability in sha.js allows Input Data Manipulation.This issue affects sha.js: through 2.4.11.... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-9244
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. This vulnerability affects the function addStaticRoute of the file /goform/addStaticRoute. Suc... Read more
Affected Products : re6500_firmware re6300_firmware re9000_firmware re6250_firmware re6350_firmware re7000_firmware- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Injection
-
9.0
HIGHCVE-2025-9252
A weakness has been identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this vulnerability is the function DisablePasswordAlertRedirect of the file /goform/DisablePas... Read more
Affected Products : re6500_firmware re6300_firmware re9000_firmware re6250_firmware re6350_firmware re7000_firmware- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
9.0
HIGHCVE-2025-9251
A security flaw has been discovered in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function sta_wps_pin of the file /goform/sta_wps_pin. Performing manipulation of the ... Read more
Affected Products : re6500_firmware re6300_firmware re9000_firmware re6250_firmware re6350_firmware re7000_firmware- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2024-57154
Incorrect access control in dts-shop v0.0.1-SNAPSHOT allows attackers to bypass authentication via sending a crafted payload to /admin/auth/index.... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication
-
9.3
CRITICALCVE-2010-20059
FreeNAS 0.7.2 prior to revision 5543 includes an unauthenticated command‐execution backdoor in its web interface. The exec_raw.php script exposes a cmd parameter that is passed directly to the underlying shell without sanitation.... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2024-57491
Authentication Bypass vulnerability in jobx up to v1.0.1-RELEASE allows an attacker can exploit this vulnerability to access sensitive API without any token via the preHandle function.... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication
-
5.4
MEDIUMCVE-2025-1142
IBM Edge Application Manager 4.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.... Read more
Affected Products : edge_application_manager- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Server-Side Request Forgery
-
6.5
MEDIUMCVE-2025-36114
IBM QRadar SOAR Plugin App 1.0.0 through 5.6.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.... Read more
Affected Products : soar_qradar_plugin_app- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2025-50864
An Origin Validation Error in the elysia-cors library thru 1.3.0 allows attackers to bypass Cross-Origin Resource Sharing (CORS) restrictions. The library incorrectly validates the supplied origin by checking if it is a substring of any domain in the site... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Misconfiguration
-
8.7
HIGHCVE-2010-10014
Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-si... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
8.6
HIGHCVE-2011-10022
SPlayer version 3.7 and earlier is vulnerable to a stack-based buffer overflow when processing HTTP responses containing an overly long Content-Type header. The vulnerability occurs due to improper bounds checking on the header value, allowing an attacker... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
9.3
CRITICALCVE-2011-10026
Spreecommerce versions prior to 0.50.x contain a remote command execution vulnerability in the API's search functionality. Improper input sanitation allows attackers to inject arbitrary shell commands via the search[instance_eval] parameter, which is dyna... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Injection
-
8.7
HIGHCVE-2011-10028
The RealNetworks RealArcade platform includes an ActiveX control (InstallerDlg.dll, version 2.6.0.445) that exposes a method named Exec via the StubbyUtil.ProcessMgr COM object. This method allows remote attackers to execute arbitrary commands on a victim... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication
-
8.4
HIGHCVE-2011-10030
Foxit PDF Reader < 4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows untrusted PDF content to write arbitrary files anywhere on disk. By embedding a malicious PDF that calls this API, an attacker can drop executables or script... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Misconfiguration
-
8.4
HIGHCVE-2010-20010
Foxit PDF Reader before 4.2.0.0928 does not properly bound-check the /Title entry in the PDF Info dictionary. A specially crafted PDF with an overlong Title string can overflow a fixed-size stack buffer, corrupt the Structured Exception Handler (SEH) chai... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2024-50640
jeewx-boot 1.3 has an authentication bypass vulnerability in the preHandle function... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-20269
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, low-privileged, remote attacker to retrieve arbitrary files from the underlying file sy... Read more
- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Path Traversal
-
8.6
HIGHCVE-2025-28041
Incorrect access control in the doFilter function of itranswarp up to 2.19 allows attackers to access sensitive components without authentication.... Read more
Affected Products :- Published: Aug. 20, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication