| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| After Affects versions 23.1 (and earlier), 22.6.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| Information Disclosure in WLAN HOST while sending DPP action frame to peer with an invalid source address. |
| Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard. |
| Transient DOS while parsing WLAN beacon or probe-response frame. |
| Transient DOS in WLAN Firmware while parsing FT Information Elements. |
| Transient DOS in WLAN Firmware while processing frames with missing header fields. |
| Transient DOS in WLAN Firmware while processing the received beacon or probe response frame. |
| Memory Corruption in GPS HLOS Driver when injectFdclData receives data with invalid data length. |
| Memory corruption in WLAN while running doDriverCmd for an unspecific command. |
| Memory corruption in Audio while processing sva_model_serializer using memory size passed by HIDL client. |
| Memory Corruption due to improper validation of array index in Linux while updating adn record. |
| Memory Corruption in Data Network Stack & Connectivity when sim gets detected on telephony. |
| Memory corruption in Automotive GPU while querying a gsl memory node. |
| Information disclosure in Network Services due to buffer over-read while the device receives DNS response. |
| FrameMaker 2020 Update 4 (and earlier), 2022 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| Photoshop version 23.5.3 (and earlier), 24.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| NCC Group has found a flaw during the annual internal penetration test ordered by Axis Communications. The protection for device tampering (commonly known as Secure Boot) contains a flaw which provides an opportunity for a sophisticated attack to bypass this protection. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. |
| Ariel Harush and Roy Hodir from OTORIO have found a flaw in the AXIS A1001 when
communicating over OSDP. A heap-based buffer overflow was found in the pacsiod process which
is handling the OSDP communication allowing to write outside of the allocated buffer. By
appending invalid data to an OSDP message it was possible to write data beyond the heap
allocated buffer. The data written outside the buffer could be used to execute arbitrary code.
lease refer to the Axis security advisory for more information, mitigation and affected products and software versions. |
| Knud from Fraktal.fi has found a flaw in some Axis Network Door Controllers and Axis Network
Intercoms when communicating over OSDP, highlighting that the OSDP message parser crashes
the pacsiod process, causing a temporary unavailability of the door-controlling functionalities
meaning that doors cannot be opened or closed. No sensitive or customer data can be extracted
as the Axis device is not further compromised. Please refer to the Axis security advisory for more information, mitigation and affected products and software versions. |