Total
269 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2026-28364 | 1 Ocaml | 1 Ocaml | 2026-03-06 | N/A | 7.9 HIGH |
| In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data. | |||||
| CVE-2025-59600 | 1 Qualcomm | 328 Ar8031, Ar8031 Firmware, Ar8035 and 325 more | 2026-03-03 | N/A | 7.8 HIGH |
| Memory Corruption when adding user-supplied data without checking available buffer space. | |||||
| CVE-2026-26271 | 1 Freerdp | 1 Freerdp | 2026-02-27 | N/A | 5.3 MEDIUM |
| FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, a buffer overread in `freerdp_image_copy_from_icon_data()` (libfreerdp/codec/color.c) can be triggered by crafted RDP Window Icon (TS_ICON_INFO) data. The bug is reachable over the network when a client processes icon data from an RDP server (or from a man-in-the-middle). Version 3.23.0 fixes the issue. | |||||
| CVE-2026-27798 | 2 Dlemstra, Imagemagick | 2 Magick.net, Imagemagick | 2026-02-27 | N/A | 4.0 MEDIUM |
| ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability occurs when processing an image with small dimension using the `-wavelet-denoise` operator. Versions 7.1.2-15 and 6.9.13-40 contain a patch. | |||||
| CVE-2026-27799 | 2 Dlemstra, Imagemagick | 2 Magick.net, Imagemagick | 2026-02-27 | N/A | 4.0 MEDIUM |
| ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. Versions 7.1.2-15 and 6.9.13-40 contain a patch. | |||||
| CVE-2026-3203 | 1 Wireshark | 1 Wireshark | 2026-02-26 | N/A | 5.5 MEDIUM |
| RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service | |||||
| CVE-2026-26282 | 1 M2team | 1 Nanazip | 2026-02-20 | N/A | 6.6 MEDIUM |
| NanaZip is an open source file archive Starting in version 5.0.1252.0 and prior to version 6.0.1630.0, NanaZip has an out-of-bounds heap read in `.NET Single File` bundle header parser due to missing bounds check. Opening a crafted file with NanaZip causes a crash or leaks heap data to the user. Version 6.0.1630.0 patches the issue. | |||||
| CVE-2026-25646 | 1 Libpng | 1 Libpng | 2026-02-13 | N/A | 8.1 HIGH |
| LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55. | |||||
| CVE-2026-20846 | 1 Microsoft | 13 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 10 more | 2026-02-11 | N/A | 7.5 HIGH |
| Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network. | |||||
| CVE-2025-47402 | 1 Qualcomm | 188 Ar8035, Ar8035 Firmware, Cologne and 185 more | 2026-02-11 | N/A | 6.5 MEDIUM |
| Transient DOS when processing a received frame with an excessively large authentication information element. | |||||
| CVE-2025-21427 | 1 Qualcomm | 358 205 Mobile, 205 Mobile Firmware, 215 Mobile and 355 more | 2026-02-11 | N/A | 8.2 HIGH |
| Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network. | |||||
| CVE-2025-21429 | 1 Qualcomm | 364 9206 Lte Modem, 9206 Lte Modem Firmware, Apq8017 and 361 more | 2026-02-10 | N/A | 7.5 HIGH |
| Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request. | |||||
| CVE-2025-21484 | 1 Qualcomm | 346 Apq8064au, Apq8064au Firmware, Aqt1000 and 343 more | 2026-02-10 | N/A | 8.2 HIGH |
| Information disclosure when UE receives the RTP packet from the network, while decoding and reassembling the fragments from RTP packet. | |||||
| CVE-2025-21449 | 1 Qualcomm | 370 315 5g Iot, 315 5g Iot Firmware, Apq8017 and 367 more | 2026-02-10 | N/A | 7.5 HIGH |
| Transient DOS may occur while processing malformed length field in SSID IEs. | |||||
| CVE-2025-66692 | 1 Trustwallet | 1 Trust Wallet Core | 2026-01-30 | N/A | 7.5 HIGH |
| A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet Core before commit 5668c67 allows attackers to cause a Denial of Service (DoS) via a crafted input. | |||||
| CVE-2025-47330 | 1 Qualcomm | 446 Ar8031, Ar8031 Firmware, Ar8035 and 443 more | 2026-01-28 | N/A | 5.5 MEDIUM |
| Transient DOS while parsing video packets received from the video firmware. | |||||
| CVE-2025-47331 | 1 Qualcomm | 598 Ar8031, Ar8031 Firmware, Ar8035 and 595 more | 2026-01-28 | N/A | 6.1 MEDIUM |
| Information disclosure while processing a firmware event. | |||||
| CVE-2025-47395 | 1 Qualcomm | 2 Wcn7861, Wcn7861 Firmware | 2026-01-27 | N/A | 6.5 MEDIUM |
| Transient DOS while parsing a WLAN management frame with a Vendor Specific Information Element. | |||||
| CVE-2025-60003 | 1 Juniper | 2 Junos, Junos Os Evolved | 2026-01-23 | N/A | 7.5 HIGH |
| A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer. This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring: [ protocols bgp ... disable-4byte-as ] Established BGP sessions can be checked by executing: show bgp neighbor <IP address> | match "4 byte AS" This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-S6-EVO, * 24.2 versions before 24.2R2-S2-EVO, * 24.4 versions before 24.4R2-EVO. | |||||
| CVE-2025-12745 | 1 Bellard | 1 Quickjs | 2026-01-08 | 4.3 MEDIUM | 5.3 MEDIUM |
| A weakness has been identified in QuickJS up to eb2c89087def1829ed99630cb14b549d7a98408c. This affects the function js_array_buffer_slice of the file quickjs.c. This manipulation causes buffer over-read. The attack is restricted to local execution. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery Patch name: c6fe5a98fd3ef3b7064e6e0145dfebfe12449fea. To fix this issue, it is recommended to deploy a patch. | |||||
