Search Results (40752 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-1430 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-08-19 7.8 High
A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-1429 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-08-19 7.8 High
A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-1428 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-08-19 7.8 High
A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-1275 1 Autodesk 12 Advance Steel, Autocad, Autocad Architecture and 9 more 2025-08-19 7.8 High
A maliciously crafted JPG file, when linked or imported into certain Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-27071 1 Qualcomm 69 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 66 more 2025-08-19 7.3 High
Memory corruption while processing specific files in Powerline Communication Firmware.
CVE-2025-3277 2 Redhat, Sqlite 2 Enterprise Linux, Sqlite 2025-08-18 9.8 Critical
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
CVE-2025-9108 1 Portabilis 1 I-diario 2025-08-18 4.3 Medium
Affected is an unknown function of the component Login Page. The manipulation leads to improper restriction of rendered ui layers. It is possible to launch the attack remotely.
CVE-2025-55286 2025-08-18 N/A
z2d is a pure Zig 2D graphics library. z2d v0.7.0 released with a new multi-sample anti-aliasing (MSAA) method, which uses a new buffering mechanism for storing coverage data. This differs from the standard alpha mask surface used for the previous super-sample anti-aliasing (SSAA) method. Under certain circumstances where the path being drawn existed in whole or partly outside of the rendering surface, incorrect bounding could cause out-of-bounds access within the coverage buffer. This affects the higher-level drawing operations, such as Context.fill, Context.stroke, painter.fill, and painter.stroke, when either the .default or .multisample_4x anti-aliasing modes were used. .supersample_4x was not affected, nor was drawing without anti-aliasing. In non-safe optimization modes (consumers compiling with ReleaseFast or ReleaseSmall), this could potentially lead to invalid memory accesses or corruption. z2d v0.7.1 fixes this issue, and it's recommended to upgrade to v0.7.1, or, given the small period of time v0.7.0 has been released, use v0.7.1 immediately, skipping v0.7.0.
CVE-2025-36600 1 Dell 2 Latitude 12 Rugged Extreme 7214, Latitude 12 Rugged Extreme 7214 Firmware 2025-08-18 8.2 High
Dell Client Platform BIOS contains an Improper Access Control Applied to Mirrored or Aliased Memory Regions vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
CVE-2025-50612 1 Netis-systems 2 Wf2880, Wf2880 Firmware 2025-08-18 7.5 High
A buffer overflow vulnerability has been discovered in the Netis WF2880 v2.1.40207 in the FUN_004743f8 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_sec_set in the payload, which may cause the program to crash and potentially lead to a Denial of Service (DoS) attack.
CVE-2025-50613 1 Netis-systems 2 Wf2880, Wf2880 Firmware 2025-08-18 7.5 High
A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00475e1c function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wds_key_wep in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack.
CVE-2025-27067 1 Qualcomm 17 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 14 more 2025-08-18 7.8 High
Memory corruption while processing DDI call with invalid buffer.
CVE-2025-27068 1 Qualcomm 33 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6900 and 30 more 2025-08-18 7.8 High
Memory corruption while processing an IOCTL command with an arbitrary address.
CVE-2025-27072 1 Qualcomm 73 Qam8255p, Qam8255p Firmware, Qam8295p and 70 more 2025-08-18 5.5 Medium
Information disclosure while processing a packet at EAVB BE side with invalid header length.
CVE-2025-27075 1 Qualcomm 73 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 70 more 2025-08-18 7.8 High
Memory corruption while processing IOCTL command with larger buffer in Bluetooth Host.
CVE-2025-47324 1 Qualcomm 3 Qca7005, Qca7005 Firmware, Snapdragon 2025-08-18 7.5 High
Information disclosure while accessing and modifying the PIB file of a remote device via powerline.
CVE-2025-0160 1 Ibm 1 Storage Virtualize 2025-08-18 8.1 High
IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker with access to the system to execute arbitrary Java code due to improper restrictions in the RPCAdapter service.
CVE-2025-22938 1 Adtran 2 411, 411 Firmware 2025-08-18 9.8 Critical
Adtran 411 ONT L80.00.0011.M2 was discovered to contain weak default passwords.
CVE-2024-43790 2 Netapp, Vim 3 Bootstrap Os, Hci Compute Node, Vim 2025-08-18 4.5 Medium
Vim is an open source command line text editor. When performing a search and displaying the search-count message is disabled (:set shm+=S), the search pattern is displayed at the bottom of the screen in a buffer (msgbuf). When right-left mode (:set rl) is enabled, the search pattern is reversed. This happens by allocating a new buffer. If the search pattern contains some ASCII NUL characters, the buffer allocated will be smaller than the original allocated buffer (because for allocating the reversed buffer, the strlen() function is called, which only counts until it notices an ASCII NUL byte ) and thus the original length indicator is wrong. This causes an overflow when accessing characters inside the msgbuf by the previously (now wrong) length of the msgbuf. The issue has been fixed as of Vim patch v9.1.0689.
CVE-2025-5942 1 Netskope 1 Netskope 2025-08-18 N/A
Netskope was notified about a potential gap in its agent (NS Client) on Windows systems. If this gap is successfully exploited, an unprivileged user can trigger a heap overflow in the epdlpdrv.sys driver, leading to a Blue-Screen-of-Death (BSOD). Successful exploitation can also potentially be performed by an unprivileged user whose NS Client is configured to use Endpoint DLP. A successful exploit can result in a denial-of-service for the local machine.