Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.5

    MEDIUM
    CVE-2025-51044

    phpgurukul Nipah virus (NiV) Testing Management System 1.0 contains a SQL injection vulnerability in the /new-user-testing.php file, due to insufficient validation of user input for the " govtissuedid" parameter.... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 07, 2025
  • 7.5

    HIGH
    CVE-2025-36071

    IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.2 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query due to improper release ... Read more

    Affected Products : db2
    • Published: Jul. 29, 2025
    • Modified: Aug. 07, 2025
  • 7.5

    HIGH
    CVE-2025-33114

    IBM Db2 for Linux 12.1.0, 12.1.1, and 12.1.2 is vulnerable to denial of service with a specially crafted query under certain non-default conditions.... Read more

    Affected Products : db2
    • Published: Jul. 29, 2025
    • Modified: Aug. 06, 2025
  • 7.8

    HIGH
    CVE-2025-33092

    IBM Db2 for Linux 12.1.0, 12.1.1, and 12.1.2 is vulnerable to a stack-based buffer overflow in db2fm, caused by improper bounds checking. A local user could overflow the buffer and execute arbitrary code on the system.... Read more

    Affected Products : db2
    • Published: Jul. 29, 2025
    • Modified: Aug. 06, 2025
  • 4.9

    MEDIUM
    CVE-2024-52894

    IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5.0.0 through 10.5.0.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.2 is vulnerable to a denial of service as the server may crash under certain conditions w... Read more

    Affected Products : db2
    • Published: Jul. 29, 2025
    • Modified: Aug. 07, 2025
  • 7.5

    HIGH
    CVE-2024-51473

    IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5.0.0 through 10.5.0.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.2 is vulnerable to a denial of service as the server may crash under certain conditions... Read more

    Affected Products : db2
    • Published: Jul. 29, 2025
    • Modified: Aug. 13, 2025
  • 7.5

    HIGH
    CVE-2024-49828

    IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5.0.0 through 10.5.0.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.2 is vulnerable to a denial of service as the server may crash under certain conditions w... Read more

    Affected Products : db2
    • Published: Jul. 29, 2025
    • Modified: Aug. 13, 2025
  • 8.8

    HIGH
    CVE-2024-42655

    An access control issue in NanoMQ v0.21.10 allows attackers to bypass security restrictions and access sensitive system topic messages using MQTT wildcard characters.... Read more

    Affected Products : nanomq
    • Published: Jul. 29, 2025
    • Modified: Aug. 06, 2025
  • 7.5

    HIGH
    CVE-2024-42651

    NanoMQ v0.17.9 was discovered to contain a heap use-after-free vulnerability via the component sub_Ctx_handle. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SUBSCRIBE message.... Read more

    Affected Products : nanomq
    • Published: Jul. 29, 2025
    • Modified: Aug. 06, 2025
  • 7.8

    HIGH
    CVE-2025-7675

    A maliciously crafted 3DM file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the cont... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 19, 2025
  • 7.8

    HIGH
    CVE-2025-7497

    A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the cont... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 19, 2025
  • 7.8

    HIGH
    CVE-2025-6637

    A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the cont... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 19, 2025
  • 7.8

    HIGH
    CVE-2025-6636

    A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of t... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 19, 2025
  • 7.8

    HIGH
    CVE-2025-6635

    A maliciously crafted PRT file, when linked or imported into certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in th... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 19, 2025
  • 7.8

    HIGH
    CVE-2025-6631

    A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the cont... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 19, 2025
  • 7.8

    HIGH
    CVE-2025-5043

    A maliciously crafted 3DM file, when linked or imported into certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in th... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 19, 2025
  • 7.8

    HIGH
    CVE-2025-5038

    A maliciously crafted X_T file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.... Read more

    • Published: Jul. 29, 2025
    • Modified: Aug. 19, 2025
  • 7.5

    HIGH
    CVE-2025-53715

    A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/Wan6to4TunnelCfgRpm.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result ... Read more

    Affected Products : tl-wr841n_firmware tl-wr841n
    • Published: Jul. 29, 2025
    • Modified: Aug. 01, 2025
  • 7.5

    HIGH
    CVE-2025-53714

    A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WzdWlanSiteSurveyRpm_AP.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and res... Read more

    Affected Products : tl-wr841n_firmware tl-wr841n
    • Published: Jul. 29, 2025
    • Modified: Aug. 01, 2025
  • 7.5

    HIGH
    CVE-2025-53713

    A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WlanNetworkRpm_APC.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result i... Read more

    Affected Products : tl-wr841n_firmware tl-wr841n
    • Published: Jul. 29, 2025
    • Modified: Aug. 01, 2025
Showing 20 of 290955 Results