Vulnerabilities (CVE)

Filtered by CWE-126
Total 292 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2026-27799 2 Dlemstra, Imagemagick 2 Magick.net, Imagemagick 2026-02-27 N/A 4.0 MEDIUM
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
CVE-2026-3203 1 Wireshark 1 Wireshark 2026-02-26 N/A 5.5 MEDIUM
RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service
CVE-2026-26282 1 M2team 1 Nanazip 2026-02-20 N/A 6.6 MEDIUM
NanaZip is an open source file archive Starting in version 5.0.1252.0 and prior to version 6.0.1630.0, NanaZip has an out-of-bounds heap read in `.NET Single File` bundle header parser due to missing bounds check. Opening a crafted file with NanaZip causes a crash or leaks heap data to the user. Version 6.0.1630.0 patches the issue.
CVE-2026-25646 1 Libpng 1 Libpng 2026-02-13 N/A 8.1 HIGH
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.
CVE-2026-20846 1 Microsoft 13 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 10 more 2026-02-11 N/A 7.5 HIGH
Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.
CVE-2025-47402 1 Qualcomm 188 Ar8035, Ar8035 Firmware, Cologne and 185 more 2026-02-11 N/A 6.5 MEDIUM
Transient DOS when processing a received frame with an excessively large authentication information element.
CVE-2025-21427 1 Qualcomm 358 205 Mobile, 205 Mobile Firmware, 215 Mobile and 355 more 2026-02-11 N/A 8.2 HIGH
Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network.
CVE-2025-21429 1 Qualcomm 364 9206 Lte Modem, 9206 Lte Modem Firmware, Apq8017 and 361 more 2026-02-10 N/A 7.5 HIGH
Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request.
CVE-2025-21484 1 Qualcomm 346 Apq8064au, Apq8064au Firmware, Aqt1000 and 343 more 2026-02-10 N/A 8.2 HIGH
Information disclosure when UE receives the RTP packet from the network, while decoding and reassembling the fragments from RTP packet.
CVE-2025-21449 1 Qualcomm 370 315 5g Iot, 315 5g Iot Firmware, Apq8017 and 367 more 2026-02-10 N/A 7.5 HIGH
Transient DOS may occur while processing malformed length field in SSID IEs.
CVE-2025-66692 1 Trustwallet 1 Trust Wallet Core 2026-01-30 N/A 7.5 HIGH
A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet Core before commit 5668c67 allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2025-47330 1 Qualcomm 446 Ar8031, Ar8031 Firmware, Ar8035 and 443 more 2026-01-28 N/A 5.5 MEDIUM
Transient DOS while parsing video packets received from the video firmware.
CVE-2025-47331 1 Qualcomm 598 Ar8031, Ar8031 Firmware, Ar8035 and 595 more 2026-01-28 N/A 6.1 MEDIUM
Information disclosure while processing a firmware event.
CVE-2025-47395 1 Qualcomm 2 Wcn7861, Wcn7861 Firmware 2026-01-27 N/A 6.5 MEDIUM
Transient DOS while parsing a WLAN management frame with a Vendor Specific Information Element.
CVE-2025-60003 1 Juniper 2 Junos, Junos Os Evolved 2026-01-23 N/A 7.5 HIGH
A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer. This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring: [ protocols bgp ... disable-4byte-as ] Established BGP sessions can be checked by executing: show bgp neighbor <IP address> | match "4 byte AS" This issue affects: Junos OS:  * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2; Junos OS Evolved:  * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-S6-EVO, * 24.2 versions before 24.2R2-S2-EVO, * 24.4 versions before 24.4R2-EVO.
CVE-2022-23130 2 Iconics, Mitsubishielectric 3 Genesis64, Hyper Historian, Mc Works64 2026-01-08 4.3 MEDIUM 5.9 MEDIUM
Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A to 4.04E, Mitsubishi Electric GENESIS64 versions 10.97 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 and prior, Mitsubishi Electric ICONICS Suite versions 10.97 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 and prior, Mitsubishi Electric GENESIS32 versions 9.7 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.7 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64, ICONICS Suite, MC Works64, or GENESIS32 and execute commands against the database from GENESIS64, ICONICS Suite, MC Works64, or GENESIS32.
CVE-2025-63602 1 Awesomeminer 1 Awesome Miner 2025-12-31 N/A 7.3 HIGH
A vulnerability was discovered in Awesome Miner thru 11.2.4 that allows arbitrary read and write to kernel memory and MSRs (such as LSTAR) as an unprivileged user. This is due to the implementation of an insecure version of WinRing0 (1.2.0.5, renamed to IntelliBreeze.Maintenance.Service.sys) that lacks a properly secured DACL, allowing unprivileged users to interact with the driver and, as a result, the kernel. This can result in local privilege escalation, information disclosure, denial of service, and other unspecified impacts.
CVE-2025-12106 1 Openvpn 1 Openvpn 2025-12-30 N/A 9.1 CRITICAL
Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
CVE-2025-59933 1 Libvips 1 Libvips 2025-12-24 N/A 7.8 HIGH
libvips is a demand-driven, horizontally threaded image processing library. For versions 8.17.1 and below, when libvips is compiled with support for PDF input via poppler, the pdfload operation is affected by a buffer read overflow when parsing the header of a crafted PDF with a page that defines a width but not a height. Those using libvips compiled without support for PDF input are unaffected as well as thosewith support for PDF input via PDFium. This issue is fixed in version 8.17.2. A workaround for those affected is to block the VipsForeignLoadPdf operation via vips_operation_block_set, which is available in most language bindings, or to set VIPS_BLOCK_UNTRUSTED environment variable at runtime, which will block all untrusted loaders including PDF input via poppler.
CVE-2025-62473 1 Microsoft 14 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 11 more 2025-12-12 N/A 6.5 MEDIUM
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.