A vulnerability classified as critical has been found in Nothings stb up to f056911. This affects the function stb_include_string. The manipulation of the argument path_to_includes leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2025-3409. It is possible to initiate the attack remotely. There is no exploit available.
This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow.
This vulnerability is handled as CVE-2025-3408. The attack may be launched remotely. There is no exploit available.
Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Nothings stb up to f056911. It has been declared as critical. Affected by this vulnerability is the function stbhw_build_tileset_from_image. The manipulation of the argument h_count/v_count leads to out-of-bounds read.
This vulnerability is known as CVE-2025-3407. The attack can be launched remotely. There is no exploit available.
This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Nothings stb up to f056911. It has been classified as problematic. Affected is the function stbhw_build_tileset_from_image of the component Header Array Handler. The manipulation of the argument w leads to out-of-bounds read.
This vulnerability is traded as CVE-2025-3406. It is possible to launch the attack remotely. There is no exploit available.
This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
The vendor was contacted early about this disclosure but did not respond in any way.
After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune 500 companies, I’ve learned that looking busy isn’t the same as being secure.
It’s an easy trap for busy cybersecurity leaders to fall into. We rely on metrics that tell a story of the tremendous efforts we’re expending - how many vulnerabilities we patched, how fast we
A vulnerability has been found in Qualcomm Snapdragon Compute FastConnect 6900 up to WSA8845 and classified as critical. This vulnerability affects unknown code of the component Device IO Control. The manipulation leads to improper validation of array index.
This vulnerability was named CVE-2025-21447. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Qualcomm Snapdragon Auto. This affects an unknown part of the component eAVB. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-21443. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.