A vulnerability, which was classified as critical, was found in Vivo Game Extension Engine up to 1.2.7.0. This affects an unknown part. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2024-46939. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Google Android up to 8.1. Affected by this issue is the function installPackageLI of the file PackageManagerService.java. The manipulation leads to permission issues.
This vulnerability is handled as CVE-2018-9374. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Google Android up to 8.1. Affected by this vulnerability is the function BnAudioPolicyService::onTransact of the file IAudioPolicyService.cpp. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2018-9377. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in Google Android 7/7.1.1/7.1.2/8/8.1. Affected is the function ih264d_assign_pic_num of the file ih264d_utils.c. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2018-9350. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 7/7.1.1/7.1.2/8/8.1. It has been rated as critical. This issue affects the function ih264e_fmt_conv_420p_to_420sp of the file ih264e_fmt_conv.c. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2018-9351. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 7/7.1.1/7.1.2/8/8.1. It has been declared as critical. This vulnerability affects the function VideoFrameScheduler::PLL::fit of the file VideoFrameScheduler.cpp. The manipulation leads to denial of service.
This vulnerability was named CVE-2018-9354. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 7/7.1.1/7.1.2/8/8.1. It has been classified as critical. This affects the function ihevcd_parse_slice_data of the file ihevcd_parse_slice.c. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2018-9353. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Fuji Electric V-Server and V-Server Lite up to 4.0.19.0 and classified as critical. Affected by this issue is some unknown functionality of the component File Handler. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2024-38658. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Fuji Electric TELLUS and TELLUS Lite up to 4.0.19.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component File Handler. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2024-38389. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Fuji Electric V-SFT, TELLUS and TELLUS Lite. Affected is an unknown function of the component File Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-38309. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Google Android 7/7.1.1/7.1.2/8/8.1. This issue affects the function ihevcd_allocate_dynamic_bufs of the file ihevcd_api.c. The manipulation leads to resource consumption.
The identification of this vulnerability is CVE-2018-9352. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Fuji Electric Monitouch V-SFT 6.2.3.0. This vulnerability affects unknown code of the component X1 File Parser. The manipulation leads to heap-based buffer overflow.
This vulnerability was named CVE-2024-11933. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in Fuji Electric Tellus Lite 4.0.20.0. This affects an unknown part of the component V8 File Parser. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2024-11803. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Fuji Electric Tellus Lite 4.0.20.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component V8 File Parser. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-11802. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Fuji Electric Tellus Lite 4.0.20.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component V8 File Parser. The manipulation leads to out-of-bounds write.
This vulnerability is known as CVE-2024-11801. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Fuji Electric Tellus Lite 4.0.20.0. It has been classified as critical. Affected is an unknown function of the component V8 File Parser. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-11800. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Fuji Electric Tellus Lite 4.0.20.0 and classified as critical. This issue affects some unknown processing of the component V8 File Parser. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-11799. The attack may be initiated remotely. There is no exploit available.