Export limit exceeded: 342067 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 18436 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (7958 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-51006 2 Appneta, Broadcom 2 Tcpreplay, Tcpreplay 2025-10-14 7.8 High
Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the dlt_linuxsll2_cleanup() function in plugins/dlt_linuxsll2/linuxsll2.c. This vulnerability is triggered when tcpedit_dlt_cleanup() indirectly invokes the cleanup routine multiple times on the same memory region. By supplying a specifically crafted pcap file to the tcprewrite binary, a local attacker can exploit this flaw to cause a Denial of Service (DoS) via memory corruption.
CVE-2024-36353 2025-10-14 6.5 Medium
Insufficient clearing of GPU global memory could allow a malicious process running on the same GPU to read left over memory values potentially leading to loss of confidentiality.
CVE-2023-36041 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2025-10-08 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-36396 1 Microsoft 2 Windows 11 22h2, Windows 11 23h2 2025-10-08 7.8 High
Windows Compressed Folder Remote Code Execution Vulnerability
CVE-2023-36008 1 Microsoft 1 Edge Chromium 2025-10-08 6.6 Medium
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVE-2023-36034 1 Microsoft 1 Edge Chromium 2025-10-08 7.3 High
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVE-2025-3450 1 Br-automation 1 Automation Runtime 2025-10-08 10 Critical
An Improper Resource Locking vulnerability in the SDM component of B&R Automation Runtime versions before 6.3 and before Q4.93 may allow an unauthenticated network-based attacker to delete data causing denial of service conditions.
CVE-2025-5100 1 Dynamixsoftware 1 Printershare 2025-10-08 8 High
A double-free condition occurs during the cleanup of temporary image files, which can be exploited to achieve memory corruption and potentially arbitrary code execution.
CVE-2024-42326 1 Zabbix 1 Zabbix 2025-10-08 4.4 Medium
There was discovered a use after free bug in browser.c in the es_browser_get_variant function
CVE-2024-42112 1 Linux 1 Linux Kernel 2025-10-07 7.8 High
In the Linux kernel, the following vulnerability has been resolved: net: txgbe: free isb resources at the right time When using MSI/INTx interrupt, the shared interrupts are still being handled in the device remove routine, before free IRQs. So isb memory is still read after it is freed. Thus move wx_free_isb_resources() from txgbe_close() to txgbe_remove(). And fix the improper isb free action in txgbe_open() error handling path.
CVE-2023-52888 1 Linux 1 Linux Kernel 2025-10-07 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Only free buffer VA that is not NULL In the MediaTek vcodec driver, while mtk_vcodec_mem_free() is mostly called only when the buffer to free exists, there are some instances that didn't do the check and triggered warnings in practice. We believe those checks were forgotten unintentionally. Add the checks back to fix the warnings.
CVE-2025-61692 1 Keyence 1 Vt Studio 2025-10-07 7.8 High
VT STUDIO versions 8.53 and prior contain a use after free vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.
CVE-2024-45544 1 Qualcomm 88 C-v2x 9150, C-v2x 9150 Firmware, Fastconnect 6800 and 85 more 2025-10-06 6.6 Medium
Memory corruption while processing IOCTL calls to add route entry in the HW.
CVE-2024-45540 1 Qualcomm 136 C-v2x 9150, C-v2x 9150 Firmware, Fastconnect 6200 and 133 more 2025-10-06 6.6 Medium
Memory corruption while invoking IOCTL map buffer request from userspace.
CVE-2024-43066 1 Qualcomm 196 Csrb31024, Csrb31024 Firmware, Fastconnect 6200 and 193 more 2025-10-06 7.8 High
Memory corruption while handling file descriptor during listener registration/de-registration.
CVE-2025-9385 2 Appneta, Broadcom 2 Tcpreplay, Tcpreplay 2025-10-06 5.3 Medium
A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restricted to local execution. The exploit has been published and may be used. Upgrading to version 4.5.2-beta3 is sufficient to fix this issue. It is advisable to upgrade the affected component.
CVE-2025-9386 2 Appneta, Broadcom 2 Tcpreplay, Tcpreplay 2025-10-06 5.3 Medium
A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.2-beta3 is sufficient to resolve this issue. You should upgrade the affected component.
CVE-2024-23365 1 Qualcomm 96 Fastconnect 7800, Fastconnect 7800 Firmware, Qam8255p and 93 more 2025-10-03 8.4 High
Memory corruption while releasing shared resources in MinkSocket listener thread.
CVE-2024-38629 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-10-03 7.8 High
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Avoid unnecessary destruction of file_ida file_ida is allocated during cdev open and is freed accordingly during cdev release. This sequence is guaranteed by driver file operations. Therefore, there is no need to destroy an already empty file_ida when the WQ cdev is removed. Worse, ida_free() in cdev release may happen after destruction of file_ida per WQ cdev. This can lead to accessing an id in file_ida after it has been destroyed, resulting in a kernel panic. Remove ida_destroy(&file_ida) to address these issues.
CVE-2024-40922 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-10-03 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: don't lock while !TASK_RUNNING There is a report of io_rsrc_ref_quiesce() locking a mutex while not TASK_RUNNING, which is due to forgetting restoring the state back after io_run_task_work_sig() and attempts to break out of the waiting loop. do not call blocking ops when !TASK_RUNNING; state=1 set at [<ffffffff815d2494>] prepare_to_wait+0xa4/0x380 kernel/sched/wait.c:237 WARNING: CPU: 2 PID: 397056 at kernel/sched/core.c:10099 __might_sleep+0x114/0x160 kernel/sched/core.c:10099 RIP: 0010:__might_sleep+0x114/0x160 kernel/sched/core.c:10099 Call Trace: <TASK> __mutex_lock_common kernel/locking/mutex.c:585 [inline] __mutex_lock+0xb4/0x940 kernel/locking/mutex.c:752 io_rsrc_ref_quiesce+0x590/0x940 io_uring/rsrc.c:253 io_sqe_buffers_unregister+0xa2/0x340 io_uring/rsrc.c:799 __io_uring_register io_uring/register.c:424 [inline] __do_sys_io_uring_register+0x5b9/0x2400 io_uring/register.c:613 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xd8/0x270 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x6f/0x77