| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory corruption during the handshake between the Primary Virtual Machine and Trusted Virtual Machine. |
| Memory corruption when input parameter validation for number of fences is missing for fence frame IOCTL calls, |
| Memory corruption in MPP performance while accessing DSM watermark using external memory address. |
| Memory corruption when resource manager sends the host kernel a reply message with multiple fragments. |
| Memory Corruption in WLAN HOST while processing WLAN FW request to allocate memory. |
| Memory corruption in Core Services while executing the command for removing a single event listener. |
| Memory corruption in WLAN Host while setting the PMK length in PMK length in internal cache. |
| Memory corruption while processing audio effects. |
| Memory corruption while passing untrusted/corrupted pointers from DSP to EVA. |
| Memory corruption when user provides data for FM HCI command control operations. |
| Memory corruption while processing image encoding, when input buffer length is 0 in IOCTL call. |
| Memory corruption when Alternative Frequency offset value is set to 255. |
| Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware. |
| Memory corruption when preparing a shared memory notification for a memparcel in Resource Manager. |
| Memory corruption when AP includes TID to link mapping IE in the beacons and STA is parsing the beacon TID to link mapping IE. |
| Memory corruption when BTFM client sends new messages over Slimbus to ADSP. |
| Memory corruption in BT controller while parsing debug commands with specific sub-opcodes at HCI interface level. |
| The web application allows user input to pass unfiltered to a command executed on the underlying operating system. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet.
An attacker with low privileged access to the application has the potential to execute commands on the operating system under the context of the webserver. |
| The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver.
The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management. |
| Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704. |