Latest CVE Feed
-
7.5
HIGHCVE-2024-53270
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullp... Read more
Affected Products : envoy- Published: Dec. 18, 2024
- Modified: Sep. 04, 2025
-
8.6
HIGHCVE-2025-9377
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both prod... Read more
Affected Products : archer_c7_firmware tl-wr841n_firmware tl-wr841n archer_c7 tl-wr841nd_firmware tl-wr841nd- Actively Exploited
- Published: Aug. 29, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2024-28847
OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. Similarly to the GHSL-2023-250 issue, `AlertUtil::validateExpression` is also call... Read more
Affected Products : openmetadata- Published: Mar. 15, 2024
- Modified: Sep. 04, 2025
-
7.5
HIGHCVE-2023-37474
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outs... Read more
- Published: Jul. 14, 2023
- Modified: Sep. 04, 2025
-
6.3
MEDIUMCVE-2023-38501
copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the serve... Read more
- Published: Jul. 25, 2023
- Modified: Sep. 04, 2025
-
9.8
CRITICALCVE-2024-45169
An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2.12. Due to improper input validation, improper deserialization, and improper restriction of operations within the bounds of a memory buffer, IDOL2 is vulnerable to Denial-of-Service (D... Read more
Affected Products : idol2- Published: Aug. 22, 2024
- Modified: Sep. 04, 2025
-
9.2
CRITICALCVE-2025-7679
The ASPECT system allows users to bypass authentication. This issue affects all versions of ASPECT... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Authentication
-
8.2
HIGHCVE-2025-7677
A denial-of-service (DoS) attack is possible if access to the local network is provided to unauthorized users. This is due to a buffer copy issue that may lead to a software crash. This issue affects all versions of ASPECT.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Authentication
-
10.0
CRITICALCVE-2025-53187
Due to an issue in configuration, code that was intended for debugging purposes was included in the market release of the ASPECT FW allowing an attacker to bypass authentication. This vulnerability may allow an attacker to change the system time, access f... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Authentication
-
8.1
HIGHCVE-2024-47258
2N Access Commander version 2.1 and prior is vulnerable in default settings to Man In The Middle attack due to not verifying certificates of 2N edge devices. 2N has currently released an updated version 3.3 of 2N Access Commander, with added Certifi... Read more
Affected Products : access_commander- Published: Feb. 06, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2024-47255
In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary code execution with root permissions.... Read more
Affected Products : access_commander- Published: Nov. 05, 2024
- Modified: Sep. 04, 2025
-
7.2
HIGHCVE-2024-47254
In 2N Access Commander versions 3.1.1.2 and prior, an Insufficient Verification of Data Authenticity vulnerability could allow an attacker to escalate their privileges and gain root access to the system.... Read more
Affected Products : access_commander- Published: Nov. 05, 2024
- Modified: Sep. 04, 2025
-
9.8
CRITICALCVE-2025-5310
Dover Fueling Solutions ProGauge MagLink LX Consoles expose an undocumented and unauthenticated target communication framework (TCF) interface on a specific port. Files can be created, deleted, or modified, potentially leading to remote code execution.... Read more
Affected Products :- Published: Jun. 27, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Misconfiguration
-
7.1
HIGHCVE-2024-39550
A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port... Read more
- Published: Jul. 11, 2024
- Modified: Sep. 04, 2025
-
6.5
MEDIUMCVE-2023-50224
TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is no... Read more
- Actively Exploited
- Published: May. 03, 2024
- Modified: Sep. 04, 2025
-
8.1
HIGHCVE-2025-3935
ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys. It is important to n... Read more
Affected Products : screenconnect- Actively Exploited
- Published: Apr. 25, 2025
- Modified: Sep. 03, 2025
- Vuln Type: Injection
-
10.0
HIGHCVE-2022-2068
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292... Read more
Affected Products : fedora debian_linux h410c_firmware ontap_select_deploy_administration_utility hci_management_node solidfire element_software snapmanager openssl h300s_firmware +33 more products- Published: Jun. 21, 2022
- Modified: Sep. 03, 2025
-
9.8
CRITICALCVE-2024-36535
Insecure permissions in meshery v0.7.51 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token.... Read more
Affected Products : meshery- Published: Jul. 24, 2024
- Modified: Sep. 03, 2025
-
7.0
HIGHCVE-2024-42050
The MSI installer for Splashtop Streamer for Windows before 3.7.0.0 uses a temporary folder with weak permissions during installation. A local user can exploit this to escalate privileges to SYSTEM via an oplock on CredProvider_Inst.reg.... Read more
Affected Products : streamer- Published: Jul. 28, 2024
- Modified: Sep. 03, 2025
-
7.8
HIGHCVE-2024-42051
The MSI installer for Splashtop Streamer for Windows before 3.6.2.0 uses a temporary folder with weak permissions during installation. A local user can exploit this to escalate privileges to SYSTEM by replacing InstRegExp.reg.... Read more
Affected Products : streamer- Published: Jul. 28, 2024
- Modified: Sep. 03, 2025