| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| A out-of-bounds write in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.10, FortiOS version 6.4.0 through 6.4.12, FortiOS all versions 6.2, FortiOS all versions 6.0, FortiProxy version 7.2.0 through 7.2.2, FortiProxy version 7.0.0 through 7.0.8, FortiProxy all versions 2.0, FortiProxy all versions 1.2, FortiProxy all versions 1.1, FortiProxy all versions 1.0 allows attacker to escalation of privilege via specifically crafted commands. |
| An os command injection vulnerability exists in the liburvpn.so create_private_key functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to command execution. An attacker can send a malicious packet to trigger this vulnerability. |
|
A stack-based buffer overflow in the Command Centre Server allows an attacker to cause a denial of service attack via assigning cardholders to an Access Group.
This issue affects Command Centre: vEL8.80 prior to vEL8.80.1192 (MR2)
|
| Out-of-bounds write in firmware for some Intel(R) FPGA products before version 2.8.1 may allow a privileged user to potentially enable information disclosure via local access. |
| An OS command injection vulnerability exists in the vtysh_ubus _get_fw_logs functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability. |
| After Affects versions 23.1 (and earlier), 22.6.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| After Affects versions 23.1 (and earlier), 22.6.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
| Memory Corruption while accessing metadata in Display. |
| Memory corruption in Audio during playback session with audio effects enabled. |
| Memory Corruption in GPS HLOS Driver when injectFdclData receives data with invalid data length. |
| Memory corruption in WLAN while running doDriverCmd for an unspecific command. |
| Memory corruption in RIL while trying to send apdu packet. |
| Memory corruption due to untrusted pointer dereference in automotive during system call. |
| Memory corruption in Audio while processing sva_model_serializer using memory size passed by HIDL client. |
| Memory corruption in Linux while calling system configuration APIs. |
| Memory Corruption in Data Network Stack & Connectivity when sim gets detected on telephony. |
| Memory Corruption in Radio Interface Layer while sending an SMS or writing an SMS to SIM. |
| Memory corruption in Automotive GPU while querying a gsl memory node. |
| Memory corruption in WLAN HAL while processing WMI-UTF command or FTM TLV1 command. |
| FrameMaker 2020 Update 4 (and earlier), 2022 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |