| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory corruption in HLOS while invoking IOCTL calls from user-space. |
| Transient DOS in Bluetooth Host while rfc slot allocation. |
| Memory corruption in video while parsing the Videoinfo, when the size of atom is greater than the videoinfo size. |
| Memory corruption in BT controller while parsing debug commands with specific sub-opcodes at HCI interface level. |
| Memory corruption when AP includes TID to link mapping IE in the beacons and STA is parsing the beacon TID to link mapping IE. |
| Memory corruption while processing a QMI request for allocating memory from a DHMS supported subsystem. |
| Information disclosure while parsing dts header atom in Video. |
| Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size. |
| Memory corruption during management frame processing due to mismatch in T2LM info element. |
| Transient DOS while parsing probe response and assoc response frame. |
| Memory corruption while operating the mailbox in Automotive. |
| Memory corruption when user provides data for FM HCI command control operations. |
| Memory corruption while processing data packets in diag received from Unix clients. |
| Memory corruption during the image encoding process. |
| Transient DOS may occur while processing malformed length field in SSID IEs. |
| Transient DOS while processing received beacon frame. |
| Use of Externally-Controlled Format String vulnerability in the SonicOS SSL VPN interface allows a remote unauthenticated attacker to cause service disruption. |
| Multiple Cisco products are affected by a vulnerability in the rate filtering feature of the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured rate limiting filter.
This vulnerability is due to an incorrect connection count comparison. An attacker could exploit this vulnerability by sending traffic through an affected device at a rate that exceeds a configured rate filter. A successful exploit could allow the attacker to successfully bypass the rate filter. This could allow unintended traffic to enter the network protected by the affected device. |
| Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704. |
| Integer overflow vulnerability in FFmpeg before n6.1, allows attackers to cause a denial of service (DoS) via the avcodec/osq module. |