Search Results (13477 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-28538 1 Qualcomm 260 Aqt1000, Aqt1000 Firmware, Csra6620 and 257 more 2025-02-27 8.4 High
Memory corruption in WIN Product while invoking WinAcpi update driver in the UEFI region.
CVE-2023-28559 1 Qualcomm 426 Aqt1000, Aqt1000 Firmware, Ar8031 and 423 more 2025-02-27 7.8 High
Memory corruption in WLAN FW while processing command parameters from untrusted WMI payload.
CVE-2023-28560 1 Qualcomm 534 8098, 8098 Firmware, 8998 and 531 more 2025-02-27 7.8 High
Memory corruption in WLAN HAL while processing devIndex from untrusted WMI payload.
CVE-2023-28562 1 Qualcomm 136 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 133 more 2025-02-27 9.8 Critical
Memory corruption while handling payloads from remote ESL.
CVE-2023-28564 1 Qualcomm 498 Aqt1000, Aqt1000 Firmware, Ar8031 and 495 more 2025-02-27 7.8 High
Memory corruption in WLAN HAL while passing command parameters through WMI interfaces.
CVE-2023-28565 1 Qualcomm 588 9205 Lte, 9205 Lte Firmware, Apq8017 and 585 more 2025-02-27 7.8 High
Memory corruption in WLAN HAL while handling command streams through WMI interfaces.
CVE-2023-28567 1 Qualcomm 582 315 5g Iot, 315 5g Iot Firmware, Aqt1000 and 579 more 2025-02-27 7.8 High
Memory corruption in WLAN HAL while handling command through WMI interfaces.
CVE-2023-28581 1 Qualcomm 52 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 49 more 2025-02-27 9.8 Critical
Memory corruption in WLAN Firmware while parsing receieved GTK Keys in GTK KDE.
CVE-2022-30638 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30641 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30646 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30637 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30643 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30645 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30640 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30639 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-30642 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-02-27 7.8 High
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-28833 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-02-27 7.8 High
Adobe InDesign versions 17.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-28831 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-02-27 7.8 High
Adobe InDesign versions 17.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-28836 3 Adobe, Apple, Microsoft 3 Incopy, Macos, Windows 2025-02-27 7.8 High
Adobe InCopy versions 17.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.