Total
128 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-12719 | 1 Advantech | 1 Webaccess | 2025-04-20 | 5.0 MEDIUM | 7.5 HIGH |
An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A remote attacker is able to execute code to dereference a pointer within the program causing the application to become unavailable. | |||||
CVE-2024-23136 | 1 Autodesk | 9 Advance Steel, Autocad, Autocad Architecture and 6 more | 2025-04-11 | N/A | 7.8 HIGH |
A maliciously crafted STP file in ASMKERN228A.dll when parsed through Autodesk applications can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process. | |||||
CVE-2024-12576 | 2025-03-07 | N/A | 5.5 MEDIUM | ||
Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger a crash of the FW running on the GPU freezing graphics output. | |||||
CVE-2024-53033 | 1 Qualcomm | 16 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 13 more | 2025-03-07 | N/A | 7.8 HIGH |
Memory corruption while doing Escape call when user provides valid kernel address in the place of valid user buffer address. | |||||
CVE-2024-53034 | 1 Qualcomm | 16 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 13 more | 2025-03-07 | N/A | 7.8 HIGH |
Memory corruption occurs during an Escape call if an invalid Kernel Mode CPU event and sync object handle are passed with the DriverKnownEscape flag reset. | |||||
CVE-2023-32277 | 2025-02-12 | N/A | 6.1 MEDIUM | ||
Untrusted Pointer Dereference in I/O subsystem for some Intel(R) QAT software before version 2.0.5 may allow authenticated user to potentially enable information disclosure via local operating system access. | |||||
CVE-2025-21358 | 2025-02-11 | N/A | 7.8 HIGH | ||
Windows Core Messaging Elevation of Privileges Vulnerability | |||||
CVE-2024-45584 | 1 Qualcomm | 248 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 245 more | 2025-02-05 | N/A | 7.8 HIGH |
Memory corruption can occur when a compat IOCTL call is followed by a normal IOCTL call from userspace. | |||||
CVE-2023-36033 | 1 Microsoft | 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more | 2025-01-23 | N/A | 7.8 HIGH |
Windows DWM Core Library Elevation of Privilege Vulnerability | |||||
CVE-2025-21354 | 1 Microsoft | 3 365 Apps, Office, Office Online Server | 2025-01-21 | N/A | 8.4 HIGH |
Microsoft Excel Remote Code Execution Vulnerability | |||||
CVE-2024-26252 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-01-08 | N/A | 6.8 MEDIUM |
Windows rndismp6.sys Remote Code Execution Vulnerability | |||||
CVE-2024-49090 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-01-08 | N/A | 7.8 HIGH |
Windows Common Log File System Driver Elevation of Privilege Vulnerability | |||||
CVE-2024-35250 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2024-12-17 | N/A | 7.8 HIGH |
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | |||||
CVE-2024-33039 | 1 Qualcomm | 44 Qam8255p, Qam8255p Firmware, Qam8650p and 41 more | 2024-12-11 | N/A | 6.7 MEDIUM |
Memory corruption when PAL client calls PAL service APIs by passing a random value as handle and the handle is not validated by the service. | |||||
CVE-2024-36461 | 1 Zabbix | 1 Zabbix | 2024-12-10 | N/A | 9.1 CRITICAL |
Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine. | |||||
CVE-2024-26213 | 1 Microsoft | 1 Windows Server 2022 23h2 | 2024-12-06 | N/A | 7.0 HIGH |
Microsoft Brokering File System Elevation of Privilege Vulnerability | |||||
CVE-2024-26254 | 1 Microsoft | 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more | 2024-12-05 | N/A | 7.5 HIGH |
Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability | |||||
CVE-2022-42396 | 1 Pdf-xchange | 1 Pdf-xchange Editor | 2024-11-27 | N/A | 7.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18278. | |||||
CVE-2022-42418 | 1 Pdf-xchange | 1 Pdf-xchange Editor | 2024-11-27 | N/A | 7.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18677. | |||||
CVE-2024-40872 | 2024-11-21 | N/A | 8.4 HIGH | ||
There is an elevation of privilege vulnerability in server and client components of Absolute Secure Access prior to version 13.07. Attackers with local access and valid desktop user credentials can elevate their privilege to system level by passing invalid address data to the vulnerable component. This could be used to manipulate process tokens to elevate the privilege of a normal process to System. The scope is changed, the impact to system confidentiality and integrity is high, the impact to the availability of the effected component is none. |