
CVE-2025-24119
https://notcve.org/view.php?id=CVE-2025-24119
29 Jul 2025 — An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges. • https://support.apple.com/en-us/122068 •

CVE-2025-33092 – IBM Db2 for Linux code execution
https://notcve.org/view.php?id=CVE-2025-33092
29 Jul 2025 — A local user could overflow the buffer and execute arbitrary code on the system. • https://www.ibm.com/support/pages/node/7240940 • CWE-121: Stack-based Buffer Overflow •

CVE-2025-53078
https://notcve.org/view.php?id=CVE-2025-53078
29 Jul 2025 — Deserialization of Untrusted Data in Samsung DMS(Data Management Server) allows attackers to execute arbitrary code via write file to system • https://security.samsungda.com/securityUpdates.html • CWE-502: Deserialization of Untrusted Data •

CVE-2025-5038 – X_T File Parsing Memory Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2025-5038
29 Jul 2025 — A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2025-5043 – 3DM File Parsing Heap-Based Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2025-5043
29 Jul 2025 — A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 • CWE-122: Heap-based Buffer Overflow •

CVE-2025-6631 – PRT File Parsing Out-of-Bounds Write Vulnerability
https://notcve.org/view.php?id=CVE-2025-6631
29 Jul 2025 — A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 • CWE-787: Out-of-bounds Write •

CVE-2025-6635 – PRT File Parsing Out-of-Bounds Read Vulnerability
https://notcve.org/view.php?id=CVE-2025-6635
29 Jul 2025 — A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 • CWE-125: Out-of-bounds Read •

CVE-2025-6636 – PRT File Parsing Use-After-Free Vulnerability
https://notcve.org/view.php?id=CVE-2025-6636
29 Jul 2025 — A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 • CWE-416: Use After Free •

CVE-2025-6637 – PRT File Parsing Out-of-Bounds Write Vulnerability
https://notcve.org/view.php?id=CVE-2025-6637
29 Jul 2025 — A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015 • CWE-787: Out-of-bounds Write •

CVE-2025-31280 – Apple macOS USD readAccessorInts Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2025-31280
29 Jul 2025 — An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. • https://support.apple.com/en-us/124149 •