U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.

For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.

Last 20 Scored Vulnerability IDs & Summaries CVSS Severity
  • CVE-2022-49976 - In the Linux kernel, the following vulnerability has been resolved: platform/x86: x86-android-tablets: Fix broken touchscreen on Chuwi Hi8 with Windows BIOS The x86-android-tablets handling for the Chuwi Hi8 is only necessary with the Android BI... read CVE-2022-49976
    Published: June 18, 2025; 7:15:25 AM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2022-49975 - In the Linux kernel, the following vulnerability has been resolved: bpf: Don't redirect packets with invalid pkt_len Syzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any skbs, that is, the flow->head is null. The root cause,... read CVE-2022-49975
    Published: June 18, 2025; 7:15:24 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2022-49974 - In the Linux kernel, the following vulnerability has been resolved: HID: nintendo: fix rumble worker null pointer deref We can dereference a null pointer trying to queue work to a destroyed workqueue. If the device is disconnected, nintendo_hid... read CVE-2022-49974
    Published: June 18, 2025; 7:15:24 AM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2022-49973 - In the Linux kernel, the following vulnerability has been resolved: skmsg: Fix wrong last sg check in sk_msg_recvmsg() Fix one kernel NULL pointer dereference as below: [ 224.462334] Call Trace: [ 224.462394] __tcp_bpf_recvmsg+0xd3/0x380 [ ... read CVE-2022-49973
    Published: June 18, 2025; 7:15:24 AM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2022-49972 - In the Linux kernel, the following vulnerability has been resolved: xsk: Fix corrupted packets for XDP_SHARED_UMEM Fix an issue in XDP_SHARED_UMEM mode together with aligned mode where packets are corrupted for the second and any further sockets... read CVE-2022-49972
    Published: June 18, 2025; 7:15:24 AM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2022-49971 - In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix a potential gpu_metrics_table memory leak Memory is allocated for gpu_metrics_table in smu_v13_0_4_init_smc_tables(), but not freed in smu_v13_0_4_fini_smc_table... read CVE-2022-49971
    Published: June 18, 2025; 7:15:24 AM -0400

    V3.1: 5.5 MEDIUM

  • CVE-2022-49969 - In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: clear optc underflow before turn off odm clock [Why] After ODM clock off, optc underflow bit will be kept there always and clear not work. We need to clear that... read CVE-2022-49969
    Published: June 18, 2025; 7:15:24 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2022-49968 - In the Linux kernel, the following vulnerability has been resolved: ieee802154/adf7242: defer destroy_workqueue call There is a possible race condition (use-after-free) like below (FREE) | (USE) adf7242_remove ... read CVE-2022-49968
    Published: June 18, 2025; 7:15:24 AM -0400

    V3.1: 4.7 MEDIUM

  • CVE-2024-37004 - A maliciously crafted SLDPRT file, when parsed in ASMKERN229A.dll through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
    Published: June 25, 2024; 12:15:15 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-37000 - A maliciously crafted X_B file, when parsed in pskernel.DLL through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code exe... read CVE-2024-37000
    Published: June 24, 2024; 11:15:10 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-23157 - A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, along with other vulnerabilities, can lead to cod... read CVE-2024-23157
    Published: June 25, 2024; 12:15:13 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-23150 - A maliciously crafted PRT file, when parsed in odxug_dll.dll through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary ... read CVE-2024-23150
    Published: June 25, 2024; 12:15:11 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-23149 - A maliciously crafted SLDDRW file, when parsed in ODXSW_DLL.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in th... read CVE-2024-23149
    Published: June 24, 2024; 11:15:10 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-23148 - A maliciously crafted CATPRODUCT file, when parsed in CC5Dll.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to cod... read CVE-2024-23148
    Published: June 24, 2024; 11:15:10 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-23147 - A maliciously crafted CATPART, X_B and STEP, when parsed in ASMKERN228A.dll and ASMKERN229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other v... read CVE-2024-23147
    Published: June 24, 2024; 11:15:10 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-23146 - A maliciously crafted X_B and X_T file, when parsed in pskernel.DLL through through Autodesk AutoCAD, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or exe... read CVE-2024-23146
    Published: June 24, 2024; 11:15:10 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-23145 - A maliciously crafted PRT file, when parsed in opennurbs.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash,read sensitive data, or execute arbitrary code in the co... read CVE-2024-23145
    Published: June 24, 2024; 11:15:10 PM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-37003 - A maliciously crafted DWG and SLDPRT file, when parsed in opennurbs.dll and ODXSW_DLL.dll through Autodesk applications, can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitiv... read CVE-2024-37003
    Published: June 25, 2024; 12:15:15 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-36999 - A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can force an Out-of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in th... read CVE-2024-36999
    Published: June 25, 2024; 12:15:15 AM -0400

    V3.1: 7.8 HIGH

  • CVE-2024-23159 - A maliciously crafted STP file, when parsed in stp_aim_x64_vc15d.dll through Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.
    Published: June 25, 2024; 12:15:14 AM -0400

    V3.1: 7.8 HIGH

Created September 20, 2022 , Updated August 27, 2024