Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-131:Incorrect Calculation of Buffer Size
Weakness ID:131
Version:v4.17
Weakness Name:Incorrect Calculation of Buffer Size
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Draft
Likelihood of Exploit:High
DetailsContent HistoryObserved CVE ExamplesReports
174Vulnerabilities found

CVE-2026-41676
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.2||HIGH
EPSS-0.04% / 12.83%
||
7 Day CHG~0.00%
Published-24 Apr, 2026 | 17:16
Updated-24 Apr, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
rust-openssl: Deriver::derive and PkeyCtxRef::derive can overflow short buffers on OpenSSL 1.1.1

rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.

Action-Not Available
Vendor-rust-openssl
Product-rust-openssl
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-1949
Assigner-Delta Electronics, Inc.
ShareView Details
Assigner-Delta Electronics, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 5.12%
||
7 Day CHG~0.00%
Published-24 Apr, 2026 | 05:50
Updated-24 Apr, 2026 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect calculation of buffer size on the stack in AS320T

Delta Electronics AS320T has incorrect calculation of the buffer size on the stack in the GET/PUT request handler of the web service.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-AS320T
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-41197
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 12.83%
||
7 Day CHG~0.00%
Published-23 Apr, 2026 | 00:35
Updated-25 Apr, 2026 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Brillig: Heap corruption in foreign call results with nested tuple arrays

Noir is a Domain Specific Language for SNARK proving systems that is designed to use any ACIR compatible proving system, and Brillig is the bytecode ACIR uses for non-determinism. Noir programs can invoke external functions through foreign calls. When compiling to Brillig bytecode, the SSA instructions are processed block-by-block in `BrilligBlock::compile_block()`. When the compiler encounters an `Instruction::Call` with a `Value::ForeignFunction` target, it invokes `codegen_call()` in `brillig_call/code_gen_call.rs`, which dispatches to `convert_ssa_foreign_call()`. Before emitting the foreign call opcode, the compiler must pre-allocate memory for any array results the call will return. This happens through `allocate_external_call_results()`, which iterates over the result types. For `Type::Array` results, it delegates to `allocate_foreign_call_result_array()` to recursively allocate memory on the heap for nested arrays. The `BrilligArray` struct is the internal representation of a Noir array in Brillig IR. Its `size` field represents the semi-flattened size, the total number of memory slots the array occupies, accounting for the fact that composite types like tuples consume multiple slots per element. This size is computed by `compute_array_length()` in `brillig_block_variables.rs`. For the outer array, `allocate_external_call_results()` correctly uses `define_variable()`, which internally calls `allocate_value_with_type()`. This function applies the formula above, producing the correct semi-flattened size. However, for nested arrays, `allocate_foreign_call_result_array()` contains a bug. The pattern `Type::Array(_, nested_size)` discards the inner types with `_` and uses only `nested_size`, the semantic length of the nested array (the number of logical elements), not the semi-flattened size. For simple element types this works correctly, but for composite element types it under-allocates. Foreign calls returning nested arrays of tuples or other composite types corrupt the Brillig VM heap. Version 1.0.0-beta.19 fixes this issue.

Action-Not Available
Vendor-noir-lang
Product-noir
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-29645
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 9.07%
||
7 Day CHG~0.00%
Published-20 Apr, 2026 | 00:00
Updated-24 Apr, 2026 | 19:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NEMU (OpenXiangShan/NEMU) before v2025.12.r2 contains an improper instruction-validation flaw in its RISC-V Vector (RVV) decoder. The decoder does not correctly validate the funct3 field when decoding vsetvli/vsetivli/vsetvl, allowing certain invalid OP-V instruction encodings to be misinterpreted and executed as vset* configuration instructions rather than raising an illegal-instruction exception. This can be exploited by providing crafted RISC-V binaries to cause incorrect trap behavior, architectural state corruption/divergence, and potential denial of service in systems that rely on NEMU for correct execution or sandboxing.

Action-Not Available
Vendor-xiangshann/a
Product-nemun/a
CWE ID-CWE-1287
Improper Validation of Specified Type of Input
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-27820
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-1.7||LOW
EPSS-0.02% / 4.67%
||
7 Day CHG-0.02%
Published-16 Apr, 2026 | 17:27
Updated-17 Apr, 2026 | 15:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
zlib: Buffer Overflow in Zlib::GzipReader ungetc via large input leads to memory corruption

zlib is a Ruby interface for the zlib compression/decompression library. Versions 3.0.0 and below, 3.1.0, 3.1.1, 3.2.0 and 3.2.1 contain a buffer overflow vulnerability in the Zlib::GzipReader. The zstream_buffer_ungets function prepends caller-provided bytes ahead of previously produced output but fails to guarantee the backing Ruby string has enough capacity before the memmove shifts the existing data. This can lead to memory corruption when the buffer length exceeds capacity. This issue has been fixed in versions 3.0.1, 3.1.2 and 3.2.3.

Action-Not Available
Vendor-Ruby
Product-zlib
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-40918
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 5.10%
||
7 Day CHG+0.01%
Published-15 Apr, 2026 | 18:59
Updated-20 Apr, 2026 | 17:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gimp: gimp: denial of service via crafted pvr image file

A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can lead to a denial of service (DoS). This occurs due to a stack-based buffer overflow and an out-of-bounds read in the PVR image loader, causing the application to crash. Systems that process untrusted PVR image files are affected.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-20911
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 16.50%
||
7 Day CHG~0.00%
Published-07 Apr, 2026 | 13:49
Updated-10 Apr, 2026 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the HuffTable::initval functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Action-Not Available
Vendor-librawLibRaw
Product-librawLibRaw
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-33987
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.01% / 2.20%
||
7 Day CHG~0.00%
Published-30 Mar, 2026 | 21:43
Updated-01 Apr, 2026 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeRDP: Persistent Cache bmpSize Desync - Heap OOB Write

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in persistent_cache_read_entry_v3() in libfreerdp/cache/persistent.c, persistent->bmpSize is updated before winpr_aligned_recalloc(). If realloc fails, bmpSize is inflated while bmpData points to the old buffer. This issue has been patched in version 3.24.2.

Action-Not Available
Vendor-FreeRDP
Product-freerdpFreeRDP
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-33986
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.04% / 13.64%
||
7 Day CHG~0.00%
Published-30 Mar, 2026 | 21:43
Updated-01 Apr, 2026 | 19:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeRDP: H.264 YUV Buffer Dimension Desync - Heap OOB Write

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in yuv_ensure_buffer() in libfreerdp/codec/h264.c, h264->width and h264->height are updated before the reallocation loop. If any winpr_aligned_recalloc() call fails, the function returns FALSE but width/height are already inflated. This issue has been patched in version 3.24.2.

Action-Not Available
Vendor-FreeRDP
Product-freerdpFreeRDP
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-33985
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 13.29%
||
7 Day CHG~0.00%
Published-30 Mar, 2026 | 21:43
Updated-01 Apr, 2026 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeRDP: ClearCodec Glyph Cache Count Desync - Heap OOB Read

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, pixel data from adjacent heap memory is rendered to screen, potentially leaking sensitive data to the attacker. This issue has been patched in version 3.24.2.

Action-Not Available
Vendor-FreeRDP
Product-freerdpFreeRDP
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-33984
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.05% / 13.93%
||
7 Day CHG~0.00%
Published-30 Mar, 2026 | 21:42
Updated-02 Apr, 2026 | 12:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeRDP: ClearCodec resize_vbar_entry() Heap OOB Write

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in resize_vbar_entry() in libfreerdp/codec/clear.c, vBarEntry->size is updated to vBarEntry->count before the winpr_aligned_recalloc() call. If realloc fails, size is inflated while pixels still points to the old, smaller buffer. On a subsequent call where count <= size (the inflated value), realloc is skipped. The caller then writes count * bpp bytes of attacker-controlled pixel data into the undersized buffer, causing a heap buffer overflow. This issue has been patched in version 3.24.2.

Action-Not Available
Vendor-FreeRDP
Product-freerdpFreeRDP
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-33216
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 0.85%
||
7 Day CHG~0.00%
Published-24 Mar, 2026 | 20:21
Updated-25 Mar, 2026 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA SNAP-4 Container contains a vulnerability in the configuration interface where an attacker on a VM may cause an incorrect calculation of buffer size by sending crafted configurations. A successful exploit of this vulnerability may lead to crash of the SNAP service, causing denial of service of the storage service to the host.

Action-Not Available
Vendor-NVIDIA Corporation
Product-SNAP-4 Container
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2019-25555
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 4.40%
||
7 Day CHG~0.00%
Published-21 Mar, 2026 | 12:46
Updated-24 Mar, 2026 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TwistedBrush Pro Studio 24.06 Script Recorder Denial of Service

TwistedBrush Pro Studio 24.06 contains a denial of service vulnerability in the Script Recorder component that allows local attackers to crash the application by supplying an excessively large buffer. Attackers can paste a malicious string containing 500,000 characters into the Description field of the Script Recorder dialog to trigger an application crash.

Action-Not Available
Vendor-pixarraPixarra
Product-twistedbrush_pro_studioTwistedBrush Pro Studio
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-31970
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.06% / 18.20%
||
7 Day CHG~0.00%
Published-18 Mar, 2026 | 19:53
Updated-19 Mar, 2026 | 13:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTSlib BGZF index file reader has a heap buffer overflow

HTSlib is a library for reading and writing bioinformatics file formats. GZI files are used to index block-compressed GZIP [BGZF] files. In the GZI loading function, `bgzf_index_load_hfile()`, it was possible to trigger an integer overflow, leading to an under- or zero-sized buffer being allocated to store the index. Sixteen zero bytes would then be written to this buffer, and, depending on the result of the overflow the rest of the file may also be loaded into the buffer as well. If the function did attempt to load the data, it would eventually fail due to not reading the expected number of records, and then try to free the overflowed heap buffer. Exploiting this bug causes a heap buffer overflow. If a user opens a file crafted to exploit this issue, it could lead to the program crashing, or overwriting of data and heap structures in ways not expected by the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. The easiest work-around is to discard any `.gzi` index files from untrusted sources, and use the `bgzip -r` option to recreate them.

Action-Not Available
Vendor-htslibsamtools
Product-htslibhtslib
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-28686
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 5.02%
||
7 Day CHG~0.00%
Published-09 Mar, 2026 | 21:33
Updated-12 Mar, 2026 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has a write heap-buffer-overflow in PCL encoder via undersized output buffer

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-20049
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-7.7||HIGH
EPSS-0.18% / 39.07%
||
7 Day CHG~0.00%
Published-04 Mar, 2026 | 17:22
Updated-16 Apr, 2026 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to the allocation of an insufficiently sized block of memory. An attacker could exploit this vulnerability by sending crafted GCM-encrypted IPsec traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. To exploit this vulnerability, the attacker must have valid credentials to establish a VPN connection with the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defense_softwareadaptive_security_appliance_softwareCisco Secure Firewall Adaptive Security Appliance (ASA) SoftwareCisco Secure Firewall Threat Defense (FTD) Software
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-2738
Assigner-OpenVPN Inc.
ShareView Details
Assigner-OpenVPN Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.02% / 5.68%
||
7 Day CHG~0.00%
Published-19 Feb, 2026 | 20:00
Updated-20 Feb, 2026 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ovpn‑dco‑win version 2.8.0 allows local attackers to cause a system crash by sending too large packets to the remote peer when the AEAD tag appears at the end of the encrypted packet

Action-Not Available
Vendor-OpenVPN
Product-ovpn-dco-win
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-33124
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 19.30%
||
7 Day CHG+0.01%
Published-17 Feb, 2026 | 19:13
Updated-26 Feb, 2026 | 23:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fixes to common vulnerabilities found in IBM Db2 Merge Backup for Linux, UNIX and Windows

IBM DB2 Merge Backup for Linux, UNIX and Windows 12.1.0.0 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.

Action-Not Available
Vendor-IBM Corporation
Product-db2_merge_backupDB2 Merge Backup for Linux, UNIX and Windows
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-1188
Assigner-Eclipse Foundation
ShareView Details
Assigner-Eclipse Foundation
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 5.89%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 08:36
Updated-09 Feb, 2026 | 15:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Eclipse OMR port library component since release 0.2.0, an API function to return the textual names of all supported processor features was not accounting for the separator inserted between processor features. If the output buffer supplied to this function was incorrectly sized, failing to account for the separator when determining when a write to the buffer was safe could lead to a buffer overflow. This issue is fixed in Eclipse OMR version 0.8.0.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-omrEclipse OMR
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-22791
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 4.41%
||
7 Day CHG~0.00%
Published-13 Jan, 2026 | 19:06
Updated-03 Feb, 2026 | 18:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
openCryptoki incorrectly calculates the buffer size in C_WrapKey with CKM_ECDH_AES_KEY_WRAP

openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.26.0, there is a heap buffer overflow vulnerability in the CKM_ECDH_AES_KEY_WRAP implementation allows an attacker with local access to cause out-of-bounds writes in the host process by supplying a compressed EC public key and invoking C_WrapKey. This can lead to heap corruption, or denial-of-service.

Action-Not Available
Vendor-opencryptoki_projectopencryptoki
Product-opencryptokiopencryptoki
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2026-21503
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 7.87%
||
7 Day CHG~0.00%
Published-07 Jan, 2026 | 17:10
Updated-09 Jan, 2026 | 21:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iccDEV has Undefined Behavior - Null Pointer Passed to memcpy() in CIccTagSparseMatrixArray

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV has undefined behavior due to a null pointer passed to memcpy() in CIccTagSparseMatrixArray. This issue has been patched in version 2.3.1.2.

Action-Not Available
Vendor-InternationalColorConsortiumInternational Color Consortium (ICC)
Product-iccdeviccDEV
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-628
Function Call with Incorrectly Specified Arguments
CVE-2025-62550
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-0.17% / 37.41%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:55
Updated-16 Apr, 2026 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Azure Monitor Agent Remote Code Execution Vulnerability

Out-of-bounds write in Azure Monitor Agent allows an authorized attacker to execute code over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-azure_monitor_agentAzure Monitor
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-66216
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.11% / 29.74%
||
7 Day CHG~0.00%
Published-29 Nov, 2025 | 01:57
Updated-23 Dec, 2025 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AIS-catcher has a Buffer Overflow vulnerability in `AIS::Message` leading to DoS/RCE

AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, a heap buffer overflow vulnerability has been identified in the AIS::Message class of AIS-catcher. This vulnerability allows an attacker to write approximately 1KB of arbitrary data into a 128-byte buffer. This issue has been patched in version 0.64.

Action-Not Available
Vendor-aiscatcherjvde-github
Product-ais-catcherAIS-catcher
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-61661
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 6.69%
||
7 Day CHG~0.00%
Published-18 Nov, 2025 | 18:20
Updated-19 Dec, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Grub2: grub2: out-of-bounds write via malicious usb device

A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.

