Search

Search Results (335034 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-23315 4 Apple, Linux, Microsoft and 1 more 4 Macos, Linux Kernel, Windows and 1 more 2026-02-26 7.8 High
NVIDIA NeMo Framework for all platforms contains a vulnerability in the export and deploy component, where malicious data created by an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
CVE-2025-27054 1 Qualcomm 599 315 5g Iot Modem, 315 5g Iot Modem Firmware, 9205 Lte Modem and 596 more 2026-02-26 7.8 High
Memory corruption while processing a malformed license file during reboot.
CVE-2025-10500 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Use after free in Dawn in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-27059 1 Qualcomm 51 Immersive Home 214 Platform, Immersive Home 214 Platform Firmware, Immersive Home 216 Platform and 48 more 2026-02-26 8.8 High
Memory corruption while performing SCM call.
CVE-2025-9478 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Use after free in ANGLE in Google Chrome prior to 139.0.7258.154 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
CVE-2025-10501 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Use after free in WebRTC in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-27060 1 Qualcomm 51 Immersive Home 214 Platform, Immersive Home 214 Platform Firmware, Immersive Home 216 Platform and 48 more 2026-02-26 8.8 High
Memory corruption while performing SCM call with malformed inputs.
CVE-2025-10502 4 Apple, Google, Linux and 1 more 5 Macos, Angle, Chrome and 2 more 2026-02-26 8.8 High
Heap buffer overflow in ANGLE in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via malicious network traffic. (Chromium security severity: High)
CVE-2025-22409 1 Google 1 Android 2026-02-26 8.4 High
In rfc_send_buf_uih of rfc_ts_frames.cc, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-47338 1 Qualcomm 37 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 34 more 2026-02-26 7.8 High
Memory corruption while processing escape commands from userspace.
CVE-2025-10891 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Integer overflow in V8 in Google Chrome prior to 140.0.7339.207 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-47340 1 Qualcomm 37 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 34 more 2026-02-26 7.8 High
Memory corruption while processing IOCTL call to get the mapping.
CVE-2025-22411 1 Google 1 Android 2026-02-26 8.8 High
In process_service_attr_rsp of sdp_discovery.cc, there is a possible use after free due to a logic error in the code. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-10892 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Integer overflow in V8 in Google Chrome prior to 140.0.7339.207 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-47341 1 Qualcomm 63 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 60 more 2026-02-26 7.8 High
memory corruption while processing an image encoding completion event.
CVE-2025-22412 1 Google 1 Android 2026-02-26 8.8 High
In multiple functions of sdp_server.cc, there is a possible use after free due to a logic error in the code. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-20334 1 Cisco 1 Ios Xe Software 2026-02-26 8.8 High
A vulnerability in the HTTP API subsystem of Cisco IOS XE Software could allow a remote attacker to inject commands that will execute with root privileges into the underlying operating system. This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by authenticating to an affected system and performing an API call with crafted input. Alternatively, an unauthenticated attacker could persuade a legitimate user with administrative privileges who is currently logged in to the system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
CVE-2025-47347 2 Qnx, Qualcomm 76 Qnx, Qam8255p, Qam8255p Firmware and 73 more 2026-02-26 7.8 High
Memory corruption while processing control commands in the virtual memory management interface.
CVE-2025-43728 1 Dell 33 Latitude 3330, Latitude 3420, Latitude 3440 and 30 more 2026-02-26 9.6 Critical
Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass.
CVE-2025-20160 1 Cisco 2 Ios, Ios Xe Software 2026-02-26 8.1 High
A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication. This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device.