Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SEI CERT C Coding Standard - Guidelines 06. Arrays (ARR)
Category ID:1160
Vulnerability Mapping:Prohibited
Status:Stable
DetailsContent HistoryObserved CVE ExamplesReports
24510Vulnerabilities found

CVE-2025-8845
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 8.91%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 12:02
Updated-15 Sep, 2025 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NASM Netwide Assember nasm.c assemble_file stack-based overflow

A vulnerability was identified in NASM Netwide Assember 2.17rc0. This issue affects the function assemble_file of the file nasm.c. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-nasmNASM
Product-netwide_assemblerNetwide Assember
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8843
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 11.92%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 11:02
Updated-15 Sep, 2025 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NASM Netwide Assember outmacho.c macho_no_dead_strip heap-based overflow

A vulnerability was found in NASM Netwide Assember 2.17rc0. This affects the function macho_no_dead_strip of the file outmacho.c. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-nasmNASM
Product-netwide_assemblerNetwide Assember
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-8842
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 8.91%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 10:32
Updated-15 Sep, 2025 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NASM Netwide Assember preproc.c do_directive use after free

A vulnerability has been found in NASM Netwide Assember 2.17rc0. Affected by this issue is the function do_directive of the file preproc.c. The manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-nasmNASM
Product-netwide_assemblerNetwide Assember
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-416
Use After Free
CVE-2025-8837
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.05% / 14.28%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 08:02
Updated-16 Sep, 2025 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JasPer JPEG2000 File jpc_dec.c jpc_dec_dump use after free

A vulnerability was identified in JasPer up to 4.2.5. This affects the function jpc_dec_dump of the file src/libjasper/jpc/jpc_dec.c of the component JPEG2000 File Handler. The manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8308060d3fbc1da10353ac8a95c8ea60eba9c25a. It is recommended to apply a patch to fix this issue.

Action-Not Available
Vendor-n/aJasPer
Product-jasperJasPer
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-416
Use After Free
CVE-2025-8833
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 06:02
Updated-04 Sep, 2025 | 18:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 langSwitchBack stack-based overflow

A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This issue affects the function langSwitchBack of the file /goform/langSwitchBack. The manipulation of the argument langSelectionOnly leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE6250RE7000RE6500RE9000
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8832
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 05:32
Updated-04 Sep, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setDMZ stack-based overflow

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This vulnerability affects the function setDMZ of the file /goform/setDMZ. The manipulation of the argument DMZIPAddress leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE6250RE7000RE6500RE9000
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8831
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 05:02
Updated-04 Sep, 2025 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 remoteManagement stack-based overflow

A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function remoteManagement of the file /goform/remoteManagement. The manipulation of the argument portNumber leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE6250RE7000RE6500RE9000
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8826
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 02:32
Updated-04 Sep, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto um_rp_autochannel stack-based overflow

A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This vulnerability affects the function um_rp_autochannel of the file /goform/RP_setBasicAuto. The manipulation of the argument apcli_AuthMode_2G/apcli_AuthMode_5G leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE7000RE9000RE6500RE6250
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8824
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 01:32
Updated-04 Sep, 2025 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setRIP stack-based overflow

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this issue is the function setRIP of the file /goform/setRIP. The manipulation of the argument RIPmode/RIPpasswd leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE7000RE9000RE6500RE6250
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8822
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 00:32
Updated-04 Sep, 2025 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setOpMode algDisable stack-based overflow

A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function algDisable of the file /goform/setOpMode. The manipulation of the argument opMode leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE7000RE9000RE6500RE6250
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8820
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-10 Aug, 2025 | 23:32
Updated-04 Sep, 2025 | 18:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 wirelessBasic stack-based overflow

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This vulnerability affects the function wirelessBasic of the file /goform/wirelessBasic. The manipulation of the argument submit_SSID1 leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE7000RE9000RE6500RE6250
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8819
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-10 Aug, 2025 | 23:02
Updated-04 Sep, 2025 | 18:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setWan stack-based overflow

A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function setWan of the file /goform/setWan. The manipulation of the argument staticIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE7000RE9000RE6500RE6250
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8817
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-10 Aug, 2025 | 22:02
Updated-04 Sep, 2025 | 18:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setLan stack-based overflow

A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this vulnerability is the function setLan of the file /goform/setLan. The manipulation of the argument lan2enabled leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE7000RE9000RE6500RE6250
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8816
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.14%
||
7 Day CHG~0.00%
Published-10 Aug, 2025 | 15:48
Updated-04 Sep, 2025 | 18:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setOpMode stack-based overflow

A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function setOpMode of the file /goform/setOpMode. The manipulation of the argument ethConv leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Linksys Holdings, Inc.
Product-re6350_firmwarere6300_firmwarere6500re9000re9000_firmwarere6350re6250re6300re6250_firmwarere7000_firmwarere6500_firmwarere7000RE6300RE6350RE7000RE9000RE6500RE6250
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8810
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.16% / 36.81%
||
7 Day CHG~0.00%
Published-10 Aug, 2025 | 13:02
Updated-14 Aug, 2025 | 16:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC20 SetFirewallCfg strcpy stack-based overflow

A vulnerability classified as critical was found in Tenda AC20 16.03.08.05. Affected by this vulnerability is the function strcpy of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac20ac20_firmwareAC20
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8746
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 8.46%
||
7 Day CHG~0.00%
Published-09 Aug, 2025 | 06:02
Updated-16 Sep, 2025 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GNU libopts __strstr_sse2 memory corruption

A vulnerability, which was classified as problematic, was found in GNU libopts up to 27.6. Affected is the function __strstr_sse2. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. This issue was initially reported to the tcpreplay project, but the code maintainer explains, that this "bug appears to be in libopts which is an external library." This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-GNU
Product-liboptslibopts
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-8736
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 3.24%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 19:02
Updated-08 Aug, 2025 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GNU cflow Lexer c.c yylex buffer overflow

A vulnerability, which was classified as critical, has been found in GNU cflow up to 1.8. Affected by this issue is the function yylex of the file c.c of the component Lexer. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-GNU
Product-cflow
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2012-10053
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-64.32% / 98.43%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 18:12
Updated-08 Aug, 2025 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simple Web Server Connection Header Buffer Overflow

Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, leading to a buffer overflow on the stack. This flaw allows remote attackers to execute arbitrary code with the privileges of the web server process. The vulnerability is triggered before authentication.

Action-Not Available
Vendor-PMSoftware
Product-Simple Web Server
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2012-10051
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.4||HIGH
EPSS-6.90% / 91.26%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 18:11
Updated-20 Nov, 2025 | 22:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Photodex ProShow Producer 5.0.3256 load File Handling Buffer Overflow

Photodex ProShow Producer version 5.0.3256 contains a stack-based buffer overflow vulnerability in the handling of plugin load list files. When a specially crafted load file is placed in the installation directory, the application fails to properly validate its contents, leading to a buffer overflow when the file is parsed during startup. Exploitation requires local access to place the file and user interaction to launch the application.

Action-Not Available
Vendor-Photodex Corporation
Product-ProShow Producer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2012-10043
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-4.64% / 89.14%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 18:09
Updated-08 Aug, 2025 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ActFax 4.32 Client Importer Buffer Overflow

A stack-based buffer overflow vulnerability exists in ActFax Server version 4.32, specifically in the "Import Users from File" functionality of the client interface. The application fails to properly validate the length of tab-delimited fields in .exp files, leading to unsafe usage of strcpy() during CSV parsing. An attacker can exploit this vulnerability by crafting a malicious .exp file and importing it using the default character set "ECMA-94 / Latin 1 (ISO 8859)". Successful exploitation may result in arbitrary code execution, leading to full system compromise. User interaction is required to trigger the vulnerability.

Action-Not Available
Vendor-ActFax
Product-Server
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-54950
Assigner-Meta Platforms, Inc.
ShareView Details
Assigner-Meta Platforms, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.13% / 32.42%
||
7 Day CHG~0.00%
Published-07 Aug, 2025 | 23:03
Updated-12 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds access vulnerability in the loading of ExecuTorch models can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit b6b7a16df5e7852d976d8c34c8a7e9a1b6f7d005.

Action-Not Available
Vendor-Meta Platforms, Inc.
Product-ExecuTorch
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-47219
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.09% / 24.81%
||
7 Day CHG~0.00%
Published-07 Aug, 2025 | 00:00
Updated-12 Aug, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_trak function may read past the end of a heap buffer while parsing an MP4 file, possibly leading to information disclosure.

Action-Not Available
Vendor-gstreamer_projectn/a
Product-gstreamern/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-47183
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 2.93%
||
7 Day CHG~0.00%
Published-07 Aug, 2025 | 00:00
Updated-12 Aug, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_tree function may read past the end of a heap buffer while parsing an MP4 file, leading to information disclosure.

Action-Not Available
Vendor-gstreamer_projectn/a
Product-gstreamern/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-47806
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.07% / 22.09%
||
7 Day CHG~0.00%
Published-07 Aug, 2025 | 00:00
Updated-12 Aug, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In GStreamer through 1.26.1, the subparse plugin's parse_subrip_time function may write data past the bounds of a stack buffer, leading to a crash.

Action-Not Available
Vendor-gstreamer_projectn/a
Product-gstreamern/a
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-6632
Assigner-Autodesk
ShareView Details
Assigner-Autodesk
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 4.05%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 20:42
Updated-13 Nov, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PSD File Parsing Out-of-Bounds Read Vulnerability

A maliciously crafted PSD file, when linked or imported into Autodesk 3ds Max, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

Action-Not Available
Vendor-Autodesk Inc.
Product-3ds_max3ds Max
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-23334
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 18.92%
||
7 Day CHG+0.01%
Published-06 Aug, 2025 | 12:43
Updated-12 Aug, 2025 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by sending a request. A successful exploit of this vulnerability might lead to information disclosure.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-triton_inference_serverwindowslinux_kernelTriton Inference Server
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-23333
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.06% / 17.37%
||
7 Day CHG+0.01%
Published-06 Aug, 2025 | 12:42
Updated-12 Aug, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by manipulating shared memory data. A successful exploit of this vulnerability might lead to information disclosure.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-triton_inference_serverwindowslinux_kernelTriton Inference Server
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-23319
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-8.1||HIGH
EPSS-0.63% / 69.93%
||
7 Day CHG+0.13%
Published-06 Aug, 2025 | 12:37
Updated-12 Aug, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds write by sending a request. A successful exploit of this vulnerability might lead to remote code execution, denial of service, data tampering, or information disclosure.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-triton_inference_serverwindowslinux_kernelTriton Inference Server
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-805
Buffer Access with Incorrect Length Value
CVE-2025-23318
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-8.1||HIGH
EPSS-0.16% / 36.70%
||
7 Day CHG+0.03%
Published-06 Aug, 2025 | 12:36
Updated-12 Aug, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, data tampering, and information disclosure.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-triton_inference_serverwindowslinux_kernelTriton Inference Server
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-805
Buffer Access with Incorrect Length Value
CVE-2025-23311
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.95% / 76.13%
||
7 Day CHG+0.10%
Published-06 Aug, 2025 | 12:33
Updated-12 Aug, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a stack overflow through specially crafted HTTP requests. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, or data tampering.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-triton_inference_serverwindowslinux_kernelTriton Inference Server
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-23310
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.44% / 62.94%
||
7 Day CHG+0.09%
Published-06 Aug, 2025 | 12:18
Updated-12 Aug, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause stack buffer overflow by specially crafted inputs. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-triton_inference_serverwindowslinux_kernelTriton Inference Server
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-27075
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.47%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-18 Aug, 2025 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Bluetooth HOST

Memory corruption while processing IOCTL command with larger buffer in Bluetooth Host.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8c_compute_platform_\(sc8180x-ad\)snapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8845h_firmwarewcd9340snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresc8380xp_firmwarewsa8840wcd9370_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareqcm6490_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)wcd9380wcd9375_firmwarefastconnect_6200_firmwarefastconnect_6800_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarewsa8835fastconnect_6700fastconnect_6700_firmwarefastconnect_6900_firmwarefastconnect_6200wsa8845qca6391_firmwareqcm6490wsa8830wsa8845hvideo_collaboration_vc3_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarewsa8840_firmwarewcd9341qcs6490_firmwarewsa8830_firmwareaqt1000aqt1000_firmwareqca6391wsa8810qcm5430_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)wcd9375fastconnect_6900qca6430fastconnect_7800wcd9385_firmwarewsa8810_firmwarewsa8845_firmwarefastconnect_6800wcd9385snapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwaresc8380xpvideo_collaboration_vc3_platformsnapdragon_7c\+_gen_3_computeqcs5430_firmwareqca6430_firmwareqcs5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)qca6420snapdragon_7c\+_gen_3_compute_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)wcd9341_firmwarewsa8815wsa8835_firmwarefastconnect_7800_firmwareqcs6490wcd9340_firmwareqcm5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)wcd9380_firmwarewsa8815_firmwareqca6420_firmwarewcd9370Snapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-27067
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.47%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-18 Aug, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in DSP Service

Memory corruption while processing DDI call with invalid buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_6900_firmwarewsa8845h_firmwarewsa8845fastconnect_6900fastconnect_7800_firmwaresc8380xp_firmwarewsa8845hwcd9385_firmwarefastconnect_7800wsa8840wsa8845_firmwarewcd9385wsa8840_firmwarewcd9380_firmwarewcd9380sc8380xpSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-21465
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 2.42%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-28 Nov, 2025 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Read in Core

Information disclosure while processing the hash segment in an MBN file.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9000_firmwareqca8072_firmwaresdx80msdx55sm4125qam8650psnapdragon_x72_5g_modem-rf_systemqcn5121sa6155psnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_7c\+_gen_3_compute_firmwaresnapdragon_8\+_gen_2_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwareqfw7124_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresdx61aqt1000snapdragon_8cx_compute_platform_\(sc8180x-ab\)qdx1011snapdragon_8_gen_2_mobile_platform_firmwaresm7325p_firmwareqxm8083_firmwareqcn9022_firmwareqam8255p_firmwaresrv1l_firmwarevision_intelligence_400_platformsa8150p_firmwareqcf8000sfpqcm8550_firmwareqamsrv1h_firmwaresnapdragon_auto_4g_modemsd855wcd9341_firmwaresd_8_gen1_5gsnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_845_mobile_platformqca8075wcd9306_firmwarewcd9385_firmwareqcm6490_firmwaresa7255p_firmwareqcn9072snapdragon_x62_5g_modem-rf_systemqcn6412_firmwareqcs4290qcs4290_firmwareqca6335_firmwareqca6584au_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_x72_5g_modem-rf_system_firmwaresd_675_firmwaresnapdragon_x62_5g_modem-rf_system_firmwaresm8635p_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwareqcm8550snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqcn9024sc8380xp_firmwarewsa8815sm7315qcs8300srv1hqcm4490_firmwaresnapdragon_855_mobile_platformvideo_collaboration_vc5_platformwcd9326_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)snapdragon_480_5g_mobile_platform_firmwareqca6421_firmwaresm8550p_firmwarevideo_collaboration_vc3_platform_firmwareqca6574au_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)qcm4290_firmwaresnapdragon_662_mobile_platform_firmwaresnapdragon_wear_1300_platform_firmwareqca6595au_firmwaresnapdragon_460_mobile_platformsnapdragon_8_gen_2_mobile_platformqcc7225_firmwareqdx1010qsm8250_firmwarecsra6620wcn3980qca6584auipq5312sd662_firmwarevision_intelligence_300_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresa8145p_firmwareqcn6224_firmwaresm8750_firmwareqcm2290smart_audio_400_platformsa8155pqcm6125sa8540p_firmwarewcd9385qca4024_firmwarewcd9380_firmwareqca8386_firmwareqsm8250qcn5124_firmwaresm8750pwcn6450snapdragon_680_4g_mobile_platformsnapdragon_675_mobile_platformqcf8000sfp_firmwaresc8180x\+sdx55_firmwareipq9048wcn7880ipq6028sg8275p_firmwareqca8337_firmwaresd662wcn3988_firmwarecsra6640_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwareqca6698aqsnapdragon_x70_modem-rf_systemsxr2130_firmwareqsm8350_firmwareipq9554_firmwaresnapdragon_x24_lte_modemsm7675psm6250fastconnect_6800qca6574a_firmware9205_lte_modemwsa8832_firmwaresa8650psa2150p_firmwaresxr2230p_firmwaresnapdragon_690_5g_mobile_platform_firmwareqca6678aq_firmwaresm6250_firmwareqsm8350qcn9070snapdragon_680_4g_mobile_platform_firmwaresm8550pwcd9378_firmwareqcn9013_firmwarewcn7881_firmwareqcn6023_firmwareqcn9274_firmwareqca6431_firmwaressg2115p_firmwaresm7315_firmwarefastconnect_6900_firmwareqca6678aqwsa8835_firmwaresa8295psc8380xpqdx1011_firmwaresdx55_firmwaresd730snapdragon_xr1_platform_firmwarewcn3988sa8540pqca6696_firmwarevision_intelligence_300_platformqca8084snapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqcs4490_firmwaresm7675_firmwareqcn5022qcn9012snapdragon_662_mobile_platformsxr2250pwcn6755_firmwaresxr2330p_firmwarewsa8810_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcc7226_firmwarewcn6650wcd9360qdu1110_firmwareqcm4325ipq9554wsa8840snapdragon_778g_5g_mobile_platformqdu1110csr8811ipq9574wsa8840_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqcc711_firmwareipq6000qdu1000sm7250p_firmwarewcn3950_firmwareqcn5122_firmwarewsa8845hqrb5165msnapdragon_auto_5g_modem-rf_firmwareqca6310snapdragon_780g_5g_mobile_platform_firmwaresdx57mssg2125p_firmwaresxr1120_firmwaresnapdragon_720g_mobile_platform_firmwareqcn9274snapdragon_865_5g_mobile_platformsnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)sm7325pqca0000qcm4290qcn6024_firmwareqcs9100qfw7114snapdragon_665_mobile_platform_firmwareqca6421wcd9370_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)ar8035_firmwareqcn9000srv1lwsa8845sdx80m_firmwareimmersive_home_326_platformwcn7860_firmwareqamsrv1hqru1062sm8750snapdragon_xr2_5g_platformsa6150p_firmwaresg4150p_firmwarewcn3910_firmwaresm8750p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresg8275pqca4004fastconnect_7800_firmwareqxm8083qru1052_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)qca9984sxr2230psa8620p_firmwaresnapdragon_ar2_gen_1_platformqcs7230snapdragon_850_mobile_compute_platform_firmwaresnapdragon_695_5g_mobile_platformrobotics_rb2_platform_firmwaresa8770pqrb5165nsrv1m_firmwarewcd9375qca6574_firmwaresnapdragon_x24_lte_modem_firmwaresa6145p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqca6430qca6391_firmwareqdu1000_firmwarewcn6755snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresd_8cx_firmwareipq9570_firmwaresnapdragon_8_gen_3_mobile_platformqcn5052qca6688aq_firmwareqcf8001qcn5124ipq5300sw5100p_firmwaresnapdragon_850_mobile_compute_platformsa6155_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_x75_5g_modem-rf_systemwcn7861sa8775pwcn6650_firmwareqcn5022_firmwareimmersive_home_326_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qca6431sd_8cxfastconnect_6800_firmwarewcd9375_firmwareimmersive_home_3210_platformqcn9074_firmwareqca6564auqca6595auqcc710ssg2125pqamsrv1mqca8085_firmwaresnapdragon_710_mobile_platformsnapdragon_wear_1300_platformsnapdragon_ar2_gen_1_platform_firmwareqfw7114_firmwareqru1032_firmwareqts110_firmwaresm8635psnapdragon_670_mobile_platformsnapdragon_x50_5g_modem-rf_system_firmwareqcs9100_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqca6174a_firmwaresm4635qca6564a_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwaresw5100talynplus_firmwarewsa8830qcn5122csrb31024wsa8830_firmwareqcn6023qca6430_firmwaresa8155p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareqcm6490c-v2x_9150_firmwaresnapdragon_xr2_5g_platform_firmwaresd865_5g_firmwareqca6436_firmwareqca6595wcn3999ipq9574_firmwaresnapdragon_750g_5g_mobile_platformwcd9380smart_audio_400_platform_firmwaresnapdragon_xr1_platform315_5g_iot_modem_firmwareqca6564qcs6490_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwareqca6310_firmwareipq6000_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresd670_firmwareqca6420_firmwareqca6688aqwcd9340_firmwareqamsrv1m_firmwaresnapdragon_720g_mobile_platformsnapdragon_730g_mobile_platform_\(sm7150-ab\)ar8031qcs8550sxr1120qca9984_firmwareqep8111_firmwareqcn5021_firmwaresdx65msdx61_firmwaresnapdragon_x50_5g_modem-rf_systemsnapdragon_w5\+_gen_1_wearable_platformsnapdragon_665_mobile_platformsm4635_firmwaresnapdragon_auto_5g_modem-rf_gen_2wcd9360_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwareqam8295pssg2115psm7675qep8111qca6391csr8811_firmwaresa8295p_firmware9205_lte_modem_firmwareqcs6490ipq9570qcc7226wsa8810qcs610qts110qcn9160_firmwaresnapdragon_xr2\+_gen_1_platformqdu1010_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresg4150pvideo_collaboration_vc5_platform_firmwareqru1062_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm6370sd_8_gen1_5g_firmwarewcd9378snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwareipq6028_firmwaresa8530pqcs8300_firmwareqca8386snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwareqcs8250_firmwarewcn7880_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwareqcn6274snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)sa8150pqcs610_firmwaresnapdragon_x70_modem-rf_system_firmwareqca6797aqqam8650p_firmwareipq6005qca6564asnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sw5100_firmwareqcs410ipq6005_firmwareqcn6024qca9377_firmwareqca8075_firmwareqca6574asnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)wcn3999_firmwareqca6564_firmwareqca8082_firmwareqca6436wsa8845_firmwareqrb5165n_firmwarewcd9340wcd9341sa7255pqca6426_firmwareqcs8155_firmwaresd460snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarefastconnect_6200snapdragon_7c_compute_platform_\(sc7180-ac\)sd888snapdragon_x35_5g_modem-rf_systemsnapdragon_675_mobile_platform_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareimmersive_home_3210_platform_firmwareipq6018wsa8832aqt1000_firmwaresnapdragon_ar1_gen_1_platform_firmwaresd675_firmwareqcc7225qdu1210sdx65m_firmwareqcn6224snapdragon_7c\+_gen_3_computesnapdragon_ar1_gen_1_platformsm6250pqcs2290sdx57m_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)snapdragon_670_mobile_platform_firmwarewcd9370qca8081_firmwareqcc710_firmwareqca6698aq_firmwarecsra6640wcd9306snapdragon_712_mobile_platformqcn9013sa4150psw5100psc8180x\+sdx55wcn7860sm7250psm6650qcs5430qcs2290_firmwaresa8145pwsa8845h_firmwarewcd9395_firmwaresd670wcd9371snapdragon_x35_5g_modem-rf_system_firmwaresa8195psa9000psnapdragon_4_gen_1_mobile_platformipq6010snapdragon_712_mobile_platform_firmwaresnapdragon_888_5g_mobile_platformqcn9072_firmwarewcd9390ar8035sa8775p_firmwaresm7675p_firmwareqcn7606_firmwareqam8775pqcm2290_firmwaremdm9205svision_intelligence_400_platform_firmwareqca6797aq_firmwareqcs8250qca6564au_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)sa8650p_firmwaremdm9205s_firmwareqcn9011_firmwareqcc711snapdragon_678_mobile_platform_\(sm6150-ac\)wcn7881robotics_rb3_platform_firmwaresxr2250p_firmwaresnapdragon_780g_5g_mobile_platformsrv1mqcn9012_firmwarecsra6620_firmwarewcd9395qcs410_firmwareqcn5052_firmwareqcm4490qru1052robotics_rb2_platformsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwareqca8085qdu1210_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)qca4004_firmwaresxr1230pqcc7228_firmwarewcn7861_firmwareqca9377qcn7606fastconnect_6700_firmwaresa8155_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwarefastconnect_6700snapdragon_730_mobile_platform_\(sm7150-aa\)_firmwareipq5300_firmwarewcn3980_firmwareqca6696qcm5430_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)sxr2330pqcs8550_firmwarerobotics_rb5_platformqca6426qdx1010_firmwaresa4155p_firmwareipq9008qcn9074qcn9011snapdragon_8\+_gen_1_mobile_platformqca8084_firmwareqcf8000qcn5121_firmwaresa2150pqam8295p_firmwarewcn3910qcf8001_firmwaresm7635_firmwaresnapdragon_690_5g_mobile_platformsnapdragon_4_gen_2_mobile_platformwcd9326snapdragon_x55_5g_modem-rf_systemsnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformqdu1010snapdragon_865_5g_mobile_platform_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwaresa8155snapdragon_695_5g_mobile_platform_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcn9022qcm6125_firmwaresdx71m_firmwareqca6574wcn6740_firmwaresa8255p_firmwareqcn6412ipq5332qcs7230_firmwaresa6155sxr1230p_firmwaresd855_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)ipq5302qcn9160sdx71msnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwarerobotics_rb5_platform_firmwarevideo_collaboration_vc1_platform_firmwareqcn6432snapdragon_ar1_gen_1_platform_\"luna1\"snapdragon_765_5g_mobile_platform_\(sm7250-aa\)qcs8155sd675sa7775pvideo_collaboration_vc1_platformqcn6402qcn6402_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_8_gen_1_mobile_platform_firmwareqcs4490flight_rb5_5g_platform_firmwaresa8620pwcn6450_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_auto_5g_modem-rfqcc7228sm6370_firmwareqrb5165m_firmwareqca6595_firmwareqam8775p_firmwaresa8195p_firmwaresnapdragon_x65_5g_modem-rf_systemqcn6432_firmwarewcn6740qca8081sm7635qcm4325_firmwareqcn5152qcn5152_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)wcd9335_firmwaresd888_firmwaresm8635sa7775p_firmwarecsrb31024_firmwareipq5302_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcd9335wsa8815_firmwareipq5312_firmwaresa9000p_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwarefastconnect_6900qam8255pvideo_collaboration_vc3_platformqcn6274_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6200_firmwarewsa8835sd865_5grobotics_rb3_platformqca8072flight_rb5_5g_platformsa6150pqam8620pipq6010_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresm4125_firmwarear8031_firmwareqcn9070_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwareqcn9024_firmwaresa6155p_firmwarec-v2x_9150qca4024ipq9008_firmwarewcn3950sm6650_firmwaresa4155psrv1h_firmwareqca8082fastconnect_7800qcs6125_firmwareqcf8000_firmwareqfw7124sd_675qcs6125qcn5021sa6145pqcm5430talynplussa8530p_firmwaresd730_firmwaresm6250p_firmwareqcn6422_firmwareqcn6422qca6174asnapdragon_7c_compute_platform_\(sc7180-ac\)_firmwareqca6335snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)ipq9048_firmwareqca8337qru1032sd460_firmwareqca0000_firmwareqam8620p_firmware315_5g_iot_modemwcn3990_firmwaresnapdragon_auto_4g_modem_firmwarewcd9371_firmwarewcn3990qca6574auipq6018_firmwareqcs5430_firmwaresa8770p_firmwareqca6420sxr2130ipq5332_firmwaresa8255psm8635_firmwareSnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-21464
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 2.42%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-28 Nov, 2025 | 16:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Read in Core

Information disclosure while reading data from an image using specified offset and size parameters.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9000_firmwareqca8072_firmwaresdx80msdx55sm4125qam8650psnapdragon_x72_5g_modem-rf_systemqcn5121sa6155psnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_7c\+_gen_3_compute_firmwaresnapdragon_8\+_gen_2_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwareqfw7124_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresdx61aqt1000snapdragon_8cx_compute_platform_\(sc8180x-ab\)qdx1011snapdragon_8_gen_2_mobile_platform_firmwaresm7325p_firmwareqxm8083_firmwareqcn9022_firmwareqam8255p_firmwaresrv1l_firmwarevision_intelligence_400_platformsa8150p_firmwareqcf8000sfpqcm8550_firmwareqamsrv1h_firmwaresnapdragon_auto_4g_modemsd855wcd9341_firmwaresd_8_gen1_5gsnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_845_mobile_platformqca8075wcd9306_firmwarewcd9385_firmwareqcm6490_firmwaresnapdragon_x62_5g_modem-rf_systemqcn9072sa7255p_firmwareqcn6412_firmwareqcs4290qcs4290_firmwareqca6335_firmwareqca6584au_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x62_5g_modem-rf_system_firmwaresd_675_firmwaresm8635p_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwareqcm8550snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqcn9024sc8380xp_firmwarewsa8815sm7315qcs8300srv1hqcm4490_firmwaresnapdragon_855_mobile_platformvideo_collaboration_vc5_platformwcd9326_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)snapdragon_480_5g_mobile_platform_firmwareqca6421_firmwaresm8550p_firmwarevideo_collaboration_vc3_platform_firmwareqca6574au_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)qcm4290_firmwaresnapdragon_662_mobile_platform_firmwaresnapdragon_wear_1300_platform_firmwareqca6595au_firmwaresnapdragon_460_mobile_platformsnapdragon_8_gen_2_mobile_platformqdx1010qsm8250_firmwarecsra6620wcn3980qca6584auipq5312sd662_firmwarevision_intelligence_300_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresa8145p_firmwareqcn6224_firmwaresm8750_firmwareqcm2290smart_audio_400_platformsa8155pqcm6125sa8540p_firmwarewcd9385qca4024_firmwarewcd9380_firmwareqca8386_firmwareqsm8250qcn5124_firmwaresm8750pwcn6450snapdragon_680_4g_mobile_platformsnapdragon_675_mobile_platformqcf8000sfp_firmwaresc8180x\+sdx55_firmwareipq9048wcn7880ipq6028sg8275p_firmwareqca8337_firmwaresd662wcn3988_firmwarecsra6640_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwareqca6698aqsnapdragon_x70_modem-rf_systemqsm8350_firmwareipq9554_firmwaresnapdragon_x24_lte_modemsm7675psm6250fastconnect_6800qca6574a_firmware9205_lte_modemwsa8832_firmwaresa8650psa2150p_firmwaresxr2230p_firmwaresnapdragon_690_5g_mobile_platform_firmwareqca6678aq_firmwaresm6250_firmwareqsm8350qcn9070snapdragon_680_4g_mobile_platform_firmwaresm8550pwcd9378_firmwareqcn9013_firmwarewcn7881_firmwareqcn6023_firmwareqcn9274_firmwareqca6431_firmwaressg2115p_firmwaresm7315_firmwarefastconnect_6900_firmwareqca6678aqwsa8835_firmwaresa8295psc8380xpqdx1011_firmwaresdx55_firmwaresd730wcn3988sa8540pqca6696_firmwarevision_intelligence_300_platformqca8084snapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqcs4490_firmwaresm7675_firmwareqcn5022qcn9012snapdragon_662_mobile_platformsxr2250pwcn6755_firmwaresxr2330p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwarewsa8810_firmwarewcn6650wcd9360qdu1110_firmwareipq9554wsa8840qcm4325snapdragon_778g_5g_mobile_platformqdu1110csr8811ipq9574wsa8840_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqcc711_firmwareipq6000qdu1000sm7250p_firmwarewcn3950_firmwareqcn5122_firmwarewsa8845hqrb5165msnapdragon_auto_5g_modem-rf_firmwareqca6310snapdragon_780g_5g_mobile_platform_firmwaresdx57mssg2125p_firmwaresnapdragon_720g_mobile_platform_firmwareqcn9274snapdragon_865_5g_mobile_platformsnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)sm7325pqca0000qcn6024_firmwareqcm4290qcs9100qfw7114snapdragon_665_mobile_platform_firmwareqca6421wcd9370_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)ar8035_firmwareqcn9000srv1lwsa8845sdx80m_firmwareimmersive_home_326_platformwcn7860_firmwareqamsrv1hqru1062sm8750snapdragon_xr2_5g_platformsa6150p_firmwaresg4150p_firmwarewcn3910_firmwaresm8750p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresg8275pqca4004fastconnect_7800_firmwareqxm8083qru1052_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)qca9984sxr2230psa8620p_firmwaresnapdragon_ar2_gen_1_platformqcs7230snapdragon_850_mobile_compute_platform_firmwaresnapdragon_695_5g_mobile_platformrobotics_rb2_platform_firmwaresa8770pqrb5165nsrv1m_firmwarewcd9375qca6574_firmwaresnapdragon_x24_lte_modem_firmwaresa6145p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqca6430qca6391_firmwareqdu1000_firmwarewcn6755snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresd_8cx_firmwareipq9570_firmwaresnapdragon_8_gen_3_mobile_platformqcn5052qca6688aq_firmwareqcf8001qcn5124ipq5300sw5100p_firmwaresnapdragon_850_mobile_compute_platformsa6155_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_x75_5g_modem-rf_systemwcn7861sa8775pwcn6650_firmwareqcn5022_firmwareimmersive_home_326_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qca6431sd_8cxfastconnect_6800_firmwarewcd9375_firmwareimmersive_home_3210_platformqcn9074_firmwareqca6564auqca6595auqcc710ssg2125pqamsrv1mqca8085_firmwaresnapdragon_wear_1300_platformsnapdragon_ar2_gen_1_platform_firmwareqfw7114_firmwareqru1032_firmwareqts110_firmwaresm8635psnapdragon_670_mobile_platformsnapdragon_x50_5g_modem-rf_system_firmwareqcs9100_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqca6174a_firmwaresm4635qca6564a_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwaresw5100talynplus_firmwarewsa8830qcn5122csrb31024wsa8830_firmwareqcn6023qca6430_firmwaresa8155p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareqcm6490c-v2x_9150_firmwaresnapdragon_xr2_5g_platform_firmwaresd865_5g_firmwareqca6436_firmwareqca6595wcn3999ipq9574_firmwaresnapdragon_750g_5g_mobile_platformwcd9380smart_audio_400_platform_firmware315_5g_iot_modem_firmwareqcs6490_firmwareqca6564snapdragon_888_5g_mobile_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwareqca6310_firmwareipq6000_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresd670_firmwareqca6420_firmwareqca6688aqwcd9340_firmwareqamsrv1m_firmwaresnapdragon_720g_mobile_platformsnapdragon_730g_mobile_platform_\(sm7150-ab\)ar8031qcs8550qca9984_firmwareqep8111_firmwarewcn3950qcn5021_firmwaresdx65msnapdragon_x50_5g_modem-rf_systemsdx61_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_665_mobile_platformsm4635_firmwaresnapdragon_auto_5g_modem-rf_gen_2wcd9360_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwareqam8295pssg2115psm7675qep8111qca6391csr8811_firmwaresa8295p_firmware9205_lte_modem_firmwareqcs6490ipq9570wsa8810qcs610qts110qcn9160_firmwaresnapdragon_xr2\+_gen_1_platformqdu1010_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresg4150pvideo_collaboration_vc5_platform_firmwareqru1062_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm6370sd_8_gen1_5g_firmwarewcd9378snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwareipq6028_firmwaresa8530pqcs8300_firmwareqca8386snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwareqcs8250_firmwarewcn7880_firmwaresnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwareqcn6274snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)sa8150pqcs610_firmwaresnapdragon_x70_modem-rf_system_firmwareqca6797aqqam8650p_firmwareipq6005qca6564asnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sw5100_firmwareqcs410ipq6005_firmwareqcn6024qca9377_firmwareqca8075_firmwareqca6574asnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)wcn3999_firmwareqca6564_firmwareqca8082_firmwareqca6436wsa8845_firmwareqrb5165n_firmwarewcd9340wcd9341sa7255pqca6426_firmwareqcs8155_firmwaresd460snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarefastconnect_6200snapdragon_7c_compute_platform_\(sc7180-ac\)sd888snapdragon_x35_5g_modem-rf_systemsnapdragon_675_mobile_platform_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareimmersive_home_3210_platform_firmwareipq6018wsa8832aqt1000_firmwaresnapdragon_ar1_gen_1_platform_firmwaresd675_firmwareqdu1210sdx65m_firmwareqcn6224snapdragon_7c\+_gen_3_computesnapdragon_ar1_gen_1_platformsm6250pqcs2290sdx57m_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)snapdragon_670_mobile_platform_firmwarewcd9370qca8081_firmwareqcc710_firmwareqca6698aq_firmwarecsra6640wcd9306qcn9013sa4150psw5100psc8180x\+sdx55wcn7860sm7250psm6650qcs5430qcs2290_firmwaresa8145pwsa8845h_firmwarewcd9371sd670wcd9395_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresa8195psa9000psnapdragon_4_gen_1_mobile_platformipq6010snapdragon_888_5g_mobile_platformqcn9072_firmwarewcd9390ar8035sa8775p_firmwaresm7675p_firmwareqcn7606_firmwareqam8775pqcm2290_firmwaremdm9205svision_intelligence_400_platform_firmwareqca6797aq_firmwareqcs8250qca6564au_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)sa8650p_firmwaremdm9205s_firmwareqcn9011_firmwareqcc711snapdragon_678_mobile_platform_\(sm6150-ac\)wcn7881robotics_rb3_platform_firmwaresxr2250p_firmwaresnapdragon_780g_5g_mobile_platformsrv1mqcn9012_firmwarecsra6620_firmwarewcd9395qcs410_firmwareqcn5052_firmwareqcm4490qru1052robotics_rb2_platformsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwareqca8085qdu1210_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)qca4004_firmwaresxr1230pwcn7861_firmwareqca9377qcn7606fastconnect_6700_firmwaresa8155_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwarefastconnect_6700snapdragon_730_mobile_platform_\(sm7150-aa\)_firmwareipq5300_firmwareqca6696wcn3980_firmwareqcm5430_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)sxr2330pqcs8550_firmwarerobotics_rb5_platformqca6426qdx1010_firmwaresa4155p_firmwareipq9008qcn9074qcn9011snapdragon_8\+_gen_1_mobile_platformqca8084_firmwareqcf8000qcn5121_firmwaresa2150pqam8295p_firmwarewcn3910qcf8001_firmwaresm7635_firmwaresnapdragon_690_5g_mobile_platformsnapdragon_4_gen_2_mobile_platformwcd9326snapdragon_x55_5g_modem-rf_systemsnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformqdu1010snapdragon_865_5g_mobile_platform_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwaresa8155snapdragon_695_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcn9022qcm6125_firmwaresdx71m_firmwareqca6574wcn6740_firmwaresa8255p_firmwareqcn6412ipq5332qcs7230_firmwaresa6155sxr1230p_firmwaresd855_firmwareipq5302snapdragon_782g_mobile_platform_\(sm7325-af\)qcn9160sdx71msnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwarerobotics_rb5_platform_firmwarevideo_collaboration_vc1_platform_firmwareqcn6432snapdragon_ar1_gen_1_platform_\"luna1\"snapdragon_765_5g_mobile_platform_\(sm7250-aa\)qcs8155sd675sa7775pvideo_collaboration_vc1_platformqcn6402qcn6402_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_8_gen_1_mobile_platform_firmwareqcs4490flight_rb5_5g_platform_firmwaresa8620pwcn6450_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_auto_5g_modem-rfsm6370_firmwareqrb5165m_firmwareqca6595_firmwareqam8775p_firmwaresa8195p_firmwaresnapdragon_x65_5g_modem-rf_systemqcn6432_firmwarewcn6740qca8081sm7635qcm4325_firmwareqcn5152qcn5152_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)wcd9335_firmwaresd888_firmwaresm8635sa7775p_firmwarecsrb31024_firmwareipq5302_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcd9335wsa8815_firmwareipq5312_firmwaresa9000p_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwarefastconnect_6900qam8255pvideo_collaboration_vc3_platformqcn6274_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6200_firmwarewsa8835sd865_5grobotics_rb3_platformqca8072flight_rb5_5g_platformsa6150pqam8620pipq6010_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresm4125_firmwarear8031_firmwareqcn9070_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwareqcn9024_firmwaresa6155p_firmwarec-v2x_9150qca4024ipq9008_firmwaresa4155psm6650_firmwaresrv1h_firmwaresxr2130_firmwareqca8082fastconnect_7800qcs6125_firmwareqcf8000_firmwareqfw7124sd_675qcs6125qcn5021sa6145pqcm5430talynplussa8530p_firmwaresd730_firmwaresm6250p_firmwareqcn6422_firmwareqcn6422qca6174aqca6335qca8337snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)ipq9048_firmwaresnapdragon_7c_compute_platform_\(sc7180-ac\)_firmwareqru1032sd460_firmwareqca0000_firmwareqam8620p_firmware315_5g_iot_modemsnapdragon_auto_4g_modem_firmwarewcd9371_firmwarewcn3990_firmwarewcn3990qca6574auipq6018_firmwareqcs5430_firmwaresa8770p_firmwareqca6420sxr2130ipq5332_firmwaresa8255psm8635_firmwareSnapdragon
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-21018
Assigner-Samsung Mobile
ShareView Details
Assigner-Samsung Mobile
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 3.21%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 04:23
Updated-15 Aug, 2025 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to read out-of-bounds memory.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-blockchain_keystoreBlockchain Keystore
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-54650
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-4.2||MEDIUM
EPSS-0.02% / 4.06%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 02:54
Updated-06 Aug, 2025 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper array index verification vulnerability in the audio codec module. Impact: Successful exploitation of this vulnerability may affect the audio decoding function.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-HarmonyOS
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-54648
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 02:52
Updated-13 Aug, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read vulnerability in the SSAP module of the NearLink protocol stack. Impact: Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-54647
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 02:51
Updated-13 Aug, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read vulnerability in the SSAP module of the NearLink protocol stack. Impact: Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-54645
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-5||MEDIUM
EPSS-0.01% / 0.50%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 02:48
Updated-13 Aug, 2025 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds array access issue due to insufficient data verification in the location service module. Impact: Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-54644
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 0.98%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 02:47
Updated-06 Aug, 2025 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-EMUIHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-54643
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 1.12%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 02:45
Updated-06 Aug, 2025 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-EMUIHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-54637
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.93%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 02:33
Updated-11 Aug, 2025 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosEMUIHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-54633
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.91%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 02:20
Updated-11 Aug, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read vulnerability in the register configuration of the DMA module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-54623
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 01:44
Updated-20 Aug, 2025 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds read vulnerability in the devicemanager module. Impact: Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-680
Integer Overflow to Buffer Overflow
CVE-2025-54617
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 10.54%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 01:28
Updated-06 Aug, 2025 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Stack-based buffer overflow vulnerability in the dms_fwk module. Impact: Successful exploitation of this vulnerability can cause RCE.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-HarmonyOS
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-8653
Assigner-Zero Day Initiative
ShareView Details
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-0.07% / 22.00%
||
7 Day CHG+0.01%
Published-06 Aug, 2025 | 01:18
Updated-07 Aug, 2025 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kenwood DMX958XR JKRadioService Stack-based Buffer Overflow Remote Code Execution Vulnerability

Kenwood DMX958XR JKRadioService Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Kenwood DMX958XR. Authentication is not required to exploit this vulnerability. The specific flaw exists within the JKRadioService. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26312.

Action-Not Available
Vendor-jvckenwoodKenwood
Product-dmx958xrdmx958xr_firmwareDMX958XR
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-54610
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 4.27%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 01:15
Updated-12 Aug, 2025 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds access vulnerability in the audio codec module. Impact: Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-54609
Assigner-Huawei Technologies
ShareView Details
Assigner-Huawei Technologies
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 4.27%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 01:14
Updated-12 Aug, 2025 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds access vulnerability in the audio codec module. Impact: Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2012-10023
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-70.59% / 98.68%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 20:02
Updated-20 Nov, 2025 | 21:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeFloat FTP Server USER Command Buffer Overflow

A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.

Action-Not Available
Vendor-freefloatFreeFloat
Product-freefloat_ftp_serverFTP Server
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2013-10068
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.4||CRITICAL
EPSS-54.70% / 98.00%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 20:01
Updated-21 Nov, 2025 | 00:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Foxit Reader <= 5.4.5.0114 Plugin URL Processing Buffer Overflow

Foxit Reader Plugin version 2.2.1.530, bundled with Foxit Reader 5.4.4.11281, contains a stack-based buffer overflow vulnerability in the npFoxitReaderPlugin.dll module. When a PDF file is loaded from a remote host, an overly long query string in the URL can overflow a buffer, allowing remote attackers to execute arbitrary code.

Action-Not Available
Vendor-Foxit Software Incorporated
Product-Foxit Reader
CWE ID-CWE-121
Stack-based Buffer Overflow
  • Previous
  • 1
  • 2
  • ...
  • 32
  • 33
  • 34
  • ...
  • 490
  • 491
  • Next