Action-Not Available
Vendor-Red Hat, Inc.GNU
Product-Red Hat Enterprise Linux 8Red Hat Enterprise Linux 10Red Hat Enterprise Linux 9grub2Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 7
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-27074
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.8||HIGH
EPSS-0.02% / 3.75%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Calculation of Buffer Size in SCE-Mink

Memory corruption while processing a GP command response.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9650msm8996auipq8076a_firmwareqcn9001ipq5010pmp8074snapdragon_821_mobile_platform_firmwareqcn5064_firmwareqca6320_firmwareipq8078a_firmwareipq8078aqcn9022_firmwareqcn9070_firmwareqcn9012ipq5028_firmwaresd821_firmwareqca8075qcn6024_firmwareqcn9074_firmwaresnapdragon_429_mobile_platformqca8075_firmwareipq8074_firmwareqcn5052_firmwarewcn3660bipq9008qca8081_firmwareqcn9003qca8081qca6574qcn6112_firmwarepmp8074_firmwareqcn5054ipq8072a_firmwarecsr8811immersive_home_318_platform_firmwareqcn5550ipq8070aqca6564aqcn9001_firmwareqcn5164qcn9002ipq8076qcn9072_firmwareqcn9100_firmwareqcn9070snapdragon_820_mobile_platform_firmwareqcn5154_firmwareqcn5164_firmwaresd820apq8064au_firmwareqca6438qcn6023qca4024_firmwareqca6584au_firmwareqca6234_firmwareqcn6023_firmwareimmersive_home_214_platformsnapdragon_wear_4100\+_platformsnapdragon_wear_4100\+_platform_firmwareipq8173_firmwaresnapdragon_429_mobile_platform_firmwareqca6310_firmwareipq8174_firmwareqcn9012_firmwareqcn5154qcn5124immersive_home_316_platformqcn6024ipq9574apq8064aumsm8996au_firmwaremdm9650_firmwareipq8173qca9984_firmwareqca6574a_firmwareqcn5152_firmwareqcn5152qcn6100_firmwareqcn6100ipq8070_firmwarecsr8811_firmwareqca4024wsa8810_firmwarewcn3620_firmwareipq8071a_firmwareqcn5054_firmwareqcn5550_firmwareqca6174a_firmwareqcn6102qcn9000_firmwarewcn3620wcn3980_firmwareqcn5024_firmwarewcn3610_firmwareqca6438_firmwareqca9984wcn3680b_firmwareqcn6132snapdragon_820_automotive_platformipq8071aqcn6112ipq8174wsa8810ipq8072sdm429w_firmwareqca6310qca6574au_firmwareqcn9024ipq8070a_firmwarewcn3680bqcn9022wcd9335_firmwaresd820_firmwareipq8078qca6174aqca9889ipq8074aqca9888immersive_home_216_platformqcn9074qcn6132_firmwarewcn3980qca6428sdx55immersive_home_216_platform_firmwareimmersive_home_318_platformqca6564a_firmwareqcn9072qcn5122sdm429wwcn3660b_firmwareqca8072qca6574ausdx55_firmwareipq5010_firmwareipq8074a_firmwareipq8078_firmwaresnapdragon_820_mobile_platformqcn9003_firmwareqcn9024_firmwareipq8076aqcn6102_firmwareqca6428_firmwareqcn9000ipq8070qcn9274snapdragon_821_mobile_platformqca9889_firmwareipq8071immersive_home_316_platform_firmwarewcn3610qca6694ipq8072asd821ipq8072_firmwareqca9888_firmwareqcn5022qcn9100qca6564au_firmwarewsa8815ipq8074qcn5022_firmwareqca6320wsa8815_firmwaremdm9640ipq9008_firmwareqcn5052qca6694_firmwareipq8076_firmwaresnapdragon_820_automotive_platform_firmwareqca6574aqcn9274_firmwaremdm9640_firmwareimmersive_home_214_platform_firmwarewcd9335qcn5124_firmwareqcn6122ipq5028qca6234ipq9574_firmwareqca6564auqcn5122_firmwareqcn6122_firmwareqca6574_firmwareqcn5064qcn9002_firmwareqca8072_firmwareipq8071_firmwareqca6584auqcn5024Snapdragon
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-33126
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.17%
||
7 Day CHG~0.00%
Published-27 Oct, 2025 | 23:56
Updated-05 Nov, 2025 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fixes to common vulnerabilities found in IBM Db2 High Performance Unload

IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-db2_high_performance_unload_loadwindowsaixlinux_kernellinux_on_ibm_zDB2 High Performance Unload
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-27053
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.75%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Calculation of Buffer Size in HLOS

Memory corruption during PlayReady APP usecase while processing TA commands.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs9100_firmwaremsm8996auqdu1000_firmwaresnapdragon_626_mobile_platform_firmwaresnapdragon_821_mobile_platform_firmwareqca6426_firmwareqcs6490215_mobile_platform_firmwarerobotics_rb5_platform9207_lte_modem_firmwaresg6150_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcs5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresnapdragon_429_mobile_platformsm7635psc8380xpsm8750_firmwareqam8775p_firmwaresm8550psnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarefastconnect_6900sa8770psnapdragon_690_5g_mobile_platformsa8775pqca8386sm8735snapdragon_695_5g_mobile_platformsm8850p_firmware9205_lte_modemqcs8300qca6564aqdu1210sa7775p_firmwareqcs4490snapdragon_820_mobile_platform_firmwareqca6420_firmwareqru1052_firmwareqru1062sd888sd820apq8064au_firmwareqdx1010_firmwarerobotics_rb2_platformsm7635p_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwaresa8530pqca6595ausm6650p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)qcn9012_firmwarevision_intelligence_100_platform_\(apq8053-aa\)qcm4490snapdragon_xr1_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresnapdragon_632_mobile_platform_firmwaresm6250qcm6490_firmwaresm8850_firmwareqca8695auqcm6125snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)msm8996au_firmwaresm6370_firmwaresm7325pfastconnect_6200smart_display_200_platform_\(apq5053-aa\)qcn9011_firmwaresnapdragon_888_5g_mobile_platformsa6150p_firmwaresnapdragon_662_mobile_platformqmp1000_firmwareqamsrv1msw5100p215_mobile_platformqca9377qcs7230sxr2250pqmp1000home_hub_100_platform_firmwaresnapdragon_ar2_gen_1_platformsm6370flight_rb5_5g_platform_firmwaremdm9250_firmwaresnapdragon_wear_1300_platform_firmwaresnapdragon_x72_5g_modem-rf_systemrobotics_rb3_platform_firmwaresd820_firmwaresnapdragon_670_mobile_platformsnapdragon_665_mobile_platform_firmwarecsra6620_firmwaresnapdragon_845_mobile_platform_firmwaresm7315snapdragon_450_mobile_platform_firmwareflight_rb5_5g_platformqca6335robotics_rb3_platformqcm2290_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)qcm8550qca9367_firmwareqca9367qca9377_firmwaresa8195p_firmwaresd_675sa6150psnapdragon_auto_4g_modemsnapdragon_8_gen_3_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180x-aa\)sa8155psnapdragon_778g_5g_mobile_platformssg2125p_firmwareqca6696_firmwaresnapdragon_460_mobile_platformsnapdragon_820_mobile_platformsnapdragon_675_mobile_platform_firmwareqcs2290snapdragon_678_mobile_platform_\(sm6150-ac\)qrb5165msnapdragon_auto_5g_modem-rf_gen_2apq8017_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)sm8735_firmwaresnapdragon_865_5g_mobile_platform_firmwaresm7325p_firmwaresrv1lsnapdragon_450_mobile_platformmdm9640snapdragon_427_mobile_platformapq8037snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemsnapdragon_820_automotive_platform_firmwaremdm9640_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)qrb5165m_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm6250psnapdragon_4_gen_2_mobile_platformqcs8300_firmwareqca6335_firmwarecsrb31024_firmwarefastconnect_6800mdm9205sqca6421_firmwaresd888_firmwaresxr1230psxr2230pqca6584auqfw7124_firmwareqru1052snapdragon_8cx_compute_platform_\(sc8180x-ab\)mdm9650snapdragon_x50_5g_modem-rf_systemsnapdragon_x5_lte_modem_firmwaresm8750p_firmwareqrb5165n_firmwaressg2125pqca6420qca6430_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwareqca8386_firmwaresnapdragon_439_mobile_platformsnapdragon_430_mobile_platformvision_intelligence_300_platform_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)sxr1120fastconnect_7800_firmwareqca6391_firmwaresnapdragon_855_mobile_platformcsra6640sa4150psa8255p_firmwareqca6595snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwareqcs6690fastconnect_6700qam8295psa6155snapdragon_x12_lte_modemsa2150psnapdragon_680_4g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwareqam8775pqcm2290qca6688aqqam8255p_firmwaresm7675p_firmwaresa8650p_firmwaresnapdragon_x24_lte_modemsm8635pqca6797aq_firmwaresxr2350pvideo_collaboration_vc5_platformsnapdragon_4_gen_1_mobile_platform_firmwareqca9379fastconnect_6200_firmwareqts110qca6584au_firmwareqca6421snapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_wear_4100\+_platformsnapdragon_690_5g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platform_firmwaresg8275pqcn7606_firmwaresa8620p_firmwareqam8255pqca6310_firmwareqca6595au_firmwaresa6155pqcs410_firmwareqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcn6274snapdragon_7c\+_gen_3_computesw5100_firmwareqcs610apq8064autalynplus_firmwareqfw7114_firmwarevision_intelligence_300_platformsnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)sxr2130snapdragon_625_mobile_platform_firmwareqcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresa8540psm8750qca6797aqsnapdragon_730_mobile_platform_\(sm7150-aa\)_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqam8650p_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_x32_5g_modem-rf_systemsnapdragon_710_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwareqsm8350_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresg6150psdx82sm8750psa8770p_firmwaresnapdragon_x55_5g_modem-rf_systemsm8650qqcm4290_firmwaresc8380xp_firmwaresd_8_gen1_5g_firmwaresnapdragon_820_automotive_platformqca6564_firmwaresxr2230p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)qca8695au_firmwareqca6310smart_audio_400_platformqca6595_firmwareqcm8550_firmwaresa6145psrv1m_firmwaresa4150p_firmwaresg6150p_firmwareqca6174asa9000p_firmwaresa7775psnapdragon_730_mobile_platform_\(sm7150-aa\)snapdragon_435_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresa8195psrv1msnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)ssg2115psnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwarefastconnect_6700_firmwareqcm5430_firmwareqca6564a_firmwareqcm5430qcs2290_firmwarevision_intelligence_400_platform_firmwaresg8275p_firmware315_5g_iot_modemsnapdragon_xr2\+_gen_1_platformmdm9628qcn9024_firmwaresnapdragon_7c_compute_platform_\(sc7180-ac\)sdx82_firmwarec-v2x_9150_firmwaresa7255psnapdragon_x50_5g_modem-rf_system_firmwareqca6436snapdragon_720g_mobile_platformcsrb31024snapdragon_8_gen_1_mobile_platform_firmwareqcn7606sm7250pqcs615qcs8250sd865_5gqca8337_firmwaresxr2130_firmwaresd821snapdragon_460_mobile_platform_firmwareqca6696snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarevision_intelligence_400_platformsnapdragon_8cx_compute_platform_\(sc8180xp-ac\)qca4004qcm6690_firmwareqca6574asnapdragon_480_5g_mobile_platform_firmwareqam8620pqcn6224sxr2330p_firmwareqts110_firmwarepm8937_firmwarepm8937snapdragon_888_5g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresc8180x\+sdx55_firmwaresxr2330pmdm9250snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)mdm9205s_firmwaresxr1120_firmwaresnapdragon_x32_5g_modem-rf_system_firmwareqcs8155qca4004_firmwareaqt1000_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x65_5g_modem-rf_system_firmware9207_lte_modemsm7675qamsrv1m_firmwaresa8150p_firmwarehome_hub_100_platformqcn6024_firmwareqcn9074_firmwaresm8850snapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwareqcs8155_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391sa8145p_firmwareqca8081_firmwaresa9000pqam8295p_firmwareqca8081qcc2072_firmwaresnapdragon_425_mobile_platform_firmwareqca6574qca6431snapdragon_778g_5g_mobile_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresmart_audio_400_platform_firmwareqca6436_firmwaresnapdragon_1200_wearable_platform_firmwareqcs5430_firmwareqcm6490qcs8550_firmwareqcs8250_firmwaresnapdragon_x5_lte_modemsnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqcs8550qdu1110_firmwaresa8540p_firmwaresm4635_firmwareqcm6125_firmwaresd730snapdragon_425_mobile_platformqca6430snapdragon_x62_5g_modem-rf_systemsa8775p_firmwareqam8620p_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)snapdragon_665_mobile_platformqca6234_firmwaresnapdragon_7c_compute_platform_\(sc7180-ac\)_firmwaresm7675pqcm6690qcs4290qru1032_firmwareqcs6690_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8255pqdx1011qrb5165nsm7250p_firmwaresd855snapdragon_439_mobile_platform_firmwareqcc711_firmwareqca6678aqqcm4290snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_wear_1300_platformqfw7124sm6650qcs6125_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)fastconnect_6900_firmwaresm8650q_firmwareqca9379_firmwaresxr2350p_firmwaresnapdragon_8_gen_2_mobile_platformsa8150pqcc710_firmwaresnapdragon_670_mobile_platform_firmwareqca6174a_firmwaresa4155psnapdragon_x12_lte_modem_firmwaresd626_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_1200_wearable_platformsnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7635sm4125_firmwaresdm429w_firmwarec-v2x_9150qcn9024ar8031apq8037_firmwaresnapdragon_750g_5g_mobile_platformqcm4325_firmwareqru1032ar8035sm6650_firmwaresm4635sdm429wqca6678aq_firmwareqca6698au_firmwaremdm8207_firmwaresdx55_firmwaresdx85robotics_rb5_platform_firmwaresdx61_firmwaresnapdragon_ar1_gen_1_platformqcn9274qca6564video_collaboration_vc3_platformsnapdragon_821_mobile_platformsc8180x\+sdx55vision_intelligence_200_platform_\(apq8053-ac\)qcs615_firmwaresm4125qcc711snapdragon_8c_compute_platform_\(sc8180x-ad\)qcs4290_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareaqt1000qsm8250vision_intelligence_100_platform_\(apq8053-aa\)_firmwaresd_675_firmwaresd865_5g_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sm6225p_firmwaresnapdragon_626_mobile_platformsnapdragon_8_gen_1_mobile_platformsnapdragon_x75_5g_modem-rf_system_firmwaresdx61snapdragon_625_mobile_platformsnapdragon_662_mobile_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)sd675snapdragon_xr2_5g_platform_firmwaresd_8_gen1_5gqdx1010qca6574_firmwareqdu1110qca6698aqsnapdragon_1100_wearable_platform_firmwaresm6250p_firmwaresa8155talynplusqcm2150snapdragon_675_mobile_platformsnapdragon_auto_5g_modem-rfsnapdragon_780g_5g_mobile_platform_firmwareqam8650psa8620pqca6320_firmwaresd670_firmwaresg4150p_firmwaresm8635sd855_firmwareqcn9012sd821_firmwaresa7255p_firmwaresw5100p_firmwareqep81119205_lte_modem_firmwareqsm8250_firmwaresm7315_firmwareqcf8001robotics_rb2_platform_firmwareqcn6274_firmwaresrv1h_firmwarear8031_firmwaresm8635_firmwaresnapdragon_435_mobile_platformsa8650psnapdragon_xr2_5g_platformsnapdragon_x35_5g_modem-rf_systemsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresnapdragon_8\+_gen_2_mobile_platformcsra6640_firmwaresnapdragon_1100_wearable_platformsm6225psm7635_firmwareqcs61259206_lte_modemqdu1010sg4150pqdu1000sm8850psd626ssg2115p_firmwareqcs410qcc2072fastconnect_6800_firmwareqep8111_firmwaresnapdragon_x75_5g_modem-rf_systemqcs4490_firmwaresnapdragon_780g_5g_mobile_platformsnapdragon_auto_4g_modem_firmwareqca6688aq_firmwaresnapdragon_wear_4100\+_platform_firmwaresm6250_firmwaresnapdragon_845_mobile_platformsa8155p_firmwareqru1062_firmwaresd670qca6426snapdragon_730g_mobile_platform_\(sm7150-ab\)qcn6024qdu1010_firmwareapq8017mdm9650_firmwareqca6698auqcs7230_firmwareqca6574a_firmwareqdx1011_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqdu1210_firmwaresd730_firmwaresg6150snapdragon_8\+_gen_1_mobile_platformsa8295p_firmwaresm7675_firmwaresrv1l_firmwareqca8337qcn6224_firmwareqcs610_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwaresnapdragon_427_mobile_platform_firmwaresnapdragon_632_mobile_platformqcn9011qamsrv1hqca6574au_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sa8155_firmwarevision_intelligence_200_platform_\(apq8053-ac\)_firmwareqcm4325qcs6490_firmwarevideo_collaboration_vc3_platform_firmwareqcm2150_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarevideo_collaboration_vc5_platform_firmwaresa6155_firmwaresdx55sa8295pqsm8350qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwarevideo_collaboration_vc1_platformsw5100qcf8001_firmwarecsra6620snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresa6155p_firmwareqca6431_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sd675_firmwarefastconnect_7800video_collaboration_vc1_platform_firmware315_5g_iot_modem_firmwareqca6564au_firmwareqca6320snapdragon_865_5g_mobile_platform9206_lte_modem_firmwaresmart_display_200_platform_\(apq5053-aa\)_firmwaremdm9628_firmwaresnapdragon_4_gen_1_mobile_platformqcs9100sa2150p_firmwareqcn9274_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)sdx85_firmwaresm6650psnapdragon_712_mobile_platformsnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwareqca6234qca6564aumdm8207snapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwaresa8530p_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_430_mobile_platform_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platformsa8145pqcn9074Snapdragon
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-57807
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-3.8||LOW
EPSS-0.05% / 14.57%
||
7 Day CHG~0.00%
Published-05 Sep, 2025 | 21:16
Updated-03 Nov, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick BlobStream Forward-Seek Under-Allocation

