Search Results (4249 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-45541 1 Qualcomm 102 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 99 more 2025-08-11 7.8 High
Memory corruption when IOCTL call is invoked from user-space to read board data.
CVE-2023-28539 1 Qualcomm 314 Ar8035, Ar8035 Firmware, Ar9380 and 311 more 2025-08-11 6.6 Medium
Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command.
CVE-2023-28580 1 Qualcomm 88 Ar8035, Ar8035 Firmware, Fastconnect 6900 and 85 more 2025-08-11 6.7 Medium
Memory corruption in WLAN Host while setting the PMK length in PMK length in internal cache.
CVE-2023-28547 1 Qualcomm 667 215 Mobile, 215 Mobile Firmware, 315 5g Iot and 664 more 2025-08-11 8.4 High
Memory corruption in SPS Application while requesting for public key in sorter TA.
CVE-2023-28570 1 Qualcomm 168 Aqt1000, Aqt1000 Firmware, Ar8035 and 165 more 2025-08-11 6.7 Medium
Memory corruption while processing audio effects.
CVE-2023-33023 1 Qualcomm 636 215 Mobile, 215 Mobile Firmware, 315 5g Iot and 633 more 2025-08-11 8.4 High
Memory corruption while processing finish_sign command to pass a rsp buffer.
CVE-2023-24851 1 Qualcomm 382 Ar8035, Ar8035 Firmware, Csr8811 and 379 more 2025-08-11 7.8 High
Memory Corruption in WLAN HOST while parsing QMI response message from firmware.
CVE-2023-22386 1 Qualcomm 402 215, 215 Firmware, Ar8035 and 399 more 2025-08-11 7.8 High
Memory Corruption in WLAN HOST while processing WLAN FW request to allocate memory.
CVE-2023-33017 1 Qualcomm 554 315 5g Iot Modem, 315 5g Iot Modem Firmware, 9205 Lte Modem and 551 more 2025-08-11 7.8 High
Memory corruption in Boot while running a ListVars test in UEFI Menu during boot.
CVE-2025-2017 1 Ashlar 1 Cobalt 2025-08-08 N/A
Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25240.
CVE-2012-10035 1 Turbosoft 1 Turboftp 2025-08-07 N/A
Turbo FTP Server versions 1.30.823 and 1.30.826 contain a buffer overflow vulnerability in the handling of the PORT command. By sending a specially crafted payload, an unauthenticated remote attacker can overwrite memory structures and execute arbitrary code with SYSTEM privileges.
CVE-2025-8170 1 Totolink 2 T6, T6 Firmware 2025-08-07 8.8 High
A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748_B20211015. This vulnerability affects the function tcpcheck_net of the file /router/meshSlaveDlfw of the component MQTT Packet Handler. The manipulation of the argument serverIp leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-5305 1 Tungstenautomation 1 Power Pdf 2025-08-06 7.8 High
Kofax Power PDF PDF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22921.
CVE-2025-36557 1 F5 14 Big-ip, Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager and 11 more 2025-08-06 7.5 High
When an HTTP profile with the Enforce RFC Compliance option is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2013-1424 1 Debian 1 Matplotlib 2025-08-06 5.6 Medium
Buffer overflow vulnerability in matplotlib.This issue affects matplotlib: before upstream commit ba4016014cb4fb4927e36ce8ea429fed47dcb787.
CVE-2015-0843 1 Debian 1 Yubiserver 2025-08-06 9.8 Critical
yubiserver before 0.6 is prone to buffer overflows due to misuse of sprintf.
CVE-2024-5243 2 Tp-link, Tp Link 3 Omada Er605, Omada Er605 Firmware, Omada Er605 2025-08-06 7.5 High
TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22523.
CVE-2025-8160 1 Tenda 2 Ac20, Ac20 Firmware 2025-08-05 8.8 High
A vulnerability classified as critical has been found in Tenda AC20 up to 16.03.08.12. Affected is an unknown function of the file /goform/SetSysTimeCfg of the component httpd. The manipulation of the argument timeZone leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-8180 1 Tenda 2 Ch22, Ch22 Firmware 2025-08-05 8.8 High
A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function formdeleteUserName of the file /goform/deleteUserName. The manipulation of the argument old_account leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2022-20846 1 Cisco 2 Ios Xr, Ios Xr Software 2025-08-05 4.3 Medium
A vulnerability in the Cisco Discovery Protocol implementation for Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the Cisco Discovery Protocol process to reload on an affected device. This vulnerability is due to a heap buffer overflow in certain Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow, which could cause the Cisco Discovery Protocol process to reload on the device. The bytes that can be written in the buffer overflow are restricted, which limits remote code execution.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).  Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .