Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-28840

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-11 Aug, 2023 | 00:00
Updated At-09 Oct, 2024 | 18:44
Rejected At-
Credits

Buffer Overflow vulnerability in jpgfile.c in Matthias-Wandel jhead version 3.04, allows local attackers to execute arbitrary code and cause a denial of service (DoS).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:11 Aug, 2023 | 00:00
Updated At:09 Oct, 2024 | 18:44
Rejected At:
▼CVE Numbering Authority (CNA)

Buffer Overflow vulnerability in jpgfile.c in Matthias-Wandel jhead version 3.04, allows local attackers to execute arbitrary code and cause a denial of service (DoS).

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820
N/A
https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da
N/A
https://github.com/Matthias-Wandel/jhead/issues/8
N/A
https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2
N/A
Hyperlink: https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820
Resource: N/A
Hyperlink: https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da
Resource: N/A
Hyperlink: https://github.com/Matthias-Wandel/jhead/issues/8
Resource: N/A
Hyperlink: https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820
x_transferred
https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da
x_transferred
https://github.com/Matthias-Wandel/jhead/issues/8
x_transferred
https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2
x_transferred
Hyperlink: https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820
Resource:
x_transferred
Hyperlink: https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da
Resource:
x_transferred
Hyperlink: https://github.com/Matthias-Wandel/jhead/issues/8
Resource:
x_transferred
Hyperlink: https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:11 Aug, 2023 | 14:15
Updated At:21 Aug, 2023 | 17:17

Buffer Overflow vulnerability in jpgfile.c in Matthias-Wandel jhead version 3.04, allows local attackers to execute arbitrary code and cause a denial of service (DoS).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

matthiaswandel
matthiaswandel
>>jhead>>Versions before 3.04(exclusive)
cpe:2.3:a:matthiaswandel:jhead:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Primarynvd@nist.gov
CWE ID: CWE-120
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820cve@mitre.org
Exploit
Issue Tracking
https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2cve@mitre.org
Exploit
https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778dacve@mitre.org
Patch
https://github.com/Matthias-Wandel/jhead/issues/8cve@mitre.org
Exploit
Issue Tracking
Patch
Hyperlink: https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820
Source: cve@mitre.org
Resource:
Exploit
Issue Tracking
Hyperlink: https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-xh27-xwgj-gqw2
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/Matthias-Wandel/jhead/issues/8
Source: cve@mitre.org
Resource:
Exploit
Issue Tracking
Patch

Change History

0
Information is not available yet

Similar CVEs

367Records found

CVE-2020-8729
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.93%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:56
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28544
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 6.81%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking the Size of Input in WLAN Firmware

Memory corruption in WLAN while sending transmit command from HLOS to UTF handlers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_850_mobile_compute_platform_firmwaresa6150p_firmwaresm6250p_firmwareqcs610ipq4028_firmwareqcn5550ar9380ipq8173_firmwarewcd9360_firmwareqcn5124qca4024_firmwarewcn3950_firmwareimmersive_home_318_platform_firmwaresc8180x\+sdx55ipq8078aipq5028_firmwaresm4450_firmwaresa8150p_firmwareqca6595au_firmwareqcs2290sa6155snapdragon_480_5g_mobile_platformqca6335qcn5064sd_455_firmwarecsra6620_firmwaresd_675_firmwarecsra6640_firmwaresnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca9987_firmwareqca6554a_firmwarewcd9371_firmwarewcn3950qcn6024_firmwaresm4125ipq8076aimmersive_home_316_platform_firmwaresnapdragon_460_mobile_platformsnapdragon_660_mobile_platform_firmwaresd460_firmwareqca6428qualcomm_robotics_rb3_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwareqcn5164_firmwaresnapdragon_636_mobile_platformipq8071wcd9375_firmwareqca8081_firmwaresa6155_firmwareqca6420wcd9360qca6438_firmwareqca9986snapdragon_auto_5g_modem-rf_firmwareipq8070_firmwareipq8065ipq8078a_firmwaresmart_audio_400_platform_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwaresnapdragon_855\+860_mobile_platform_firmwareipq8068snapdragon_765g_5g_mobile_platformqca6430snapdragon_630_mobile_platformsnapdragon_678_mobile_platform_firmwarewcd9340snapdragon_8cx_compute_platformsnapdragon_720g_mobile_platformqcn6132sw5100sa6155psnapdragon_765_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwarewcd9371qcn5154_firmwarewcn3910_firmwaresd_8cxsnapdragon_855_mobile_platform_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd660sd855_firmwarewcn3988qca6438sd660_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwarefastconnect_6800_firmwareqcn5022_firmwareqcn7606_firmwaresnapdragon_7c_gen_2_compute_platform_firmwareqca9898immersive_home_216_platform_firmwareipq4028snapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqca6428_firmwareqca9985_firmwareipq4018_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100psnapdragon_8cx_gen_2_5g_compute_platformipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platformipq8078qca6564auipq8173snapdragon_670_mobile_platform_firmwareqcn5164sd670_firmwareqca6574csr8811_firmwarewcd9380fastconnect_6700qcs410qcn5024ipq4019_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815wcn3910qca6320snapdragon_630_mobile_platform_firmwareqca9986_firmwaresnapdragon_4_gen_1_mobile_platformsm4450qca9984ipq6028ipq8064sd835snapdragon_670_mobile_platformqcn9024wcn3980_firmwaresd730qcn5550_firmwareipq8064_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_8cx_compute_platform_firmwareqcn5064_firmwareqcs4490_firmwareipq8078_firmwarefastconnect_6900fastconnect_6900_firmwareipq8070snapdragon_660_mobile_platformqca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwarewsa8832qcn7605_firmwaresw5100p_firmwareqcs610_firmwareipq6018snapdragon_730_mobile_platformqca9886_firmwareimmersive_home_214_platformqcs4490qca6595_firmwaresa8145psnapdragon_750g_5g_mobile_platformqca6391_firmwaresnapdragon_710_mobile_platform_firmwareimmersive_home_214_platform_firmwareqca4024wcd9370_firmwaresdx55sa8155pcsra6640sd675snapdragon_695_5g_mobile_platformsnapdragon_720g_mobile_platform_firmwaresnapdragon_855_mobile_platformqcm2290snapdragon_480\+_5g_mobile_platformqcn7606qcn5024_firmwarewsa8830snapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwaresnapdragon_850_mobile_compute_platformqcs2290_firmwarecsra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290qca6420_firmwareipq8069_firmwareipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6584au_firmwarewcn3990_firmwareqcn9000_firmwareqca9984_firmwarequalcomm_robotics_rb3_platformsd_8cx_firmwarewcd9385_firmwareqcn7605wcd9326_firmwarefastconnect_6200immersive_home_216_platformimmersive_home_316_platformsnapdragon_7c_gen_2_compute_platformipq8074aimmersive_home_318_platformsd662qcn5124_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6320_firmwaresnapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwaresm7250p_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareipq5010qca6564au_firmwareqca6584ausa6155p_firmwareqca6310ipq8174qca9990qcn5052vision_intelligence_300_platform_firmwarewcn3988_firmwareqcn9074sm6250fastconnect_6700_firmwaresa8195psxr1120wsa8810_firmwarevision_intelligence_400_platformwcd9326wcd9335sg4150pqca8081qcm4490qcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385snapdragon_665_mobile_platform_firmwareqca9898_firmwarewcd9375csr8811aqt1000ipq4019sc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwareqcn9100_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformvision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_636_mobile_platform_firmwaresxr1120_firmwareqca6564asg4150p_firmwareqcm6125_firmwareqcm4325qcm2290_firmwaresnapdragon_845_mobile_platformwcn3990qcn9000sd_675qca6554afastconnect_6800qca6595ar9380_firmwaresnapdragon_835_mobile_pc_platformqcn9012snapdragon_8c_compute_platformqcn6122_firmwareipq8065_firmwarewsa8835snapdragon_auto_5g_modem-rfsm6250psnapdragon_678_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwareqcn5154qca8075_firmwareipq4018smart_audio_400_platformqca6574aqca9889qcn6132_firmwareqca9888qca6310_firmwareipq8074qca9994_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886sd855sm4125_firmwareipq8076qca6574a_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformfastconnect_6200_firmwareipq8069qcn5152vision_intelligence_300_platformsnapdragon_x55_5g_modem-rf_system_firmwaresd460qca6391snapdragon_710_mobile_platformsnapdragon_7c_compute_platform_firmwareaqt1000_firmwareqcn9100snapdragon_855\+860_mobile_platformqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290wsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwareipq6028_firmwareipq8072a_firmwaresd_455ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122wcd9341_firmwareqcm6125wsa8810snapdragon_765g_5g_mobile_platform_firmwaresnapdragon_712_mobile_platformsnapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformqcn5022snapdragon_8c_compute_platform_firmwaresd835_firmwaresnapdragon_675_mobile_platformipq6010_firmwareqca6696snapdragon_732g_mobile_platformsnapdragon_x50_5g_modem-rf_systemsa6150pqca8075qcn9022_firmwaresnapdragon_768g_5g_mobile_platformqcn6024qcn9022qca9990_firmwareipq8070asnapdragon_765_5g_mobile_platformqcn9072_firmwaresm7250pipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwaresw5100_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwareipq4029snapdragon_7c_compute_platformsnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28570
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.31%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input in Audio

Memory corruption while processing audio effects.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwaresw5100pqca6595qcs610_firmwarewcd9335sxr2130_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696wcd9340_firmwarewcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320qcc710_firmwareqca6426qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsnapdragon_835_mobile_pc_platform_firmwarewcn3660b_firmwareqca6554afastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwareqca6584auqca6320_firmwareqcn6274_firmwareqcc710sw5100_firmwareqca6310_firmwarefastconnect_6800qfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310wcd9380sa6145p_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150pmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810snapdragon_865\+_5g_mobile_platformsw5100video_collaboration_vc3_platformqca6595auaqt1000snapdragon_865_5g_mobile_platform_firmwaresa6155p_firmwareqam8295p_firmwaresd855sd835wcn3990_firmwaresnapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwaresnapdragon_wear_4100\+_platform_firmwarewcn3610_firmwaresnapdragon_855\+\/860_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaresdx55_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6554a_firmwarewcn3660bqca6574asxr2130wcn3620_firmwaresa8195pwcd9340snapdragon_820_automotive_platform_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwarewcn3988sdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qca6574qfw7124snapdragon_x75_5g_modem-rf_systemqca6595au_firmwareqca6391_firmwarewcd9335_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformsw5100p_firmwareqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwareqca8081qca6564awsa8815mdm9628sa8155pwcn3980_firmwarewsa8830mdm9628_firmwaresa6145pqcn9074_firmwarear8035qca6574a_firmwaresdx55msm8996auwcn3620qca6391qcn6224wcn3950_firmwaresa8295pfastconnect_6200fastconnect_7800sa8145p_firmwarewcn3680bsd865_5g_firmwaresa8150p_firmwaresnapdragon_855\+\/860_mobile_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformwsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-28963
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.61%
||
7 Day CHG~0.00%
Published-22 Oct, 2021 | 19:20
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Passcovery Co. Ltd ZIP Password Recovery v3.70.69.0 was discovered to contain a buffer overflow via the decompress function.

Action-Not Available
Vendor-krylackn/aMicrosoft Corporation
Product-windowszip_password_recoveryn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-33973
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.19% / 40.68%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Qihoo 360 Safe guard v12.1.0.1004, v12.1.0.1005, v13.1.0.1001 allows attacker to escalate priveleges.

Action-Not Available
Vendor-360totalsecurityn/a
Product-360_total_securityn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-28341
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.77%
||
7 Day CHG~0.00%
Published-08 Nov, 2020 | 04:03
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with Q(10.0) (Exynos990 chipsets) software. The S3K250AF Secure Element CC EAL 5+ chip allows attackers to execute arbitrary code and obtain sensitive information via a buffer overflow. The Samsung ID is SVE-2020-18632 (November 2020).

Action-Not Available
Vendor-n/aGoogle LLCSamsung
Product-androidexynos_990n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-24222
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.62%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 00:00
Updated-09 Oct, 2024 | 20:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in jfif_decode() function in rockcarry ffjpeg through version 1.0.0, allows local attackers to execute arbitrary code due to an issue with ALIGN.

Action-Not Available
Vendor-rockcarryn/a
Product-ffjpegn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-24995
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.22% / 44.90%
||
7 Day CHG~0.00%
Published-30 Mar, 2021 | 21:19
Updated-04 Aug, 2024 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow vulnerability in sniff_channel_order function in aacdec_template.c in ffmpeg 3.1.2, allows attackers to execute arbitrary code (local).

Action-Not Available
Vendor-n/aFFmpeg
Product-ffmpegn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-18750
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.35%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 18:06
Updated-04 Aug, 2024 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file.

Action-Not Available
Vendor-flowpapern/a
Product-pdf2jsonn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-22661
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.12% / 29.85%
||
7 Day CHG+0.02%
Published-10 May, 2023 | 13:17
Updated-27 Jan, 2025 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-server_system_d50tnp1mhcpacserver_system_d50tnp2mhsvac_firmwareserver_system_m50cyp2ur312_firmwareserver_system_d50tnp2mhsvacserver_system_d50tnp1mhcrac_firmwareserver_system_d50tnp2mhstacserver_system_d50tnp2mfalacserver_system_m50cyp2ur208server_system_d50tnp1mhcrlc_firmwareserver_system_m50cyp1ur212_firmwareserver_system_m50cyp2ur208_firmwareserver_system_m50cyp2ur312server_system_m50cyp1ur204_firmwareserver_system_d50tnp1mhcracserver_system_d50tnp1mhcrlcserver_system_d50tnp2mhstac_firmwareserver_system_m50cyp1ur204server_system_d50tnp1mhcpac_firmwareserver_system_d50tnp2mfalac_firmwareserver_system_m50cyp1ur212Intel(R) Server Board BMC firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-22386
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.80%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in WLAN HOST

Memory Corruption in WLAN HOST while processing WLAN FW request to allocate memory.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pimmersive_home_214qcs410_firmwaresd865_5gsa6150p_firmwareipq9574qcn9000_firmwareqcn6102_firmwareqca6595qcn9022qcs610_firmwaresnapdragon_8\+_gen_1ipq6028_firmwarewcd9335qca8081_firmwarewcd9370qcn9001qca8072qca6696wcd9341_firmwareipq5028_firmwareqcn6024qcn9003_firmwareipq8076qca6426wcn6740_firmwarefastconnect_6700ipq6018_firmwareqcn6023snapdragon_695_5gsa4150pqcn5124_firmwaresnapdragon_888_5gwsa8832_firmwareqca8337qca6426_firmwaresnapdragon_870_5ipq6000snapdragon_4_gen_2_firmwareqca6574au_firmwareipq8078aipq8078a_firmwareqam8295psnapdragon_x12_lte_firmwarewcd9341qca6574auwsa8810_firmwarecsra6640snapdragon_690_5gsnapdragon_778g\+_5g_firmwaresnapdragon_865\+_5gqcn9100_firmwaresnapdragon_765_5gqcn5122wcn3660b_firmwareqca6554afastconnect_6800_firmwaresnapdragon_865\+_5g_firmwareqcn6024_firmwaresnapdragon_x65_5gvideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_888\+_5g_firmwareqcn9000ssg2115pqcn6132_firmwaresnapdragon_xr2_5g_firmwareqsm8250_firmwareqcn5054snapdragon_765g_5g_firmwaresnapdragon_660_firmwaresnapdragon_4_gen_2fastconnect_6900video_collaboration_vc1_platformqcn5052wcd9385_firmwareqca6421ipq9574_firmwareqam8255p_firmwaresnapdragon_778g_5gipq8074a_firmwareipq8076aqcn5164qcs4490snapdragon_662_firmwaresa6155pqcn6100_firmwareqca6421_firmwareqca6564au_firmwarecsr8811_firmwarewsa8810qca8075qam8650pvideo_collaboration_vc5_platform_firmwareqca8085qsm8250qcn6100qca6595ausm7315_firmwaresnapdragon_865_5g_firmwarewcd9326_firmwaresa6155p_firmwareqca6436_firmwareqcn9012ipq8070a_firmwareqcn9070qcs4490_firmwarewcn3910_firmwareqca8084sm4125_firmwaresnapdragon_680_4gwcn3910sdx65mwcd9370_firmwaresnapdragon_480\+_5g_firmwaresnapdragon_765_5g_firmwarewcn3660bqca6574aqca6174asnapdragon_695_5g_firmwaresa8195psnapdragon_750g_5g_firmwareqcs8250_firmwareqcm2290qcm6490215qcn6122_firmwareqcn5154_firmwaresnapdragon_x55_5g_firmwarewcn3988qcn5122_firmwareqcn9274qcn9024ipq8076a_firmwareqca6574sxr2230p_firmwareqcn9011snapdragon_439_firmwaresmart_audio_400qcn9024_firmwareqca8082sa6150pwcd9326qcs410qcm2290_firmwaresa8155p_firmwaresa8155pqca8072_firmwarewsa8830sa6145psnapdragon_x65_5g_firmwareqcn9074_firmwareipq8174immersive_home_318_firmwareqcn6122sa8255p_firmwaresnapdragon_888\+_5gipq8174_firmwarear8035ipq8072aqrb5165m_firmwareimmersive_home_216_firmwareqcm4325immersive_home_316ipq8071aqcn6112snapdragon_782gwcn3950_firmwareqca6698aqssg2125p_firmwareqrb5165nfastconnect_6200wcn3680bsm7325p_firmwaresa8145p_firmwaresa8150p_firmwarefastconnect_6700_firmwaresnapdragon_768g_5gvideo_collaboration_vc3_platform_firmwarewcn3990qcn6023_firmwareqcn5164_firmwaresnapdragon_778g_5g_firmwaresnapdragon_780g_5gqcn9002ipq8078qcs6490qcs8250fastconnect_6200_firmwaresnapdragon_778g\+_5gqcn9072wsa8830_firmwareqca6431qca8386_firmwaresd660_firmwaresnapdragon_7c\+_gen_3wsa8832qca8082_firmwareimmersive_home_216sxr2130_firmwarear8035_firmwareqcn5022_firmwareqrb5165msnapdragon_680_4g_firmwaresa4150p_firmwareqca4024_firmwaresd888_firmwareipq9008snapdragon_439qca6564ausnapdragon_460ipq9008_firmwareqcn9074wsa8815_firmwaresnapdragon_865_5gsa8195p_firmwareqca8337_firmwareqcm4290qcn5054_firmwareqca9888snapdragon_480_5g_firmwaresnapdragon_4_gen_1_firmwaresnapdragon_x12_ltesnapdragon_685_4gsnapdragon_xr2\+_gen_1qca9377_firmwareipq8173qcm6490_firmwareipq8072a_firmwaresnapdragon_w5\+_gen_1sm7250p_firmwaresm4125ipq6010_firmwareqcm4490_firmwarewcn3950qcn6112_firmwareflight_rb5_5gsnapdragon_690_5g_firmwareqca6797aq_firmwareipq5028qca8085_firmwareqcn9070_firmwaresa8295p_firmwaresmart_audio_400_firmwaresnapdragon_460_firmwaresa4155p_firmwareqcn9022_firmwareipq5010_firmwareqcn6132snapdragon_auto_5g_firmwaresm7250psnapdragon_768g_5g_firmwareipq6018qcn6102qca6584ausd888qcn9011_firmwaresw5100_firmwarewcn6740fastconnect_6800qca4024snapdragon_662qca6595_firmwarefastconnect_7800_firmwareimmersive_home_214_firmwareqcn9001_firmwareipq8070afastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psxr2230psnapdragon_xr2_5gsa8150pqcn9003215_firmwareqca8075_firmwaresnapdragon_888_5g_firmwaresnapdragon_765g_5gqcn5052_firmwaresxr1230pipq6010sdx65m_firmwarevideo_collaboration_vc3_platformsw5100snapdragon_870_5_firmwareqam8295p_firmwareqca6431_firmwaresnapdragon_8_gen_1_firmwarewcn3990_firmwaresm7315snapdragon_750g_5gqca6698aq_firmwareqcs2290wcd9385qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615qca8084_firmwaresnapdragon_8_gen_1sa8255pqcs4290sxr1230p_firmwareqcn5024snapdragon_782g_firmwaresdx55_firmwaresnapdragon_x55_5gipq8071a_firmwarewcn3615_firmwareflight_rb5_5g_firmwaressg2125pqca6554a_firmwaresxr2130ipq6028qcm4490snapdragon_4_gen_1csra6640_firmwareqcn9100robotics_rb5snapdragon_480\+_5gqca6174a_firmwaresnapdragon_685_4g_firmwaresm7325pqam8650p_firmwarevideo_collaboration_vc5_platformqcs6490_firmwaresnapdragon_480_5gipq8076_firmwarewcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6436qca6584au_firmwareqcn5152_firmwarewsa8835qca6595au_firmwareqca6391_firmwaresw5100p_firmwareqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarecsra6620sd660qca8081wsa8815sg4150psd_8_gen1_5gqam8775pqca9377snapdragon_ar2_gen_1_firmwaresnapdragon_auto_5gqcn5124qca6797aqqcn5152qcm4325_firmwaresnapdragon_660qca6574a_firmwaresdx55qcn9072_firmwareqcm4290_firmwareqca9888_firmwareipq8074aqca9889snapdragon_8\+_gen_1_firmwareqcn5024_firmwaresd_8_gen1_5g_firmwareqcn9002_firmwarewcd9375_firmwareqca8386qca6391immersive_home_318ipq5010qcn9274_firmwaresnapdragon_7c\+_gen_3_firmwaresnapdragon_w5\+_gen_1_firmwareipq8173_firmwareqcn9012_firmwaresg4150p_firmwaresnapdragon_780g_5g_firmwarecsra6620_firmwaresa8295pipq6000_firmwarefastconnect_7800qam8775p_firmwaresd865_5g_firmwarewcd9375ipq8078_firmwareqca9889_firmwaresnapdragon_ar2_gen_1wcn3988_firmwareimmersive_home_316_firmwareqcn5154sa8145pwsa8835_firmwaressg2115p_firmwarecsr8811qcn5022wcn3980wcn3680b_firmwareqcs610Snapdragonqcn5024_firmwareqam8255p_firmwareqca9377_firmwaresnapdragon_662_mobile_platform_firmwaresa6150p_firmwaresa8145p_firmwaresxr2230p_firmwareqcs2290_firmwareipq8173_firmwareqca6431_firmwareflight_rb5_5g_platform_firmwareqca4024_firmwareimmersive_home_318_platform_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwareipq5028_firmwaresa8150p_firmwareqca6595au_firmwarecsra6620_firmwarecsra6640_firmwareqcn5152_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca6554a_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwareqcn6024_firmwareqca8386_firmwarewcd9326_firmwareimmersive_home_316_platform_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwareqca8084_firmwaresnapdragon_660_mobile_platform_firmwareqcn5124_firmwareqam8295p_firmwareqcn6100_firmwareqcn6102_firmwareqcn9011_firmwareqca8082_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwareqcn5122_firmwareqcn5164_firmwaresdx55_firmwarewcd9375_firmwareqca8081_firmwareqcn6023_firmwarewcn3680b_firmwaresm7250p_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareipq8078a_firmwaresmart_audio_400_platform_firmwareqrb5165m_firmwaresa4155p_firmwareqcn6112_firmwarewcn3988_firmwaresa6145p_firmwarefastconnect_6700_firmwarewsa8810_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwareqca6698aq_firmwaresdx65m_firmwareqca6174a_firmwareipq8071a_firmwareqcs4290_firmwareqca8085_firmwareqam8775p_firmwareqca9888_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_x12_lte_modem_firmwareipq9008_firmwareqcn5154_firmwarewcn3910_firmwareqcn9100_firmwarewsa8830_firmwaresd865_5g_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwaresd660_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn5022_firmwaresa8295p_firmwareimmersive_home_216_platform_firmwaresg4150p_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc1_platform_firmwarerobotics_rb5_platform_firmwareqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwareipq8076a_firmwareqcn9001_firmwareqcn6122_firmwaresxr1230p_firmwarecsr8811_firmwareqcn5054_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca8075_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqcn6132_firmwareqcn9003_firmwareqca8072_firmwareqcn9012_firmwareqcn5052_firmwareqcn9274_firmwarewcd9335_firmwareipq8070a_firmwareipq6018_firmwareipq8076_firmwareqcm4325_firmwareqca6574_firmwaresm4125_firmwaresm7325p_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwarefastconnect_6200_firmwareipq9574_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6421_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwareqcs4490_firmwareqcm6490_firmwareipq8078_firmwarewsa8832_firmwareqcn9070_firmwarefastconnect_6900_firmwareipq6028_firmwareipq8072a_firmwareqca6797aq_firmwareqca9889_firmwaresa8155p_firmwareqcn9024_firmwareipq8174_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarequalcomm_215_mobile_platform_firmwareqam8650p_firmwareipq6010_firmwareqca6595_firmwareqca6391_firmwareimmersive_home_214_platform_firmwaresa4150p_firmwarewcd9370_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwareqcn9022_firmwareqcn9002_firmwareqcn9072_firmwareipq6000_firmwaressg2115p_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwarear8035_firmwareqsm8250_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21649
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.44%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:14
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN

Memory corruption in WLAN while running doDriverCmd for an unspecific command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610qca8337qca6431_firmwaremdm9628_firmwaremdm9650wcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwarewcd9370qca6426qca6584au_firmwaresm4375wcn3998qca6554a_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950mdm9628wcn3660bqca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareqca6564au_firmwareqca6584ausa6155p_firmwaresdxr2_5gwcn3988_firmwareqca6430qcn9074sa6145p_firmwareqca6421sa8195pwsa8810_firmwaresm4375_firmwaresw5100qca6436wcn6851sa6155pwcd9385wcd9341qca6431qca6696_firmwaresd870_firmwareqca6390wcd9375aqt1000sa8150pwsa8830_firmwaresda429wsd855_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn3610wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresw5100pqca6554asd865_5gqca6595qca6564auqcc5100sdx55m_firmwarewsa8835qca6574wcd9380qcs410qca6574aqca6430_firmwarewcn3980qca6574_firmwaresd855wsa8815wcn6850mdm9650_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd695wcn3980_firmwareqca6391sdx55mqcc5100_firmwareqca6421_firmwareaqt1000_firmwaresd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwareqca6564a_firmwarewcd9341_firmwaresd480sd870wsa8810sw5100p_firmwareqcs610_firmwaresa6145pwcn3680bsd695_firmwareapq8096auqca6595_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa6150psdx55apq8096au_firmwaresa8155psw5100_firmwareqcn9074_firmwareqcs410_firmwareSnapdragonwcn3991_firmwareqca8337_firmwaresda429w_firmwaresa6150p_firmwarewcd9380_firmwaresa8145p_firmwareqca6431_firmwaresdx55m_firmwaremdm9628_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwareqca6584au_firmwareqca6430_firmwareqca6554a_firmwarewcd9385_firmwaresdxr2_5g_firmwareqca6574_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwarewcn3998_firmwarewcn3980_firmwarewcn3610_firmwareqca6436_firmwareqcc5100_firmwareqca6421_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwaresd480_firmwarewcn6851_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwaresm4375_firmwaresw5100p_firmwareqcs610_firmwaresd695_firmwareqca6696_firmwareqca6595_firmwaresd870_firmwareqca6391_firmwarewcd9370_firmwareapq8096au_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33023
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.76%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:05
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input (`Classic Buffer Overflow`) in SPS-Applications

Memory corruption while processing finish_sign command to pass a rsp buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresdm429w_firmwaresd865_5gsnapdragon_632_mobileqca6595qca8081_firmwaresnapdragon_670_mobilewcd9340_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilefastconnect_6700wcn3610sa4150psnapdragon_427_mobile_firmwaresnapdragon_782g_mobile_firmwaresnapdragon_wear_4100\+_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395snapdragon_665_mobile_firmwaresc8180xp-aaabqca6574au_firmwareqcn7606_firmwaresm6370qam8295pwcd9341sd626_firmwaresnapdragon_820_automotivesnapdragon_888\+_5g_mobile_firmware315_5g_iot_firmwaresd730_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwaresc8180xp-acafwcn3660_firmwaresnapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430sd835_firmwareqcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770psnapdragon_678_mobile_firmwaresnapdragon_425_mobilesd821snapdragon_632_mobile_firmwaresa8540pqsm8250_firmwareqsm8350_firmwarevideo_collaboration_vc1_platformqep8111sa7255psnapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200qca6310wcd9360sd821_firmwaresnapdragon_680_4g_mobilesa6155pqca6564au_firmwaresd820snapdragon_429_mobile_firmwareqam8650psnapdragon_835_mobilesa9000psnapdragon_888_5g_mobile_firmwaresxr2250p_firmwaresnapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwaremdm9640_firmwaresd835snapdragon_x55_5g_modem-rfsnapdragon_4_gen_2_mobile_firmwareqca6436_firmwaresnapdragon_695_5g_mobile_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwareqca6420wcn3910apq8064au_firmwarecsrb31024snapdragon_712_mobilesnapdragon_835_mobile_firmwarewcn3660bqca6574awcn3620_firmwareqca6174awcd9340qcm2290qdu1210talynplussnapdragon_auto_5g_modem-rf_gen_2sm8550p_firmwaresxr2250pqcm8550wcn3988snapdragon_765_5g_mobile_firmwareqcn9024vision_intelligence_300_firmwareqca6574215_mobileqamsrv1hqcs410qcm2290_firmwarevision_intelligence_100sa8155phome_hub_100snapdragon_765g_5g_mobile_firmwarewsa8830smart_display_200_firmwaresm8550psa6145psnapdragon_625_mobile_firmwaresa8255p_firmwaremsm8996ausnapdragon_4_gen_2_mobilesnapdragon_7c_compute_firmwareqrb5165m_firmwaresa8650p_firmwaresnapdragon_820_mobile_firmwarewcn3620snapdragon_865\+_5g_mobile_firmwaresnapdragon_429_mobileapq8064auwcn3950_firmwareqrb5165nfastconnect_6200sm7325p_firmwaresd460wcd9360_firmwaresc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_660_mobile_firmwareqdx1011snapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarerobotics_rb3_firmwaresd670_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobilesc8180xp-acaf_firmwareqcn6224_firmwarevision_intelligence_100_firmwareqca6431sd660_firmwaresnapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwareqca9379_firmwaresxr2130_firmwaresrv1msnapdragon_860_mobile_firmwarear8035_firmwaresnapdragon_778g\+_5g_mobileqrb5165msc8380xpqca6320sd888_firmwareqcs6125_firmwareqcn9074wsa8815_firmwareqca8337_firmwaresnapdragon_665_mobilesm7250p_firmwarewcn3680_firmwarewcn3999wcn3950snapdragon_730g_mobile_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaretalynplus_firmwaresnapdragon_778g\+_5g_mobile_firmwareapq8037sa8295p_firmwaresmart_audio_400_firmwaresd_675_firmwaresa4155p_firmwaresnapdragon_720g_mobilesm7250pcsrb31024_firmwaresa8155sc8180x-acafsd888qru1062_firmwaresd460_firmwaresnapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobilesc8380xp_firmwareqru1062qca6310_firmwaresd626fastconnect_6800pm8937snapdragon_865_5g_mobile_firmwarewcd9371fastconnect_6900_firmwarerobotics_rb5_firmwaresc8180x-aaab_firmwarevideo_collaboration_vc3_platformqcm2150_firmware215_mobile_firmwareqca6431_firmwareqca6698aq_firmwareqcs2290qcn7606qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615wcn3999_firmwarewcn3680sa8255pwcd9390_firmwareqep8111_firmwareqca6430snapdragon_855\+_mobilemdm9650qdx1011_firmwaresnapdragon_765_5g_mobilesnapdragon_860_mobilesc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfflight_rb5_5g_firmwaressg2125pqru1052snapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwareqamsrv1mqam8650p_firmwareqca6420_firmwareqcs6490_firmwaresd855_firmwarewcd9335_firmwaremdm9640qca6436qrb5165n_firmwarewcn3980_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqdu1010_firmwareqcs4290_firmwaresnapdragon_430_mobile_firmwarecsra6620qca8081sd660wsa8815qam8775pqca9377snapdragon_ar2_gen_1_firmwareqcm4325_firmwaresnapdragon_439_mobile_firmwareqcm4290_firmwaresnapdragon_720g_mobile_firmwaresnapdragon_821_mobile_firmwaresnapdragon_710_mobileqcs5430_firmwaresg4150p_firmwareqru1052_firmwarecsra6620_firmwareqcs8550sa8650psnapdragon_626_mobileqam8775p_firmwaresd865_5g_firmwaresnapdragon_xr1wcd9375snapdragon_ar2_gen_1snapdragon_636_mobilesa8145psd_675snapdragon_8\+_gen_1_mobile_firmwaresmart_display_200qdx1010wcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwareqcm8550_firmwareapq8017qcs410_firmwarerobotics_rb3sa6150p_firmwaresw5100psxr1120qcs610_firmwarewcd9335wcd9370snapdragon_7c_gen_2_compute_firmwareqca6696wcd9341_firmwarewcn6740_firmwaresnapdragon_780g_5g_mobilesnapdragon_750g_5g_mobilevision_intelligence_200_firmwaresnapdragon_685_4g_mobilesnapdragon_x50_5g_modem-rf_firmwareqdu1110snapdragon_auto_4g_modemsnapdragon_690_5g_mobile_firmwareqca6574auwcd9390sa8620p_firmwarepm8937_firmwarecsra6640snapdragon_778g_5g_mobile_firmwaresrv1hwcn3660b_firmwaresd730snapdragon_690_5g_mobileqcn6024_firmwaresnapdragon_636_mobile_firmwareqcm5430snapdragon_712_mobile_firmwaresnapdragon_625_mobileqcm6125_firmwarec-v2x_9150ssg2115pqcc710snapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaresxr1120_firmwaresnapdragon_wear_4100\+fastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwareqru1032_firmwareqfw7114qam8255p_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_730_mobilewsa8845snapdragon_626_mobile_firmwareqca6421_firmwareqcm6125sc8180x-adwsa8810qdu1000_firmwareqsm8250srv1h_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwareqdu1010wcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840srv1m_firmwareqcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesnapdragon_x35_5g_modem-rf_firmwareqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwaremdm9650_firmwarewcd9371_firmwareqcs4490_firmwarewcn3910_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobilewcd9370_firmwareqdu1110_firmwareqdu1000sa7255p_firmwaresnapdragon_8\+_gen_2_mobilesa8195pqca6335_firmwareqcm6490sa8540p_firmwaresm6370_firmwaresnapdragon_662_mobileqca9379sa8775psxr2230p_firmwaresd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaresa8775p_firmwaresmart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326sa8155p_firmwaresnapdragon_630_mobileqca6564aqcn9074_firmwaresnapdragon_768g_5g_mobile_firmwaresnapdragon_7c_gen_2_computesc8180x\+sdx55_firmwarear8035qamsrv1m_firmwaresa6155qcm4325qcn6224snapdragon_435_mobile_firmwaresc8180x\+sdx55qca6698aqssg2125p_firmwaresm6250snapdragon_480\+_5g_mobilesd670wcn3680bsa8145p_firmwaresa8150p_firmwarefastconnect_6700_firmwarewcn3990snapdragon_x75_5g_modem-rf_firmwareqcs6490snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarehome_hub_100_firmwaresnapdragon_460_mobile_firmwarewsa8830_firmwareqca6678aq_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwareqca6678aqsnapdragon_x35_5g_modem-rfsc8180xp-aaab_firmwaresa4150p_firmwareqca6564ausnapdragon_820_mobilesnapdragon_425_mobile_firmwaresm6250p_firmwaresc8180xp-adsc8280xp-abbbsa8195p_firmwareqcm4290sd_455_firmwarear8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_xr2\+_gen_1sm4125qcm4490_firmwareqru1032vision_intelligence_400_firmwareqcs6125flight_rb5_5gsnapdragon_870_5g_mobile_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobilesnapdragon_870_5g_mobilesnapdragon_678_mobilesd_455sm6250_firmwaresc8180x-ad_firmwaresnapdragon_7c_computeqca6584auqca6320_firmwareqcn6274_firmwaresnapdragon_435_mobilesw5100_firmwarewcn6740snapdragon_780g_5g_mobile_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwareqfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobileapq8017_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_450_mobile_firmwaresnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresc8180x-aaabsxr1230psd662_firmwarewcn3660sw5100aqt1000snapdragon_4_gen_1_mobile_firmwareqca6234c-v2x_9150_firmwareqam8295p_firmwaresd855wcn3990_firmwaresm7315snapdragon_660_mobileqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqsm8350qca6234_firmwaresnapdragon_8_gen_1_mobilesnapdragon_630_mobile_firmwaresd662snapdragon_680_4g_mobile_firmwarewcn3610_firmwareqcs4290sxr1230p_firmwaresnapdragon_821_mobilesnapdragon_865\+_5g_mobilesd820_firmwaresg8275psm6250psdx55_firmwarewcn3615_firmwaresxr2130qcm4490snapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfapq8037_firmwaresnapdragon_670_mobile_firmwareaqt1000_firmwaresdm429wqca6584au_firmwareqcn6274qfw7124qca6595au_firmwaresw5100p_firmwareqca6696_firmwarewcd9380_firmwareqca6574_firmwaresg4150psd_8_gen1_5gqca6797aqsnapdragon_x75_5g_modem-rfsnapdragon_427_mobilesa8620pqca6574a_firmwaresdx55snapdragon_4_gen_1_mobilesnapdragon_450_mobilesnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675sd_8_gen1_5g_firmwarewcd9375_firmwareqca6391snapdragon_439_mobilesa8770p_firmwaresa8295psc8280xp-abbb_firmwarefastconnect_7800snapdragon_8\+_gen_2_mobile_firmwarevision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmware315_5g_iotqamsrv1h_firmwaresnapdragon_430_mobilevision_intelligence_400wsa8835_firmwaressg2115p_firmwarewcn3980qcm2150snapdragon_w5\+_gen_1_wearableqcs610Snapdragonqca6574a_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_720g_mobile_platform_firmwarequalcomm_video_collaboration_vc1_platform_firmwarewsa8832_firmwaresd_455_firmwareqcs4490_firmwareqca6431_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareflight_rb5_5g_platform_firmwaresa8150p_firmwaresd888_firmwareqcn9024_firmwareqca6234_firmwaresd820_firmwaresd821_firmwaresrv1h_firmwaresd855_firmwaresd670_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcn3660_firmwaresa8255p_firmwarewsa8835_firmwaresm7325p_firmwarewcn3988_firmwarefastconnect_6700_firmwaresnapdragon_660_mobile_platform_firmwaresnapdragon_855_mobile_platform_firmwareqcm6490_firmwaresxr2250p_firmwaresa8155p_firmwarefastconnect_6200_firmwaresnapdragon_820_mobile_platform_firmwaresa4155p_firmwareqcn6224_firmwaresm6250_firmwareqca6420_firmwarecsrb31024_firmwaresa6155_firmwaresd626_firmwareqca9377_firmwaresm7250p_firmwaresnapdragon_675_mobile_platform_firmwaresm7315_firmwareqca6698aq_firmwareqca8081_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwaresa8770p_firmwaresd835_firmwarevision_intelligence_400_platform_firmwarewcd9385_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_636_mobile_platform_firmwarewcn3610_firmwarefastconnect_7800_firmwarecsra6640_firmwaresxr1120_firmwarewcd9341_firmwarewsa8845h_firmwareqcm8550_firmwareqdu1110_firmwaressg2125p_firmwarewcd9360_firmwarecsra6620_firmwaresa8155_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcn6024_firmwareqamsrv1m_firmwaresa8620p_firmwareqca6436_firmwaresd662_firmwareqca6595_firmwareqcn6274_firmwaresa7255p_firmwarewcd9326_firmwareqam8650p_firmwaremdm9650_firmwarec-v2x_9150_firmwareqsm8250_firmwarewcn3950_firmwaresnapdragon_670_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_439_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwarevision_intelligence_300_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6564a_firmwaresrv1m_firmwareqca6335_firmwareqrb5165n_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresa8195p_firmwarewcn3910_firmwareqcn7606_firmwareqcs5430_firmwaresnapdragon_625_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwareqdx1011_firmwaresw5100_firmwaresa9000p_firmwarewcd9340_firmwarear8035_firmwaresnapdragon_695_5g_mobile_platform_firmware315_5g_iot_modem_firmwarefastconnect_6800_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8845_firmwaresd660_firmwareqcs6125_firmwaresnapdragon_429_mobile_platform_firmwaremdm9640_firmwareqcc710_firmwareqca6574au_firmwareapq8017_firmwaresa6155p_firmwareqcn9074_firmwareqca6678aq_firmwarewcn6740_firmwaresd_8_gen1_5g_firmwareqcs8550_firmwaresa8540p_firmwaresm4125_firmwaresnapdragon_425_mobile_platform_firmwareqca6564au_firmwarewcn3980_firmwaresnapdragon_xr2_5g_platform_firmwarewcn3680_firmwaresnapdragon_626_mobile_platform_firmwaresm6250p_firmwareqcm6125_firmwareqep8111_firmwarewcn3660b_firmwareqca6696_firmwaresa8775p_firmwaresnapdragon_430_mobile_platform_firmwareqsm8350_firmwareapq8064au_firmwaresnapdragon_xr1_platform_firmwareqca8337_firmwarewcn3615_firmwareqca6595au_firmwarewcd9390_firmwareaqt1000_firmwareqamsrv1h_firmwaresdm429w_firmwaresm8550p_firmwarewcn3999_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqcs6490_firmwaresnapdragon_632_mobile_platform_firmwareqcm5430_firmwaresnapdragon_ar2_gen_1_platform_firmwaresnapdragon_821_mobile_platform_firmwaresd675_firmwarepm8937_firmwarewcd9395_firmwaresa6145p_firmwareqdu1010_firmwaresa8295p_firmwaresnapdragon_835_mobile_pc_platform_firmwaresnapdragon_845_mobile_platform_firmwaresa4150p_firmwaresg4150p_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa6150p_firmwareqca6174a_firmwaresxr1230p_firmwareqfw7124_firmwareqca6391_firmwarefastconnect_6900_firmwareqdu1000_firmwarewcd9370_firmwarewsa8840_firmwaretalynplus_firmwaresxr2130_firmwaresnapdragon_427_mobile_platform_firmwareqca6584au_firmwareqam8775p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewcd9380_firmwarewsa8810_firmwarewcd9371_firmwarerobotics_rb3_platform_firmwaresw5100p_firmwareqcm4325_firmwareqfw7114_firmwaresd730_firmwaresnapdragon_865_5g_mobile_platform_firmwarewsa8830_firmwaresxr2230p_firmwaremsm8996au_firmwareqam8295p_firmwaressg2115p_firmwareqca6320_firmwareqca6574_firmwaresd_675_firmwaresg8275p_firmwarewcd9335_firmwaresnapdragon_630_mobile_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresa8145p_firmwaresd460_firmwarear8031_firmwareqcm4490_firmwareqru1052_firmwarequalcomm_215_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqdu1210_firmwarerobotics_rb5_platform_firmwareqdx1010_firmwareqcs4290_firmwaresnapdragon_480_5g_mobile_platform_firmwareqcs610_firmwarehome_hub_100_platform_firmwaresnapdragon_662_mobile_platform_firmwareqru1062_firmwarewsa8815_firmwareqcs2290_firmwaresnapdragon_460_mobile_platform_firmwarewcn3990_firmwareqca6797aq_firmwareapq8037_firmwarewcn3680b_firmwaresm6370_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_450_mobile_platform_firmwareqca9379_firmwareqrb5165m_firmwareqca6430_firmwaresd865_5g_firmwareqcm2150_firmwarewcn3620_firmwaresnapdragon_665_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca6426_firmwaresnapdragon_auto_4g_modem_firmwaresc8380xp_firmwaresdx55_firmwareqru1032_firmwaresmart_audio_400_platform_firmwareqca6421_firmwareqam8255p_firmwareqcs410_firmwareqca6310_firmwareqcm4290_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa8650p_firmwaresnapdragon_435_mobile_platform_firmwarewcd9375_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-33085
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.68%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (Classic Buffer Overflow) in Wearables

Memory corruption in wearables while processing data from AON.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresw5100pqcs410_firmwaresa6150p_firmwarewsa8845_firmwareqca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwarear8035_firmwareqca6696wsa8830_firmwareqrb5165msnapdragon_888_5g_mobile_platformwcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcd9395_firmwareqcn6024sd888_firmwarewcn6740_firmwarefastconnect_6700sa4150pwsa8815_firmwaresa8195p_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwareqca8337qdu1110wcd9395snapdragon_680_4g_mobile_platformsg8275p_firmwareqca9377_firmwareqcm6490_firmwareqca6574au_firmwareqam8295pwcd9341qca6574auqru1032snapdragon_x12_lte_modemflight_rb5_5g_platformwcd9390wcn3950wsa8810_firmwarewsa8845h_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformsa8295p_firmwareqcn6024_firmwaresa4155p_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_778g\+_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwaresd888qcn9011_firmwareqru1062_firmwaresw5100_firmwarewcn6740snapdragon_480\+_5g_mobile_platform_firmwareqru1062snapdragon_695_5g_mobile_platform_firmwareqca6595_firmwaresnapdragon_685_4g_mobile_platform_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqru1032_firmwaresnapdragon_782g_mobile_platform_firmwarewcd9385_firmwarefastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwarewcd9360snapdragon_4_gen_1_mobile_platformsa8150psnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_685_4g_mobile_platformwsa8845sa6155psnapdragon_auto_5g_modem-rf_firmwarewsa8810qam8650pqdu1000_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsm7315_firmwareqdu1010sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqdu1210_firmwaresm7315qca6698aq_firmwarewcd9385qcn9012snapdragon_7c\+_gen_3_compute_firmwaresa8255pwcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresg8275pwcd9370_firmwaresdx55_firmwareqdx1011_firmwaresnapdragon_auto_5g_modem-rfqdu1110_firmwareqdu1000wcn3660bqca6574aqru1052qca6174asa8195pqdu1210qca6174a_firmwareqcm6490sm7325pqam8650p_firmwarewcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024wcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6574snapdragon_480_5g_mobile_platform_firmwarewsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwareqdu1010_firmwaresw5100p_firmwareqcn9011snapdragon_782g_mobile_platformqca6696_firmwareqcn9024_firmwarewsa8845hwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwareqca8081wsa8815sa8155pwsa8830qam8775pqca6797aqqca9377sa6145pqcm4325_firmwaresa8255p_firmwareflight_rb5_5g_platform_firmwarear8035qca6574a_firmwaresdx55snapdragon_480\+_5g_mobile_platformqrb5165m_firmwareqcm4325wcd9375_firmwarerobotics_rb5_platformqca6391qcn9012_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwareqrb5165nsa8295psnapdragon_8_gen_1_mobile_platformrobotics_rb5_platform_firmwareqcs8550fastconnect_6200fastconnect_7800sa8145p_firmwaresm7325p_firmwareqam8775p_firmwarewcd9360_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformqdx1011wcd9375sa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_680_4g_mobile_platform_firmwareqcs6490wcn3980fastconnect_6200_firmwareqdx1010wcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-39291
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.94%
||
7 Day CHG~0.00%
Published-24 Jun, 2024 | 13:52
Updated-11 May, 2026 | 20:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode()

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() The function gfx_v9_4_3_init_microcode in gfx_v9_4_3.c was generating about potential truncation of output when using the snprintf function. The issue was due to the size of the buffer 'ucode_prefix' being too small to accommodate the maximum possible length of the string being written into it. The string being written is "amdgpu/%s_mec.bin" or "amdgpu/%s_rlc.bin", where %s is replaced by the value of 'chip_name'. The length of this string without the %s is 16 characters. The warning message indicated that 'chip_name' could be up to 29 characters long, resulting in a total of 45 characters, which exceeds the buffer size of 30 characters. To resolve this issue, the size of the 'ucode_prefix' buffer has been reduced from 30 to 15. This ensures that the maximum possible length of the string being written into the buffer will not exceed its size, thus preventing potential buffer overflow and truncation issues. Fixes the below with gcc W=1: drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c: In function ‘gfx_v9_4_3_early_init’: drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:379:52: warning: ‘%s’ directive output may be truncated writing up to 29 bytes into a region of size 23 [-Wformat-truncation=] 379 | snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_rlc.bin", chip_name); | ^~ ...... 439 | r = gfx_v9_4_3_init_rlc_microcode(adev, ucode_prefix); | ~~~~~~~~~~~~ drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:379:9: note: ‘snprintf’ output between 16 and 45 bytes into a destination of size 30 379 | snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_rlc.bin", chip_name); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:413:52: warning: ‘%s’ directive output may be truncated writing up to 29 bytes into a region of size 23 [-Wformat-truncation=] 413 | snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_mec.bin", chip_name); | ^~ ...... 443 | r = gfx_v9_4_3_init_cp_compute_microcode(adev, ucode_prefix); | ~~~~~~~~~~~~ drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:413:9: note: ‘snprintf’ output between 16 and 45 bytes into a destination of size 30 413 | snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_mec.bin", chip_name); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-21135
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.84%
||
7 Day CHG~0.00%
Published-15 Jun, 2023 | 00:00
Updated-18 Dec, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In onCreate of NotificationAccessSettings.java, there is a possible failure to persist notifications settings due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-260570119

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-20
Improper Input Validation
CVE-2022-46824
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-5.6||MEDIUM
EPSS-0.00% / 0.03%
||
7 Day CHG~0.00%
Published-08 Dec, 2022 | 17:37
Updated-23 Apr, 2025 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains IntelliJ IDEA before 2022.2.4 a buffer overflow in the fsnotifier daemon on macOS was possible.

Action-Not Available
Vendor-Apple Inc.JetBrains s.r.o.
Product-intellij_ideamacosIntelliJ IDEA
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-25020
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.74%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 04:47
Updated-05 Aug, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, Inc
Product-h300eh500scloud_backuph410c_firmwareh300s_firmwareh410sh300sh300e_firmwarelinux_kernelh500eh410s_firmwareh700s_firmwareh500s_firmwareh500e_firmwareh700eh410ch700e_firmwareh700sn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30318
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 15.70%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of input when provisioning the HDCP key can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcn3950mdm9628sd720gmdm9206_firmwareqsw8573_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwaremsm8909wapq8009w_firmwarewcd9360qca9367_firmwarewcn3999qrb5165_firmwareqrb5165m_firmwareqcs6125sa8155_firmwaresd662_firmwareqcs405qualcomm215_firmwaresd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresa8195p_firmwaresm8475wcn6750_firmwarewcn3610sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwarewcd9330qca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qualcomm215qcs410sd690_5g_firmwaresdx24_firmwareqcn9012_firmwaresd439_firmwareqsw8573qcs605wcn6850wcn3910qca6426_firmwarewcn3660b_firmwaresd730wcd9330_firmwaresdx55mwcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresa6145psdxr1apq8096auar8031qcs405_firmwaresa8145pqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sd439qcs8155_firmwarear8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarefsm10056csrb31024mdm9628_firmwarecsra6620fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwareqrb5165n_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd662qcn9011_firmwaresa8155sdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwareqca6584ausa6155p_firmwaresd778gqcs8155sm6225sa515m_firmwareqcs6490sd429sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresd205sd429_firmwaresd778g_firmwaresm6250sa8195papq8017_firmwaresd765_firmwareqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375sm6250_firmwaresda429wsd210wcn3620_firmwaresdx20_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareapq8017qcx315qca6564aqcm6125_firmwareqcm2290_firmwaresd_675sd780gsd865_5gsdx24qcn9012sd888msm8909w_firmwareqcx315_firmwaremsm8996ausdm429w_firmwarewsa8835sd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sd765qca6574a_firmwaresd768g_firmwareqrb5165msm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx20sd480_firmwareqcn9011sm6225_firmwareqca6574ausa8155p_firmwaremdm9607sd205_firmwareqcm6125mdm9150wcn6856qca6564_firmwaresd768gwcn6740qca6696sa6150psdw2500apq8096au_firmwaresm7250psd720g_firmwaresdx12qcs410_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30981
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.75% / 73.28%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 18:51
Updated-03 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.1, Security Update 2021-008 Catalina, macOS Big Sur 11.6.2. An application may be able to execute arbitrary code with kernel privileges.