ImageMagick is free and open-source software used for editing and manipulating digital images. ImageMagick versions lower than 14.8.2 include insecure functions: SeekBlob(), which permits advancing the stream offset beyond the current end without increasing capacity, and WriteBlob(), which then expands by quantum + length (amortized) instead of offset + length, and copies to data + offset. When offset ≫ extent, the copy targets memory beyond the allocation, producing a deterministic heap write on 64-bit builds. No 2⁶⁴ arithmetic wrap, external delegates, or policy settings are required. This is fixed in version 14.8.2.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-55297
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.2||MEDIUM
EPSS-0.04% / 12.89%
||
7 Day CHG~0.00%
Published-21 Aug, 2025 | 15:05
Updated-22 Jan, 2026 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ESF-IDF BluFi Example Memory Overflow Vulnerability

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. The BluFi example bundled in ESP-IDF was vulnerable to memory overflows in two areas: Wi-Fi credential handling and Diffie–Hellman key exchange. This vulnerability is fixed in 5.4.1, 5.3.3, 5.1.6, and 5.0.9.

Action-Not Available
Vendor-espressifespressif
Product-esp-idfesp-idf
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-52955
Assigner-Juniper Networks, Inc.
ShareView Details
Assigner-Juniper Networks, Inc.
CVSS Score-7.1||HIGH
EPSS-0.05% / 15.62%
||
7 Day CHG~0.00%
Published-11 Jul, 2025 | 14:42
Updated-23 Jan, 2026 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS and Junos OS Evolved: When jflow/sflow is configured continuous logical interface flaps causes rpd crash and restart

An Incorrect Calculation of Buffer Size vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a memory corruption that leads to a rpd crash.  When the logical interface using a routing instance flaps continuously, specific updates are sent to the jflow/sflow modules. This results in memory corruption, leading to an rpd crash and restart.  Continued receipt of these specific updates will cause a sustained Denial of Service condition. This issue affects Junos OS: * All versions before 21.2R3-S9, * All versions of 21.4, * All versions of 22.2, * from 22.4 before 22.4R3-S7, * from 23.2 before 23.2R2-S3, * from 23.4 before 23.4R2-S4, * from 24.2 before 24.2R2. Junos OS Evolved:  * All versions of 21.2-EVO,  * All versions of 21.4-EVO,  * All versions of 22.2-EVO,  * from 22.4 before 22.4R3-S7-EVO,  * from 23.2 before 23.2R2-S3-EVO,  * from 23.4 before 23.4R2-S4-EVO,  * from 24.2 before 24.2R2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junos_os_evolvedjunosJunos OS EvolvedJunos OS
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-27042
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.09%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:49
Updated-25 Sep, 2025 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Calculation of Buffer Size in Video

Memory corruption while processing video packets received from video firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwareqfw7124qca6564au_firmwareipq8071aipq8173_firmwareqfw7114snapdragon_x12_lte_modem_firmwarewcn3680bsnapdragon_680_4g_mobile_firmwareipq9554qru1032qca8081_firmwareqcf8000_firmwarewcd9335sa8650pqca8101qca6698ausa8195psrv1l_firmwareqca6574au_firmwareqcn9024_firmwaresnapdragon_778g\+_5g_mobile_firmwarewcd9370wsa8845h_firmwareipq8076aqcf8001_firmwareqcs6125sa8620pqcn5152sm6650qcn5024_firmwareqcs8300_firmwareflight_rb5_5gsxr2330psm7675qmp1000snapdragon_7c\+_gen_3_compute_firmwareqcn5022_firmwareimmersive_home_326_firmwaresa8155_firmwaresmart_audio_400_firmwarewcd9341_firmwareqca8072snapdragon_4_gen_2_mobile_firmwareqcn6024_firmwaresxr2230p_firmwarewsa8835qcn9274_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa6155pqca9889_firmwaresnapdragon_8_gen_2_mobilesnapdragon_685_4g_mobileqsm8350_firmwaresnapdragon_x55_5g_modem-rf_firmwareflight_rb5_5g_firmwareqcn6412_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_675_mobileqamsrv1mqcs8155_firmwaresnapdragon_8_gen_3_mobile_firmwareqdu1000wcn3988robotics_rb2qcn6402_firmwarewcd9395_firmwaresm6650_firmwarewcn7750qca6436_firmwareqcn9002_firmwaresnapdragon_750g_5g_mobilesa2150p_firmwaresnapdragon_xr2\+_gen_1qca6698aq_firmwaresm7675p_firmwaresnapdragon_480\+_5g_mobileqcn6100snapdragon_w5\+_gen_1_wearable_firmwarear8035qca8082_firmwaresm7325pwcd9340_firmwarewcn6740_firmwareqamsrv1h_firmwareqcn6274qcs2290_firmwarewsa8832_firmwaresd888snapdragon_xr2\+_gen_1_firmwaresm8635_firmwareqcn5054_firmwaretalynplusimmersive_home_326qcn9000qca0000_firmwaresnapdragon_865\+_5g_mobileqcn5052wsa8830ipq9048c-v2x_9150_firmwareqca8081fastconnect_6700qca6391snapdragon_4_gen_1_mobile_firmwarewcn3950smart_audio_400sa9000p_firmwaresnapdragon_690_5g_mobile_firmwaresnapdragon_x12_lte_modemqam8650psnapdragon_660_mobile_firmwareqcs410sm7675pc-v2x_9150sm4635snapdragon_685_4g_mobile_firmwareqcs610sm8635p_firmwareqamsrv1hqca6698aqwcn3680qcn5224video_collaboration_vc5_platformqfw7114_firmwarewcn6740snapdragon_x65_5g_modem-rf_firmwaresnapdragon_x62_5g_modem-rfsd_8_gen1_5g_firmwaresd855_firmwareqca6574robotics_rb2_firmwareipq5312wcd9335_firmwaresnapdragon_780g_5g_mobilecsr8811_firmwaresa8255p_firmwaresnapdragon_730_mobile_firmwareipq8174_firmwaresw5100p_firmwaresg4150p_firmwareqam8295p_firmwareqca6426_firmwarear8031_firmwaresd730_firmwaresdx65mqcn6132video_collaboration_vc1_platform_firmwarewcn6755_firmwarewsa8845_firmwarewcd9375wcd9378qcn5124robotics_rb5sdx55_firmwareipq6018_firmwareqcs6490_firmwareqca8385wcn3615_firmwaresm8750pimmersive_home_214_firmwareipq8072a_firmwareqcn9274wcn3615immersive_home_318sxr2250p_firmwarewsa8845sm7635p_firmwaresnapdragon_439_mobile_firmwarewcd9390sa8255psa8775p_firmwareqru1052sd_675_firmwarefastconnect_6900sa2150pipq8072aqca8072_firmwareqam8255pqca9888_firmwaresd_675qcm2290_firmwareqcn9074_firmwareqcs4490_firmwaressg2125pqcs4490sa7775psa7255p_firmwaresm6370_firmwaresnapdragon_678_mobilesa8155pwsa8845hsnapdragon_x75_5g_modem-rfqcn5024qcs8155wcn3680_firmwaresm8650q_firmwaresnapdragon_x72_5g_modem-rfwcd9340sd675_firmwarewsa8840sd675qcn5052_firmwaresa6155ipq9574_firmwaresa6150p_firmwareqcm4290_firmwareqca8080_firmwareqca6174a_firmwaresnapdragon_888\+_5g_mobile_firmwaresnapdragon_732g_mobileqcm6490fastconnect_6700_firmwareqca8085qca6174aqca8084_firmwaresnapdragon_480\+_5g_mobile_firmwareipq8070a_firmwaresa4150p_firmwaresa8650p_firmwareqcs9100sg8275pqcs8250_firmwaresnapdragon_8\+_gen_2_mobileqcn5164_firmwareipq5332qdx1010_firmwarewcd9385_firmwareqca6678aqqcn5122_firmwaresnapdragon_x35_5g_modem-rf_firmwarewcd9385wcn7881qca6595ausnapdragon_865_5g_mobileipq9570qcn6112_firmwaresxr2130_firmwarewsa8832sm7315snapdragon_480_5g_mobile_firmwarewsa8810qdu1110_firmwareqcn9000_firmwareqsm8350wcn3980sa7255psnapdragon_460_mobilesnapdragon_auto_5g_modem-rf_gen_2_firmwaresxr2230pqca8384_firmwareqcn6122snapdragon_690_5g_mobilesnapdragon_888_5g_mobilefsm20056_firmwareipq8173qrb5165n_firmwarefsm10055_firmwaresnapdragon_730g_mobilesnapdragon_4_gen_1_mobileqcs5430qcs8250srv1m_firmwarefsm20056snapdragon_8\+_gen_1_mobilecsr8811qca6696_firmwaresm7315_firmwaresm8550p_firmwaresnapdragon_7c\+_gen_3_computesm8550psnapdragon_765g_5g_mobile_firmwaresnapdragon_680_4g_mobilesnapdragon_auto_4g_modem_firmwareipq5312_firmwareqdx1010wsa8830_firmwareipq8078_firmwareqcf8000sfp_firmwareqcs5430_firmwareqca8075_firmwaresm7325p_firmwareqcn5164snapdragon_auto_4g_modemqca6688aq_firmwaresd888_firmwareqcn6112qfw7124_firmwareipq8078qcn5054sd660qcn6024snapdragon_782g_mobilewcd9375_firmwaresa8530p_firmwarewcn7860_firmwarewcn3990qcn6432_firmwaresnapdragon_x65_5g_modem-rfsnapdragon_auto_5g_modem-rf_gen_2sm8750_firmwareipq8076_firmwareqcn5124_firmwareqcs615qca8085_firmwaresa6155p_firmwaresw5100pqca8337_firmwareqca0000wcd9395qca6430sm7635qam8255p_firmwaresnapdragon_w5\+_gen_1_wearablewcd9341immersive_home_316snapdragon_782g_mobile_firmwaresnapdragon_778g_5g_mobile_firmwareqsm8250_firmwaresnapdragon_865\+_5g_mobile_firmwaresnapdragon_662_mobile_firmwarevideo_collaboration_vc3_platform_firmwareqcn5152_firmwarewcd9360sa8150psnapdragon_768g_5g_mobile_firmwareqcn5154wcn6450_firmwaresm4125sm6370qcs7230_firmwareimmersive_home_216qcn9070snapdragon_678_mobile_firmwareqdx1011_firmwareqcm5430qcn6102_firmwareipq8070asnapdragon_778g\+_5g_mobilesnapdragon_855\+_mobile_firmwareqca9888snapdragon_x62_5g_modem-rf_firmwareqcs410_firmwareipq5302_firmwareqca4024_firmwareqca9377_firmwaresrv1h_firmwareipq8071a_firmwaresm8735_firmwaresdx55wcn7880_firmwareqcs6125_firmwareqrb5165m_firmwaresnapdragon_8_gen_2_mobile_firmwaresg4150pipq8078a_firmwareqcn9003_firmwareqcf8000qcm6125_firmwaresa8145pmdm9628snapdragon_855\+_mobileqcn6023ssg2115psnapdragon_765_5g_mobile_firmwaresd865_5g_firmwarewsa8840_firmwareqca6797aqqca6696sxr1230p_firmwaresnapdragon_855_mobile_firmwareqcn6132_firmwareqca8337sa8145p_firmwaresrv1lsnapdragon_855_mobilesnapdragon_ar2_gen_1wcn7881_firmwaresm6650p_firmwaresa4155pwcn7860sd_8_gen1_5gimmersive_home_316_firmwarewcd9380sa8540p_firmwareqca4024qep8111qca8084qcs8550_firmwareqca6574auqcn9072ipq8076qcm2150_firmwaresa8770p_firmwareipq9570_firmwarewcn3680b_firmwareipq5010snapdragon_8\+_gen_1_mobile_firmwareqca6797aq_firmwaresnapdragon_730g_mobile_firmwaresnapdragon_660_mobileimmersive_home_318_firmwareqam8775pqca9377sa6145pvideo_collaboration_vc1_platformqcn6102qam8295pqcn6100_firmwareqcs8300qca6678aq_firmwaresnapdragon_ar2_gen_1_firmwaretalynplus_firmwaressg2115p_firmwarewsa8835_firmwareqcn9002sdx61qcs615_firmwareqdu1010_firmwarefsm20055_firmwareqam8620psnapdragon_ar1_gen_1_firmwarevision_intelligence_400_firmwarewcn3660b_firmwaresm8635sm8750qca6595sd855ipq5302qca8075qcf8001sa6155_firmwaresw5100_firmwarefastconnect_7800_firmwarewsa8815215_mobile_firmwareqru1062_firmwareqcm4325qcn6224sxr1230pqcn9001qca6584au_firmwareqca6430_firmwareqdu1210_firmwaresdx61_firmwarewcd9370_firmwaresm7675_firmwareqca6436wcd9326_firmwareqcn9012vision_intelligence_400mdm9628_firmwaresrv1mipq8078asa8540pimmersive_home_3210_firmwaresnapdragon_768g_5g_mobileqcs7230qcm8550qru1062qcs9100_firmwareqcn5154_firmwareqca6391_firmwareqca6688aqqrb5165nfsm10056wcn3990_firmwareqcn6422_firmwareqcn9012_firmwarewcn6450aqt1000_firmwareqdu1110sa8775pipq6018qrb5165m315_5g_iot_modemipq9048_firmwareqca8101_firmwaresnapdragon_720g_mobile_firmwaresnapdragon_732g_mobile_firmwareipq5424sm6250_firmwaresnapdragon_750g_5g_mobile_firmwareqcn6122_firmware315_5g_iot_modem_firmwareipq8174immersive_home_214qca8386qcm2150qru1052_firmwareqcn6412qca9889sa6145p_firmwaresm8650qqdx1011sa8620p_firmwaresnapdragon_x50_5g_modem-rf_firmwaresm8735wcn7861_firmwareqcs610_firmwaresd865_5gsrv1hqcs8550sg8275p_firmwarefastconnect_6900_firmwarefastconnect_6800_firmwareqam8650p_firmwarear8035_firmwareqcf8000sfpqcs6490snapdragon_x75_5g_modem-rf_firmwareqca8385_firmwareqcn9011snapdragon_8_gen_3_mobileqca6698au_firmwareqcn9001_firmwarefsm20055qca6420_firmwareqcn9011_firmwareqcc710_firmwarewcn3988_firmwaresm4125_firmwaresw5100snapdragon_860_mobile_firmwaresm8750p_firmwaresnapdragon_888_5g_mobile_firmwaresnapdragon_870_5g_mobileqca8080wcn6650sm4635_firmwaresa4155p_firmwarewcn7880qdu1010snapdragon_x32_5g_modem-rf_firmwarevideo_collaboration_vc3_platformqep8111_firmwareqcn6224_firmwaresm7635pfastconnect_7800wcn6755qcn9072_firmwaresnapdragon_720g_mobilewcd9371_firmwaresa8770pfsm10055wcd9390_firmware215_mobileipq9554_firmwaresa8195p_firmwareqsm8250sa8295p_firmwarewcd9378_firmwaresnapdragon_439_mobileipq8074a_firmwaresa8530pqdu1210fastconnect_6200snapdragon_8_gen_1_mobilesnapdragon_662_mobilecsra6620_firmwareqca6426ipq5010_firmwaresnapdragon_765g_5g_mobilewsa8810_firmwaresnapdragon_x55_5g_modem-rfqca6420sm8635probotics_rb5_firmwaresnapdragon_695_5g_mobile_firmwaresxr2250pwcd9371qcn9070_firmwareqcs4290_firmwareqcn9074csra6640wcn3980_firmwareqcm4290wcd9326ipq5424_firmwaresm6250qcn5022snapdragon_765_5g_mobilewcd9360_firmwareqmp1000_firmwarewcn7750_firmwareqcm4490_firmwaresnapdragon_865_5g_mobile_firmwareimmersive_home_216_firmwaresnapdragon_730_mobilesnapdragon_xr2_5g_firmwaresa9000psdx65m_firmwarewcn3910_firmwareqcn6402qcm6490_firmwarewsa8815_firmwaresnapdragon_xr2_5gqcm4325_firmwaresnapdragon_x35_5g_modem-rfsm6650pqcn6274_firmwarefsm10056_firmwaresnapdragon_695_5g_mobilesxr2130sxr2330p_firmwareipq9008snapdragon_x50_5g_modem-rfqcn6023_firmwareqcn5122qca6574a_firmwaresnapdragon_888\+_5g_mobilesm7250pqca6574_firmwaresnapdragon_480_5g_mobileqca8082qamsrv1m_firmwaresm7635_firmwareqam8620p_firmwarevideo_collaboration_vc5_platform_firmwaresd660_firmwaresnapdragon_x32_5g_modem-rfqca8386_firmwareqca8384qcm2290qcs4290qcn6422wcd9380_firmwareqca6595_firmwareaqt1000ipq5332_firmwaresnapdragon_675_mobile_firmwareqcn9003qca6574aqca6595au_firmwaresnapdragon_460_mobile_firmwareqcm5430_firmwareqca6564asa7775p_firmwarecsra6640_firmwareipq8074afastconnect_6800qca6564_firmwaresnapdragon_x72_5g_modem-rf_firmwaresnapdragon_8_gen_1_mobile_firmwareqcn6432ipq9008_firmwareqdu1000_firmwareqcc710snapdragon_ar1_gen_1wcn3910snapdragon_860_mobileqcs2290ipq8076a_firmwaresnapdragon_780g_5g_mobile_firmwareqca6584ausa8295pwcn3950_firmwarewcn7861sa8150p_firmwareqam8775p_firmwareqca9367_firmwaressg2125p_firmwaresa4150pqca6564ipq9574qca9367qcn9024snapdragon_778g_5g_mobileqcn5224_firmwareqca6564a_firmwaresnapdragon_870_5g_mobile_firmwaresa8155sm7250p_firmwarear8031fastconnect_6200_firmwareqcm4490qcm6125snapdragon_4_gen_2_mobilewcn6650_firmwareqca6564auqru1032_firmwarecsra6620snapdragon_auto_5g_modem-rfsa6150pimmersive_home_3210sa8155p_firmwarewcn3660bsd730Snapdragon
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-46723
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.58% / 68.99%
||
7 Day CHG~0.00%
Published-02 May, 2025 | 22:18
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenVM byte decomposition of pc in AUIPC chip can overflow

OpenVM is a performant and modular zkVM framework built for customization and extensibility. In version 1.0.0, OpenVM is vulnerable to overflow through byte decomposition of pc in AUIPC chip. A typo results in the highest limb of pc being range checked to 8-bits instead of 6-bits. This results in the if statement never being triggered because the enumeration gives i=0,1,2, when instead the enumeration should give i=1,2,3, leaving pc_limbs[3] range checked to 8-bits instead of 6-bits. This leads to a vulnerability where the pc_limbs decomposition differs from the true pc, which means a malicious prover can make the destination register take a different value than the AUIPC instruction dictates, by making the decomposition overflow the BabyBear field. This issue has been patched in version 1.1.0.

Action-Not Available
Vendor-openvm-org
Product-openvm
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-46688
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.09% / 25.35%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 00:00
Updated-29 Apr, 2025 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

quickjs-ng through 0.9.0 has an incorrect size calculation in JS_ReadBigInt for a BigInt, leading to a heap-based buffer overflow. QuickJS before 2025-04-26 is also affected.

Action-Not Available
Vendor-QuickJS Project
Product-QuickJS
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-46393
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-2.9||LOW
EPSS-0.23% / 46.00%
||
7 Day CHG~0.00%
Published-23 Apr, 2025 | 00:00
Updated-31 Dec, 2025 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multispectral MIFF image processing in ImageMagick before 7.1.1-44, packet_size is mishandled (related to the rendering of all channels in an arbitrary order).

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-43965
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-2.9||LOW
EPSS-0.23% / 45.33%
||
7 Day CHG~0.00%
Published-23 Apr, 2025 | 00:00
Updated-31 Dec, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In MIFF image processing in ImageMagick before 7.1.1-44, image depth is mishandled after SetQuantumFormat is used.

Action-Not Available
Vendor-Debian GNU/LinuxImageMagick Studio LLC
Product-imagemagickdebian_linuxImageMagick
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-1861
Assigner-PHP Group
ShareView Details
Assigner-PHP Group
CVSS Score-6.3||MEDIUM
EPSS-1.03% / 77.40%
||
7 Day CHG+0.49%
Published-30 Mar, 2025 | 05:57
Updated-03 Nov, 2025 | 21:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stream HTTP wrapper truncates redirect location to 1024 bytes

In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location.

Action-Not Available
Vendor-The PHP GroupNetApp, Inc.
Product-phpontapPHP
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-30334
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-7.1||HIGH
EPSS-0.11% / 29.85%
||
7 Day CHG~0.00%
Published-20 Mar, 2025 | 20:39
Updated-05 Sep, 2025 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenBSD wg(4) kernel crash

In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kernel crash.

