Export limit exceeded: 349862 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 45868 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 43878 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (43878 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-54217 3 Adobe, Apple, Microsoft 3 Incopy, Macos, Windows 2026-02-26 7.8 High
InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54260 1 Adobe 1 Substance 3d Modeler 2026-02-26 7.8 High
Substance3D - Modeler versions 1.22.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Scope is unchanged.
CVE-2025-54259 1 Adobe 1 Substance 3d Modeler 2026-02-26 7.8 High
Substance3D - Modeler versions 1.22.2 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. Scope is unchanged.
CVE-2025-8879 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Heap buffer overflow in libaom in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to potentially exploit heap corruption via a curated set of gestures. (Chromium security severity: High)
CVE-2025-36222 1 Ibm 3 Storage Fusion, Storage Fusion Hci, Storage Fusion Hci For Watsonx 2026-02-26 8.7 High
IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions.
CVE-2025-5046 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2026-02-26 7.8 High
A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-55113 1 Bmc 2 Control-m/agent, Control-m\/agent 2026-02-26 9 Critical
If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR setting in newer versions), the verification stops at the first NULL byte encountered in the email address referenced in the client certificate. An attacker could bypass configured ACLs by using a specially crafted certificate.
CVE-2025-55116 1 Bmc 2 Control-m/agent, Control-m\/agent 2026-02-26 8.8 High
A buffer overflow in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions.
CVE-2025-5048 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2026-02-26 7.8 High
A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-8894 1 Autodesk 12 Advance Steel, Autocad, Autocad Architecture and 9 more 2026-02-26 7.8 High
A maliciously crafted PDF file, when parsed through certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-54262 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2026-02-26 7.8 High
Substance3D - Stager versions 3.1.3 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54289 1 Canonical 1 Lxd 2026-02-26 8.1 High
Privilege Escalation in operations API in Canonical LXD <6.5 on multiple platforms allows attacker with read permissions to hijack terminal or console sessions and execute arbitrary commands via WebSocket connection hijacking format
CVE-2025-23308 3 Linux, Microsoft, Nvidia 3 Linux Kernel, Windows, Cuda Toolkit 2026-02-26 3.3 Low
NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm where an attacker may cause a heap-based buffer overflow by getting the user to run nvdisasm on a malicious ELF file. A successful exploit of this vulnerability may lead to arbitrary code execution at the privilege level of the user running nvdisasm.
CVE-2025-23339 3 Linux, Microsoft, Nvidia 3 Linux Kernel, Windows, Cuda Toolkit 2026-02-26 3.3 Low
NVIDIA CUDA Toolkit for all platforms contains a vulnerability in cuobjdump where an attacker may cause a stack-based buffer overflow by getting the user to run cuobjdump on a malicious ELF file. A successful exploit of this vulnerability may lead to arbitrary code execution at the privilege level of the user running cuobjdump.
CVE-2025-36156 1 Ibm 2 Infosphere Data Replication, Infosphere Data Replication Vsam For Z\/os Remote Source 2026-02-26 7.4 High
IBM InfoSphere Data Replication VSAM for z/OS Remote Source 11.4 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local user with access to the files storing CECSUB or CECRM on the container could overflow the buffer and execute arbitrary code on the system.
CVE-2025-21476 1 Qualcomm 85 Qca6391, Qca6391 Firmware, Qca6698aq and 82 more 2026-02-26 7.8 High
Memory corruption when passing parameters to the Trusted Virtual Machine during the handshake.
CVE-2025-21481 1 Qualcomm 499 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 496 more 2026-02-26 7.8 High
Memory corruption while performing private key encryption in trusted application.
CVE-2025-21483 1 Qualcomm 455 Apq8017, Apq8017 Firmware, Apq8064au and 452 more 2026-02-26 9.8 Critical
Memory corruption when the UE receives an RTP packet from the network, during the reassembly of NALUs.
CVE-2025-27032 1 Qualcomm 385 Aqt1000, Aqt1000 Firmware, Ar8035 and 382 more 2026-02-26 7.8 High
memory corruption while loading a PIL authenticated VM, when authenticated VM image is loaded without maintaining cache coherency.
CVE-2025-27034 1 Qualcomm 227 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 224 more 2026-02-26 9.8 Critical
Memory corruption while selecting the PLMN from SOR failed list.