Filtered by CWE-120
Total 4230 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-1660 1 Autodesk 4 Navisworks, Navisworks Freedom, Navisworks Manage and 1 more 2026-02-26 7.8 High
A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2024-49829 1 Qualcomm 20 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 17 more 2026-02-26 6.7 Medium
Memory corruption can occur during context user dumps due to inadequate checks on buffer length.
CVE-2024-49830 1 Qualcomm 24 Qca6574au, Qca6574au Firmware, Qca6595au and 21 more 2026-02-26 6.6 Medium
Memory corruption while processing an IOCTL call to set mixer controls.
CVE-2025-21443 1 Qualcomm 72 Qam8255p, Qam8255p Firmware, Qam8295p and 69 more 2026-02-26 7.8 High
Memory corruption while processing message content in eAVB.
CVE-2025-1277 1 Autodesk 11 Advance Steel, Autocad, Autocad Architecture and 8 more 2026-02-26 7.8 High
A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2024-6198 2026-02-26 N/A
The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem.
CVE-2025-21444 1 Qualcomm 54 Qam8255p, Qam8255p Firmware, Qam8295p and 51 more 2026-02-26 7.8 High
Memory corruption while copying the result to the transmission queue in EMAC.
CVE-2025-5037 1 Autodesk 1 Revit 2026-02-26 7.8 High
A maliciously crafted RFA, RTE, or RVT file, when parsed through Autodesk Revit, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2023-38036 1 Ivanti 1 Avalanche 2026-02-26 9.8 Critical
A security vulnerability within Ivanti Avalanche Manager before version 6.4.1 may allow an unauthenticated attacker to create a buffer overflow that could result in service disruption or arbitrary code execution.
CVE-2025-7673 1 Zyxel 48 Emg3525-t50b, Emg3525-t50b Firmware, Emg5523-t50b and 45 more 2026-02-26 9.8 Critical
A buffer overflow vulnerability in the URL parser of the zhttpd web server in Zyxel VMG8825-T50K firmware versions prior to V5.50(ABOM.5)C0 could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and potentially execute arbitrary code by sending a specially crafted HTTP request.
CVE-2025-5038 1 Autodesk 17 3ds Max, Advance Steel, Autocad and 14 more 2026-02-26 7.8 High
A maliciously crafted X_T file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-6634 1 Autodesk 2 3ds Max, 3ds Max 2026-02-26 7.8 High
A maliciously crafted TGA file, when linked or imported into Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-9961 1 Tp-link 3 Ax10, Ax1500, Tp-link 2026-02-26 N/A
An authenticated attacker may remotely execute arbitrary code via the CWMP binary on the devices AX10 and AX1500.  The exploit can only be conducted via a Man-In-The-Middle (MITM) attack.  This issue affects AX10 V1/V1.2/V2/V2.6/V3/V3.6: before 1.2.1; AX1500 V1/V1.20/V1.26/V1.60/V1.80/V2.60/V3.6: before 1.3.11.
CVE-2025-5048 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2026-02-26 7.8 High
A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-8892 1 Autodesk 16 3ds Max, Advance Steel, Autocad and 13 more 2026-02-26 7.8 High
A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-21476 1 Qualcomm 85 Qca6391, Qca6391 Firmware, Qca6698aq and 82 more 2026-02-26 7.8 High
Memory corruption when passing parameters to the Trusted Virtual Machine during the handshake.
CVE-2025-21481 1 Qualcomm 499 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 496 more 2026-02-26 7.8 High
Memory corruption while performing private key encryption in trusted application.
CVE-2025-47341 1 Qualcomm 63 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 60 more 2026-02-26 7.8 High
memory corruption while processing an image encoding completion event.
CVE-2025-20333 1 Cisco 3 Adaptive Security Appliance Software, Firepower Threat Defense, Firepower Threat Defense Software 2026-02-26 9.9 Critical
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device.
CVE-2025-20709 2 Mediatek, Openwrt 12 Mt6890, Mt6890 Firmware, Mt7915 and 9 more 2026-02-26 8.8 High
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00415809; Issue ID: MSV-3405.