Action-Not Available
Vendor-OpenBSD
Product-openbsdOpenBSD
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-0395
Assigner-GNU C Library
ShareView Details
Assigner-GNU C Library
CVSS Score-6.2||MEDIUM
EPSS-0.07% / 21.94%
||
7 Day CHG~0.00%
Published-22 Jan, 2025 | 13:11
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.

Action-Not Available
Vendor-The GNU C Library
Product-glibc
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-11425
Assigner-Schneider Electric
ShareView Details
Assigner-Schneider Electric
CVSS Score-8.7||HIGH
EPSS-0.34% / 56.78%
||
7 Day CHG~0.00%
Published-17 Jan, 2025 | 09:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CWE-131: Incorrect Calculation of Buffer Size vulnerability exists that could cause Denial-of-Service of the product when an unauthenticated user is sending a crafted HTTPS packet to the webserver.

Action-Not Available
Vendor-Schneider Electric SE
Product-Modicon M580 CPU (part numbers BMEP* and BMEH*, excluding M580 CPU Safety)Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S)EVLink Pro ACBMENOR2200H
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-8361
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.68%
||
7 Day CHG~0.00%
Published-07 Jan, 2025 | 16:18
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DoS caused due to wrong hash length returned for SHA2/224 algorithm

In SiWx91x devices, the SHA2/224 algorithm returns a hash of 256 bits instead of 224 bits. This incorrect hash length triggers a software assertion, which subsequently causes a Denial of Service (DoS). If a watchdog is implemented, device will restart after watch dog expires. If watchdog is not implemented, device can be recovered only after a hard reset

Action-Not Available
Vendor-silabs.com
Product-WiSeConnect SDK
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-617
Reachable Assertion
CVE-2017-13315
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.62%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 17:50
Updated-18 Dec, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-F5, Inc.Google LLC
Product-androidAndroidaccess_for_android
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-49776
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 25.25%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 00:00
Updated-05 Sep, 2025 | 00:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A negative-size-param in tsMuxer version nightly-2024-04-05-01-53-02 allows attackers to cause Denial of Service (DoS) via a crafted TS video file.

Action-Not Available
Vendor-justdan96n/ajustdan96
Product-tsmuxern/atsmuxer
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-28052
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.42%
||
7 Day CHG~0.00%
Published-30 Oct, 2024 | 13:35
Updated-13 Nov, 2024 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WBR-6012 is a wireless SOHO router. It is a low-cost device which functions as an internet gateway for homes and small offices while aiming to be easy to configure and operate. In addition to providing a WiFi access point, the device serves as a 4-port wired router and implements a variety of common SOHO router capabilities such as port forwarding, quality-of-service, web-based administration, a DHCP server, a basic DMZ, and UPnP capabilities.

Action-Not Available
Vendor-level1LevelOnelevelone
Product-wbr-6012_firmwarewbr-6012WBR-6012wbr-6012
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-46729
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.05%
||
7 Day CHG+0.02%
Published-18 Sep, 2024 | 06:32
Updated-26 Sep, 2025 | 17:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amd/display: Fix incorrect size calculation for loop

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix incorrect size calculation for loop [WHY] fe_clk_en has size of 5 but sizeof(fe_clk_en) has byte size 20 which is lager than the array size. [HOW] Divide byte size 20 by its element size. This fixes 2 OVERRUN issues reported by Coverity.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-46684
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 5.08%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 05:29
Updated-04 May, 2025 | 09:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
binfmt_elf_fdpic: fix AUXV size calculation when ELF_HWCAP2 is defined

In the Linux kernel, the following vulnerability has been resolved: binfmt_elf_fdpic: fix AUXV size calculation when ELF_HWCAP2 is defined create_elf_fdpic_tables() does not correctly account the space for the AUX vector when an architecture has ELF_HWCAP2 defined. Prior to the commit 10e29251be0e ("binfmt_elf_fdpic: fix /proc/<pid>/auxv") it resulted in the last entry of the AUX vector being set to zero, but with that change it results in a kernel BUG. Fix that by adding one to the number of AUXV entries (nitems) when ELF_HWCAP2 is defined.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-39808
Assigner-Gallagher Group Ltd.
ShareView Details
Assigner-Gallagher Group Ltd.
CVSS Score-4.6||MEDIUM
EPSS-0.12% / 31.36%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 04:03
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect Calculation of Buffer Size (CWE-131) in the Controller 6000 and Controller 7000 OSDP message handling, allows an attacker with physical access to Controller wiring to instigate a reboot leading to a denial of service. This issue affects: Controller 6000 and Controller 7000 9.10 prior to vCR9.10.240816a (distributed in 9.10.1530 (MR2)), 9.00 prior to vCR9.00.240816a (distributed in 9.00.2168 (MR4)), 8.90 prior to vCR8.90.240816a (distributed in 8.90.2155 (MR5)), 8.80 prior to vCR8.80.240816b (distributed in 8.80.1938 (MR6)), all versions of 8.70 and prior.

Action-Not Available
Vendor-Gallagher Group Ltd.
Product-Controller 6000 and Controller 7000
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-45287
Assigner-FreeBSD
ShareView Details
Assigner-FreeBSD
CVSS Score-9.1||CRITICAL
EPSS-0.39% / 59.95%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 03:18
Updated-26 Sep, 2024 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple vulnerabilities in libnv

A malicious value of size in a structure of packed libnv can cause an integer overflow, leading to the allocation of a smaller buffer than required for the parsed data.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSDfreebsd
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2022-48889
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 2.72%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 06:10
Updated-04 May, 2025 | 08:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASoC: Intel: sof-nau8825: fix module alias overflow

In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: sof-nau8825: fix module alias overflow The maximum name length for a platform_device_id entry is 20 characters including the trailing NUL byte. The sof_nau8825.c file exceeds that, which causes an obscure error message: sound/soc/intel/boards/snd-soc-sof_nau8825.mod.c:35:45: error: illegal character encoding in string literal [-Werror,-Winvalid-source-encoding] MODULE_ALIAS("platform:adl_max98373_nau8825<U+0018><AA>"); ^~~~ include/linux/module.h:168:49: note: expanded from macro 'MODULE_ALIAS' ^~~~~~ include/linux/module.h:165:56: note: expanded from macro 'MODULE_INFO' ^~~~ include/linux/moduleparam.h:26:47: note: expanded from macro '__MODULE_INFO' = __MODULE_INFO_PREFIX __stringify(tag) "=" info I could not figure out how to make the module handling robust enough to handle this better, but as a quick fix, using slightly shorter names that are still unique avoids the build issue.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-43843
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.83%
||
7 Day CHG~0.00%
Published-17 Aug, 2024 | 09:21
Updated-04 May, 2025 | 09:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
riscv, bpf: Fix out-of-bounds issue when preparing trampoline image

In the Linux kernel, the following vulnerability has been resolved: riscv, bpf: Fix out-of-bounds issue when preparing trampoline image We get the size of the trampoline image during the dry run phase and allocate memory based on that size. The allocated image will then be populated with instructions during the real patch phase. But after commit 26ef208c209a ("bpf: Use arch_bpf_trampoline_size"), the `im` argument is inconsistent in the dry run and real patch phase. This may cause emit_imm in RV64 to generate a different number of instructions when generating the 'im' address, potentially causing out-of-bounds issues. Let's emit the maximum number of instructions for the "im" address during dry run to fix this problem.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-42259
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 5.66%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 14:50
Updated-03 Nov, 2025 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Fix Virtual Memory mapping boundaries calculation Calculating the size of the mapped area as the lesser value between the requested size and the actual size does not consider the partial mapping offset. This can cause page fault access. Fix the calculation of the starting and ending addresses, the total size is now deduced from the difference between the end and start addresses. Additionally, the calculations have been rewritten in a clearer and more understandable form. [Joonas: Add Requires: tag] Requires: 60a2066c5005 ("drm/i915/gem: Adjust vma offset for framebuffer mmap offset") (cherry picked from commit 97b6784753da06d9d40232328efc5c5367e53417)

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next