| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message. |
| Memory Corruption in Linux while processing QcRilRequestImsRegisterMultiIdentityMessage request. |
| Memory corruption during the handshake between the Primary Virtual Machine and Trusted Virtual Machine. |
| Memory corruption while processing IOCTL handler in FastRPC. |
| Memory corruption when Alternative Frequency offset value is set to 255. |
| Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points. |
| Memory corruption in Audio while processing RT proxy port register driver. |
| Memory corruption in WLAN Firmware while doing a memory copy of pmk cache. |
| Memory Corruption in Data Modem while making a MO call or MT VOLTE call. |
| Memory Corruption in Core due to secure memory access by user while loading modem image. |
| Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation. |
| Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. |
| Memory corruption in SPS Application while requesting for public key in sorter TA. |
| Memory Corruption in camera while installing a fd for a particular DMA buffer. |
| Memory corruption when BTFM client sends new messages over Slimbus to ADSP. |
| Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware. |
| The web application allows user input to pass unfiltered to a command executed on the underlying operating system. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet.
An attacker with low privileged access to the application has the potential to execute commands on the operating system under the context of the webserver. |
| The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver.
The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management. |
| Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704. |
| Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps.c |