Search Results (2848 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-50360 2 Dannyvankooten, Pepper-lang 2 Pepper, Compiler 2025-12-17 8.4 High
A heap buffer overflow in compiler.c and compiler.h in Pepper language 0.1.1commit 961a5d9988c5986d563310275adad3fd181b2bb7. Malicious execution of a pepper source file(.pr) could lead to arbitrary code execution or Denial of Service.
CVE-2024-29204 1 Ivanti 1 Avalanche 2025-12-17 9.8 Critical
A Heap Overflow vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote unauthenticated attacker to execute arbitrary commands
CVE-2025-1252 1 Rti 1 Connext Professional 2025-12-17 7.1 High
Heap-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42, from 5.3.0 before 5.3.*, from 4.4d before 5.2.*.
CVE-2025-64524 1 Openprinting 2 Cups-filters, Libcupsfilters 2025-12-15 3.3 Low
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.
CVE-2025-36923 1 Google 1 Android 2025-12-13 8 High
In NrmmDecoder::DecodeSORTransparentContext of cn_NrmmDecoder.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-61832 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-12-12 7.8 High
InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61824 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-12-12 7.8 High
InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61816 3 Adobe, Apple, Microsoft 3 Incopy, Macos, Windows 2025-12-12 7.8 High
InCopy versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61819 3 Adobe, Apple, Microsoft 3 Photoshop, Macos, Windows 2025-12-12 7.8 High
Photoshop Desktop versions 26.8.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61829 1 Adobe 1 Illustrator On Ipad 2025-12-12 7.8 High
Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61827 1 Adobe 1 Illustrator On Ipad 2025-12-12 7.8 High
Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-52356 2 Libtiff, Redhat 4 Libtiff, Ai Inference Server, Discovery and 1 more 2025-12-11 7.5 High
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
CVE-2025-64784 3 Adobe, Apple, Microsoft 3 Dng Software Development Kit, Macos, Windows 2025-12-11 7.1 High
DNG SDK versions 1.7.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure or application denial of service. An attacker could leverage this vulnerability to disclose sensitive memory information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-38079 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2025-12-10 7.8 High
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38076 1 Microsoft 5 Windows Server 2016, Windows Server 2019, Windows Server 2022 and 2 more 2025-12-10 9.8 Critical
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38065 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2025-12-10 6.8 Medium
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-38032 1 Microsoft 10 Windows 10 21h2, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-12-10 7.1 High
Microsoft Xbox Remote Code Execution Vulnerability
CVE-2024-37977 1 Microsoft 9 Windows 11 21h2, Windows 11 21h2, Windows 11 22h2 and 6 more 2025-12-10 8 High
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-35256 1 Microsoft 5 Sql Server, Sql Server 2016, Sql Server 2017 and 2 more 2025-12-10 8.8 High
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37333 1 Microsoft 5 Sql Server, Sql Server 2016, Sql Server 2017 and 2 more 2025-12-10 8.8 High
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability