Vulnerabilities (CVE)

Filtered by CWE-119
Total 12719 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-47169 1 Intel 1 Media Sdk 2025-08-27 N/A 3.3 LOW
Improper buffer restrictions in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2025-52566 1 Ggml 1 Llama.cpp 2025-08-27 N/A 8.6 HIGH
llama.cpp is an inference of several LLM models in C/C++. Prior to version b5721, there is a signed vs. unsigned integer overflow in llama.cpp's tokenizer implementation (llama_vocab::tokenize) (src/llama-vocab.cpp:3036) resulting in unintended behavior in tokens copying size comparison. Allowing heap-overflowing llama.cpp inferencing engine with carefully manipulated text input during tokenization process. This issue has been patched in version b5721.
CVE-2025-49847 1 Ggml 1 Llama.cpp 2025-08-27 N/A 8.8 HIGH
llama.cpp is an inference of several LLM models in C/C++. Prior to version b5662, an attacker‐supplied GGUF model vocabulary can trigger a buffer overflow in llama.cpp’s vocabulary‐loading code. Specifically, the helper _try_copy in llama.cpp/src/vocab.cpp: llama_vocab::impl::token_to_piece() casts a very large size_t token length into an int32_t, causing the length check (if (length < (int32_t)size)) to be bypassed. As a result, memcpy is still called with that oversized size, letting a malicious model overwrite memory beyond the intended buffer. This can lead to arbitrary memory corruption and potential code execution. This issue has been patched in version b5662.
CVE-2024-23157 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.
CVE-2024-23148 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted CATPRODUCT file, when parsed in CC5Dll.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
CVE-2024-23147 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted CATPART, X_B and STEP, when parsed in ASMKERN228A.dll and ASMKERN229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
CVE-2024-23133 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted STP file in ASMDATAX228A.dll when parsed through Autodesk applications can lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
CVE-2024-23131 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted STP file, when parsed in ASMIMPORT229A.dll, ASMKERN228A.dll, ASMkern229A.dll or ASMDATAX228A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
CVE-2024-23130 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
CVE-2024-23129 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted MODEL 3DM, STP, or SLDASM file, when in opennurbs.dll parsed through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
CVE-2024-23128 1 Autodesk 9 Advance Steel, Autocad, Autocad Architecture and 6 more 2025-08-26 N/A 7.8 HIGH
A maliciously crafted MODEL file, when parsed in libodxdll.dll and ASMDATAX229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
CVE-2025-2337 1 Matio Project 1 Matio 2025-08-26 7.5 HIGH 6.3 MEDIUM
A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-29366 2025-08-26 N/A 9.8 CRITICAL
In mupen64plus v2.6.0 there is an array overflow vulnerability in the write_rdram_regs and write_rdram_regs functions, which enables executing arbitrary commands on the host machine.
CVE-2014-0753 1 Ecava 1 Integraxor 2025-08-26 7.8 HIGH N/A
Stack-based buffer overflow in the SCADA server in Ecava IntegraXor before 4.1.4390 allows remote attackers to cause a denial of service (system crash) by triggering access to DLL code located in the IntegraXor directory.
CVE-2025-9299 1 Tenda 2 M3, M3 Firmware 2025-08-25 9.0 HIGH 8.8 HIGH
A vulnerability has been found in Tenda M3 1.0.0.12. Affected by this vulnerability is the function formGetMasterPassengerAnalyseData of the file /goform/getMasterPassengerAnalyseData. The manipulation of the argument Time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-9298 1 Tenda 2 M3, M3 Firmware 2025-08-25 9.0 HIGH 8.8 HIGH
A flaw has been found in Tenda M3 1.0.0.12. Affected is the function formQuickIndex of the file /goform/QuickIndex. Executing manipulation of the argument PPPOEPassword can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
CVE-2025-9184 1 Mozilla 2 Firefox, Thunderbird 2025-08-21 N/A 8.1 HIGH
Memory safety bugs present in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 142, Firefox ESR < 140.2, Thunderbird < 142, and Thunderbird < 140.2.
CVE-2025-9187 1 Mozilla 2 Firefox, Thunderbird 2025-08-21 N/A 9.8 CRITICAL
Memory safety bugs present in Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 142 and Thunderbird < 142.
CVE-2025-9087 1 Tenda 2 Ac20, Ac20 Firmware 2025-08-21 9.0 HIGH 8.8 HIGH
A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list of the file /goform/SetNetControlList of the component SetNetControlList Endpoint. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-9088 1 Tenda 2 Ac20, Ac20 Firmware 2025-08-21 9.0 HIGH 8.8 HIGH
A vulnerability was found in Tenda AC20 16.03.08.12. This vulnerability affects the function save_virtualser_data of the file /goform/formSetVirtualSer. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.