Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2025-0786

    A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The... Read more

    Affected Products : cdg
    • Published: Jan. 28, 2025
    • Modified: May. 16, 2025
    • Vuln Type: Injection
  • 6.1

    MEDIUM
    CVE-2025-0785

    A vulnerability was found in ESAFENET CDG V5 and classified as problematic. This issue affects some unknown processing of the file /SysConfig.jsp. The manipulation of the argument help leads to cross site scripting. The attack may be initiated remotely. T... Read more

    Affected Products : cdg
    • Published: Jan. 28, 2025
    • Modified: May. 16, 2025
    • Vuln Type: Cross-Site Scripting
  • 4.8

    MEDIUM
    CVE-2024-57514

    The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and execute... Read more

    Affected Products :
    • Published: Jan. 28, 2025
    • Modified: Jan. 29, 2025
    • Vuln Type: Cross-Site Scripting
  • 8.8

    HIGH
    CVE-2024-57376

    Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution.... Read more

    • Published: Jan. 28, 2025
    • Modified: Jul. 01, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2024-55968

    An issue was discovered in DTEX DEC-M (DTEX Forwarder) 6.1.1. The com.dtexsystems.helper service, responsible for handling privileged operations within the macOS DTEX Event Forwarder agent, fails to implement critical client validation during XPC interpro... Read more

    Affected Products :
    • Published: Jan. 28, 2025
    • Modified: Mar. 24, 2025
    • Vuln Type: Authorization
  • 5.5

    MEDIUM
    CVE-2024-29869

    Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the directory can read the sensitive information written i... Read more

    Affected Products : hive
    • Published: Jan. 28, 2025
    • Modified: Jul. 15, 2025
    • Vuln Type: Misconfiguration
  • 6.7

    MEDIUM
    CVE-2025-24826

    Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 4625.... Read more

    Affected Products : snap_deploy
    • Published: Jan. 28, 2025
    • Modified: Jan. 28, 2025
    • Vuln Type: Authorization
  • 7.0

    HIGH
    CVE-2025-24482

    A Local Code Injection Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect default permissions and allows for DLLs to be executed with higher level permissions.... Read more

    Affected Products : factorytalk_view
    • Published: Jan. 28, 2025
    • Modified: Jan. 28, 2025
    • Vuln Type: Injection
  • 7.0

    HIGH
    CVE-2025-24481

    An Incorrect Permission Assignment Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect permissions being assigned to the remote debugger port and can allow for unauthenticated access to the system configurat... Read more

    Affected Products : factorytalk_view
    • Published: Jan. 28, 2025
    • Modified: Jan. 28, 2025
    • Vuln Type: Misconfiguration
  • 6.3

    MEDIUM
    CVE-2025-0784

    A vulnerability has been found in Intelbras InControl up to 2.21.58 and classified as problematic. This vulnerability affects unknown code of the file /v1/usuario/ of the component Registered User Handler. The manipulation leads to cleartext transmission ... Read more

    Affected Products : incontrol_web
    • Published: Jan. 28, 2025
    • Modified: Aug. 20, 2025
    • Vuln Type: Cryptography
  • 8.4

    HIGH
    CVE-2024-40677

    In shouldSkipForInitialSUW of AdvancedPowerUsageDetail.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. Us... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Apr. 22, 2025
    • Vuln Type: Authorization
  • 7.7

    HIGH
    CVE-2024-40676

    In checkKeyIntent of AccountManagerService.java, there is a possible way to bypass intent security check and install an unknown app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. ... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Apr. 22, 2025
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2024-40675

    In parseUriInternal of Intent.java, there is a possible infinite loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Apr. 22, 2025
    • Vuln Type: Denial of Service
  • 5.3

    MEDIUM
    CVE-2024-40674

    In validateSsid of WifiConfigurationUtil.java, there is a possible way to overflow a system configuration file due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Apr. 22, 2025
    • Vuln Type: Denial of Service
  • 6.5

    MEDIUM
    CVE-2024-40673

    In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. Us... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Apr. 18, 2025
    • Vuln Type: Injection
  • 8.4

    HIGH
    CVE-2024-40672

    In onCreate of ChooserActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not ne... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Apr. 18, 2025
    • Vuln Type: Authorization
  • 8.4

    HIGH
    CVE-2024-40670

    In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Jun. 27, 2025
    • Vuln Type: Race Condition
  • 8.4

    HIGH
    CVE-2024-40669

    In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Jun. 27, 2025
    • Vuln Type: Race Condition
  • 8.4

    HIGH
    CVE-2024-40651

    In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Jun. 27, 2025
    • Vuln Type: Memory Corruption
  • 8.4

    HIGH
    CVE-2024-40649

    In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more

    Affected Products : android
    • Published: Jan. 28, 2025
    • Modified: Jun. 27, 2025
    • Vuln Type: Memory Corruption
Showing 20 of 291219 Results