Search Results (330279 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-53514 1 Mattermost 2 Confluence, Mattermost 2025-09-25 5.9 Medium
Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body.
CVE-2025-48731 1 Mattermost 2 Confluence, Mattermost 2025-09-25 6.4 Medium
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the Confluence space which allows attackers to edit a subscription for a Confluence space the user does not have access for via edit subscription endpoint.
CVE-2025-44004 1 Mattermost 2 Confluence, Mattermost 2025-09-25 7.2 High
Mattermost Confluence Plugin version <1.5.0 fails to check the authorization of the user to the Mattermost instance which allows attackers to create a channel subscription without proper authorization via API call to the create channel subscription endpoint.
CVE-2025-1277 1 Autodesk 11 Advance Steel, Autocad, Autocad Architecture and 8 more 2025-09-25 7.8 High
A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-1656 1 Autodesk 11 Advance Steel, Autocad, Autocad Architecture and 8 more 2025-09-25 7.8 High
A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-1273 1 Autodesk 11 Advance Steel, Autocad, Autocad Architecture and 8 more 2025-09-25 7.8 High
A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-7675 1 Autodesk 17 3ds Max, Advance Steel, Autocad and 14 more 2025-09-25 7.8 High
A maliciously crafted 3DM file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CVE-2025-5043 1 Autodesk 17 3ds Max, Advance Steel, Autocad and 14 more 2025-09-25 7.8 High
A maliciously crafted 3DM file, when linked or imported into certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-5038 1 Autodesk 17 3ds Max, Advance Steel, Autocad and 14 more 2025-09-25 7.8 High
A maliciously crafted X_T file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-47328 1 Qualcomm 135 Fastconnect 7800, Fastconnect 7800 Firmware, Immersive Home 3210 Platform and 132 more 2025-09-25 7.5 High
Transient DOS while processing power control requests with invalid antenna or stream values.
CVE-2025-47326 1 Qualcomm 241 Ar8035, Ar8035 Firmware, Csr8811 and 238 more 2025-09-25 7.5 High
Transient DOS while handling command data during power control processing.
CVE-2025-1274 1 Autodesk 11 Advance Steel, Autocad, Autocad Architecture and 8 more 2025-09-25 7.8 High
A maliciously crafted RCS file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CVE-2025-47327 1 Qualcomm 83 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 80 more 2025-09-25 7.8 High
Memory corruption while encoding the image data.
CVE-2025-47329 2 Google, Qualcomm 78 Android, Fastconnect 7800, Fastconnect 7800 Firmware and 75 more 2025-09-25 7.8 High
Memory corruption while handling invalid inputs in application info setup.
CVE-2025-5048 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-09-25 7.8 High
A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-5047 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-09-25 7.8 High
A maliciously crafted DGN file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-5046 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-09-25 7.8 High
A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2024-23198 1 Intel 14 Killer, Killer Wi-fi 6 Ax1650, Killer Wi-fi 6e Ax1675 and 11 more 2025-09-25 6.6 Medium
Improper input validation in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi products before version 23.40 may allow an unauthenticated user to enable denial of service via adjacent access.
CVE-2025-58319 2 Delta Electronics, Deltaww 2 Cncsoft-g2, Cncsoft-g2 2025-09-25 7.8 High
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
CVE-2025-58317 2 Delta Electronics, Deltaww 2 Cncsoft-g2, Cncsoft-g2 2025-09-25 7.8 High
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.