Search Results (333166 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-25446 1 Hugin Project 1 Hugin 2025-11-04 7.8 High
An issue in the HuginBase::PTools::setDestImage function of Hugin v2022.0.0 allows attackers to cause a heap buffer overflow via parsing a crafted image.
CVE-2024-25445 1 Hugin Project 1 Hugin 2025-11-04 7.8 High
Improper handling of values in HuginBase::PTools::Transform::transform of Hugin 2022.0.0 leads to an assertion failure.
CVE-2024-25443 1 Hugin Project 1 Hugin 2025-11-04 7.8 High
An issue in the HuginBase::ImageVariable<double>::linkWith function of Hugin v2022.0.0 allows attackers to cause a heap-use-after-free via parsing a crafted image.
CVE-2024-25442 1 Hugin Project 1 Hugin 2025-11-04 7.8 High
An issue in the HuginBase::PanoramaMemento::loadPTScript function of Hugin v2022.0.0 allows attackers to cause a heap buffer overflow via parsing a crafted image.
CVE-2024-25395 1 Rt-thread 1 Rt-thread 2025-11-04 8.8 High
A buffer overflow occurs in utilities/rt-link/src/rtlink.c in RT-Thread through 5.0.2.
CVE-2024-25394 1 Rt-thread 1 Rt-thread 2025-11-04 4.3 Medium
A buffer overflow occurs in utilities/ymodem/ry_sy.c in RT-Thread through 5.0.2 because of an incorrect sprintf call or a missing '\0' character.
CVE-2024-25393 1 Rt-thread 1 Rt-thread 2025-11-04 9.8 Critical
A stack buffer overflow occurs in net/at/src/at_server.c in RT-Thread through 5.0.2.
CVE-2024-25392 1 Rt-thread 1 Rt-thread 2025-11-04 5.9 Medium
An out-of-bounds access occurs in utilities/var_export/var_export.c in RT-Thread through 5.0.2.
CVE-2024-25391 1 Rt-thread 1 Rt-thread 2025-11-04 8.4 High
A stack buffer overflow occurs in libc/posix/ipc/mqueue.c in RT-Thread through 5.0.2.
CVE-2024-25390 1 Rt-thread 1 Rt-thread 2025-11-04 8.4 High
A heap buffer overflow occurs in finsh/msh_file.c and finsh/msh.c in RT-Thread through 5.0.2.
CVE-2024-25389 1 Rt-thread 1 Rt-thread 2025-11-04 7.5 High
RT-Thread through 5.0.2 generates random numbers with a weak algorithm of "seed = 214013L * seed + 2531011L; return (seed >> 16) & 0x7FFF;" in calc_random in drivers/misc/rt_random.c.
CVE-2024-25388 1 Rt-thread 1 Rt-thread 2025-11-04 8.4 High
drivers/wlan/wlan_mgmt,c in RT-Thread through 5.0.2 has an integer signedness error and resultant buffer overflow.
CVE-2024-25228 1 Vinchin 1 Vinchin Backup And Recovery 2025-11-04 8.8 High
Vinchin Backup and Recovery 7.2 and Earlier is vulnerable to Authenticated Remote Code Execution (RCE) via the getVerifydiyResult function in ManoeuvreHandler.class.php.
CVE-2024-25082 4 Debian, Fedoraproject, Fontforge and 1 more 4 Debian Linux, Fedora, Fontforge and 1 more 2025-11-04 6.5 Medium
Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed files.
CVE-2024-25081 4 Debian, Fedoraproject, Fontforge and 1 more 4 Debian Linux, Fedora, Fontforge and 1 more 2025-11-04 4.2 Medium
Splinefont in FontForge through 20230101 allows command injection via crafted filenames.
CVE-2024-24976 1 Openautomationsoftware 1 Open Automation Software 2025-11-04 4.9 Medium
A denial of service vulnerability exists in the OAS Engine File Data Source Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can cause the running program to stop. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2024-24794 2 Imaging Data Commons, Nih 2 Libdicom, Libdicom 2025-11-04 8.1 High
A use-after-free vulnerability exists in the DICOM Element Parsing as implemented in Imaging Data Commons libdicom 1.0.5. A specially crafted DICOM file can cause premature freeing of memory that is used later. To trigger this vulnerability, an attacker would need to induce the vulnerable application to process a malicious DICOM image.The Use-After-Free happens in the `parse_meta_sequence_end()` parsing the Sequence Value Represenations.
CVE-2024-24793 1 Nih 1 Libdicom 2025-11-04 8.1 High
A use-after-free vulnerability exists in the DICOM Element Parsing as implemented in Imaging Data Commons libdicom 1.0.5. A specially crafted DICOM file can cause premature freeing of memory that is used later. To trigger this vulnerability, an attacker would need to induce the vulnerable application to process a malicious DICOM image.The Use-After-Free happens in the `parse_meta_element_create()` parsing the elements in the File Meta Information header.
CVE-2024-24749 2 Geoserver, Microsoft 2 Geoserver, Windows 2025-11-04 7.5 High
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.5 and 2.24.3, if GeoServer is deployed in the Windows operating system using an Apache Tomcat web application server, it is possible to bypass existing input validation in the GeoWebCache ByteStreamController class and read arbitrary classpath resources with specific file name extensions. If GeoServer is also deployed as a web archive using the data directory embedded in the `geoserver.war` file (rather than an external data directory), it will likely be possible to read specific resources to gain administrator privileges. However, it is very unlikely that production environments will be using the embedded data directory since, depending on how GeoServer is deployed, it will be erased and re-installed (which would also reset to the default password) either every time the server restarts or every time a new GeoServer WAR is installed and is therefore difficult to maintain. An external data directory will always be used if GeoServer is running in standalone mode (via an installer or a binary). Versions 2.23.5 and 2.24.3 contain a patch for the issue. Some workarounds are available. One may change from a Windows environment to a Linux environment; or change from Apache Tomcat to Jetty application server. One may also disable anonymous access to the embeded GeoWebCache administration and status pages.
CVE-2024-24681 1 Yealink 1 Configuration Encryption Tool 2025-11-04 9.8 Critical
An issue was discovered in Yealink Configuration Encrypt Tool (AES version) and Yealink Configuration Encrypt Tool (RSA version before 1.2). There is a single hardcoded key (used to encrypt provisioning documents) across customers' installations.