Software installed and run as a non-privileged user may conduct improper GPU system calls to cause kernel system memory corruption.
Publication date: Fri, 04 Apr 2025 15:42:00 +0000
Cyber News related to CVE-2025-25178
CVE-2025-25178 - Software installed and run as a non-privileged user may conduct improper GPU system calls to cause kernel system memory corruption. ...
11 months ago
CVE-2019-25178 - Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was in a CNA pool that was not assigned to any issues during 2019. Notes: none. ...
5 months ago
CVE-2020-25178 - ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this ...
3 years ago
CVE-2021-25178 - An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. This can allow attackers to cause a crash ...
3 years ago
CVE-2023-25178 - Controller may be loaded with malicious firmware which could enable remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning. ...
1 year ago
CVE-2022-25178 - Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the ...
2 years ago
CVE-2024-25178 - LuaJIT through 2.1 has an out-of-bounds read in the stack-overflow handler in lj_state.c ...
8 months ago
CVE-2018-25178 - Easyndexer 1.0 contains an arbitrary file download vulnerability that allows unauthenticated attackers to download sensitive files by manipulating the file parameter. Attackers can send POST requests to showtif.php with arbitrary file paths in the ...
56 years ago