Latest CVE Feed
-
8.8
HIGHCVE-2025-2765
CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is ... Read more
- Published: Apr. 23, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authentication
-
8.0
HIGHCVE-2025-2764
CarlinKit CPC200-CCPA update.cgi Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Alth... Read more
- Published: Apr. 23, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authentication
-
6.8
MEDIUMCVE-2025-2763
CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authenticatio... Read more
- Published: Apr. 23, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Cryptography
-
7.8
HIGHCVE-2025-2762
CarlinKit CPC200-CCPA Missing Root of Trust Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of CarlinKit CPC200-CCPA devices. An attacker must first obtain the ability to... Read more
- Published: Apr. 23, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authentication
-
7.8
HIGHCVE-2025-2761
GIMP FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the t... Read more
Affected Products : gimp- Published: Apr. 23, 2025
- Modified: Aug. 14, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2025-2760
GIMP XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the targ... Read more
Affected Products : gimp- Published: Apr. 23, 2025
- Modified: Aug. 14, 2025
- Vuln Type: Memory Corruption
-
6.1
MEDIUMCVE-2025-29526
A Cross-Site Scripting (XSS) vulnerability in the search function of Q4 Inc Investor Relations Platform v5.147.1.2 allows attackers to execute arbitrary Javascript via injecting a crafted payload into the SearchTerm parameter.... Read more
Affected Products :- Published: Apr. 23, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Cross-Site Scripting
-
7.3
HIGHCVE-2025-28028
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi through the v5 parameter.... Read more
Affected Products : a830r_firmware a3100r_firmware a950rg_firmware a3000ru_firmware a3100r a3000ru a830r a950rg- Published: Apr. 23, 2025
- Modified: May. 06, 2025
- Vuln Type: Memory Corruption
-
7.3
HIGHCVE-2025-28025
TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi through the v14 parameter.... Read more
Affected Products : a830r_firmware a3100r_firmware a950rg_firmware a3000ru_firmware a3100r a3000ru a830r a950rg- Published: Apr. 23, 2025
- Modified: May. 06, 2025
- Vuln Type: Memory Corruption
-
7.3
HIGHCVE-2025-28022
TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v25 parameter.... Read more
- Published: Apr. 23, 2025
- Modified: May. 06, 2025
- Vuln Type: Memory Corruption
-
7.3
HIGHCVE-2025-28021
TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in the downloadFile.cgi through the v14 and v3 parameters... Read more
- Published: Apr. 23, 2025
- Modified: May. 06, 2025
- Vuln Type: Memory Corruption
-
7.3
HIGHCVE-2025-28020
TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v25 parameter.... Read more
- Published: Apr. 23, 2025
- Modified: May. 06, 2025
- Vuln Type: Memory Corruption
-
7.3
HIGHCVE-2025-28019
TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in the downloadFile.cgi component... Read more
- Published: Apr. 23, 2025
- Modified: May. 06, 2025
- Vuln Type: Memory Corruption
-
7.3
HIGHCVE-2025-28018
TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v14 parameter.... Read more
- Published: Apr. 23, 2025
- Modified: May. 06, 2025
- Vuln Type: Memory Corruption
-
6.5
MEDIUMCVE-2025-28017
TOTOLINK A800R V4.1.2cu.5032_B20200408 is vulnerable to Command Injection in downloadFile.cgi via the QUERY_STRING parameter.... Read more
- Published: Apr. 23, 2025
- Modified: May. 06, 2025
- Vuln Type: Injection
-
7.1
HIGHCVE-2025-1522
PostHog database_schema Server-Side Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnera... Read more
Affected Products : posthog- Published: Apr. 23, 2025
- Modified: Aug. 07, 2025
- Vuln Type: Server-Side Request Forgery
-
7.1
HIGHCVE-2025-1521
PostHog slack_incoming_webhook Server-Side Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this ... Read more
Affected Products : posthog- Published: Apr. 23, 2025
- Modified: Aug. 07, 2025
- Vuln Type: Server-Side Request Forgery
-
8.0
HIGHCVE-2025-1520
PostHog ClickHouse Table Functions SQL Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of PostHog. Authentication is required to exploit this vulnerabi... Read more
Affected Products : posthog- Published: Apr. 23, 2025
- Modified: Aug. 07, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-1050
Sonos Era 300 Out-of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The s... Read more
- Published: Apr. 23, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-1049
Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. ... Read more
- Published: Apr. 23, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Memory Corruption