CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Memory Corruption in Linux while processing QcRilRequestImsRegisterMultiIdentityMessage request. |
Memory Corruption in WLAN HOST while parsing QMI response message from firmware. |
Memory corruption while processing image encoding, when input buffer length is 0 in IOCTL call. |
Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message. |
Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware. |
Memory corruption when input parameter validation for number of fences is missing for fence frame IOCTL calls, |
Memory corruption when resource manager sends the host kernel a reply message with multiple fragments. |
Memory corruption when Alternative Frequency offset value is set to 255. |
Memory Corruption in Multi-mode Call Processor while processing bit mask API. |
Memory corruption in SPS Application while requesting for public key in sorter TA. |
Memory corruption while passing untrusted/corrupted pointers from DSP to EVA. |
Memory corruption while processing the event ring, the context read pointer is untrusted to HLOS and when it is passed with arbitrary values, may point to address in the middle of ring element. |
Memory Corruption in camera while installing a fd for a particular DMA buffer. |
Memory corruption while reading response from FW, when buffer size is changed by FW while driver is using this size to write null character at the end of buffer. |
Memory corruption in Core Services while executing the command for removing a single event listener. |
Memory Corruption in Core due to secure memory access by user while loading modem image. |
Memory corruption in WLAN Host while setting the PMK length in PMK length in internal cache. |
Memory corruption in BT controller while parsing debug commands with specific sub-opcodes at HCI interface level. |
Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704. |
Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps.c |