Action-Not Available
Vendor-Apple Inc.
Product-macosmac_os_xmacOS
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30303
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.44%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of buffer length check when segmented WMI command is received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca2066mdm9640_firmwaresm6250p_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca1023qca8337ar9380ipq8173_firmwarewcd9360_firmwareqca9561_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca2062qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca9987_firmwaresa415mwcn3998wcn3950qcn6024_firmwaresd720gipq8076amdm9206_firmwaremdm9628sm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwareqca6420wcd9360qca6438_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430sc8280xp_firmwarewcd9340qcn6132sd765gqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca2066_firmwareqca6696_firmwaresd870_firmwaresd750gqca9988_firmwareqcn5154_firmwarewcn3910_firmwaresd_8cxqcn5501_firmwaresa8150par7420_firmwarewsa8830_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd855_firmwarewcn3988qca6438sd660_firmwaresa8195p_firmwareqcn5121qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca9898ipq4028wcn3610mdm9640qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca4531_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330msm8996au_firmwareipq8076a_firmwareqca7550_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwareqca7520_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwareqca9379_firmwaresdx24_firmwareqca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cpmp8074_firmwarewcn3910qca6584_firmwareqca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqca2062_firmwarewcn6740_firmwareqcn5064_firmwaresd678_firmwareapq8064au_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855qcn7605_firmwareqcn5121_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwaresdxr1ar8031qca1023_firmwareapq8096auqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwareqca2064sd780g_firmwaresdx55sd888_firmwaresc8280xpqcn5021_firmwaresa8155pcsra6640sd675qca9531_firmwareqca9379ar8035_firmwareqcm2290qcn7606qcn5024_firmwarewcn3991_firmwarewsa8830sd678qca9561qcn9070sa8145p_firmwareqca7520qcs2290_firmwaresd7c_firmwarecsrb31024qca9563_firmwaremdm9628_firmwareqca9378mdm9650csra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290mdm9250sd765g_firmwareqca6420_firmwareipq8069_firmwareapq8009_firmwareqca2064_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sm8450qca4531ipq5018sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwareqcn7605wcd9326_firmwareqca9563ipq8074aqca2065sd662qcn5124_firmwaresa8155qca6320_firmwareqca6584qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwaresm6225ipq8174sa515m_firmwareqca9990qcs6490sdxr2_5gqcn5052qca9367qcn5501mdm9607_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwareqca7550sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023ipq8071aqca6174a_firmwareipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca2065_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375ar8035sm6250_firmwarecsr8811apq8064auipq4019qcn9100_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareapq8017qcx315qca6564aqca9988qca9882qca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gar9380_firmwaresdx24sm8450p_firmwareqcn9012sd888qca9558_firmwareqca9896_firmwareqcn6122_firmwareipq8065_firmwareqcx315_firmwarewsa8835msm8996ausd665_firmwaresd888_5gsm6250pqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206wcn6855_firmwareqca9889qca6174asm7325pqcn6132_firmwareqca9888ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886qcn5502_firmwarear7420sd855sm7325p_firmwaresd665ipq8076qca6175asd765qca9887qca9378_firmwareqca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwaresd850_firmwaresm7315apq8009sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcn9100sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqca9882_firmwareqcn9070_firmwaresdx20sd480_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwaremdm9607qcn5122wcd9341_firmwarewsa8810sm8450pwcn6856qcn5022qca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022sd845qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwaresdx12ipq8071_firmwareqcs410_firmwareqcn9074_firmwareipq4029qca6175a_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30308
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.44%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 11:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow while printing the HARQ memory partition detail due to improper validation of buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sd678sm6250p_firmwareqcs610fsm10056qca8337sd7c_firmwarecsrb31024wcd9360_firmwaremdm9650sdx65wcn3950_firmwaremdm9250sd765g_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqca6426wcn3990_firmwareqca9377sa415mwcn3998wcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwarewcd9326_firmwaresd720gwcn3950sd_8_gen1_5g_firmwaresm6375_firmwareqca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwaresdx12_firmwarewcd9375_firmwaresm7250p_firmwarewcn3998_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwaresd_8cx_gen2sa515m_firmwaresdxr2_5gsa415m_firmwarewcn3988_firmwareqca6430sm6250wcd9340wsa8810_firmwaresd765gsd765_firmwarefsm10056_firmwareqca6436wcd9326wcd9335wcn6851qca8081qcs603_firmwareqca6174a_firmwaremdm9250_firmwarewcd9385wcd9341qca6696_firmwaresd750gsd870_firmwareqca6390ar8035sd750g_firmwareaqt1000wcd9375sm6250_firmwarewsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresdx20_firmwarewcn3988wcn6850_firmwarewsa8815_firmwaresd660_firmwarewsa8835_firmwareqcx315sm8475qca6564asm6375wcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675sd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwarewsa8835qcx315_firmwaresd665_firmwarewcd9380sm6250pqcs410qca6574asd690_5g_firmwarewcn6855_firmwareqca6174asdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sa515mqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665sd7cmdm9650_firmwaresd765qca6426_firmwareqca6574a_firmwaresd768g_firmwaresd850_firmwarewcn3980_firmwaresd730qca6391sdx55msdxr1_firmwareaqt1000_firmwaresdx65_firmwaresd678_firmwarecsrb31024_firmwaresdx20sd480_firmwareqcs603wcn6851_firmwareqca6574auqca6564a_firmwarewcd9341_firmwaresd480sd870wsa8810wcn6855qcs610_firmwaremdm9150wcn6856sdxr1sd768gqca6696qca6391_firmwaresd845_firmwarewcd9370_firmwaresdx55sd675sd845sm7250psd720g_firmwaresdx12qcs410_firmwarear8035_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2026-21382
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 3.05%
||
7 Day CHG~0.00%
Published-06 Apr, 2026 | 15:33
Updated-08 Apr, 2026 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Power Management IC

Memory Corruption when handling power management requests with improperly sized input/output buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8845h_firmwarex2000086x2000092xg101002_firmwarefastconnect_6900_firmwareqca0000wcd9378c_firmwaresc8380xp_firmwarewsa8840wsa8845hcologne_firmwarexg101032sc8380xpx2000077x2000086_firmwarex2000077_firmwarex2000094_firmwarex2000094wsa8845_firmwarewcd9385_firmwarexg101032_firmwarewcd9378cx2000092_firmwarexg101039_firmwarefastconnect_7800xg101039x2000090qca0000_firmwarewcd9385wcd9380_firmwarewsa8840_firmwarefastconnect_7800_firmwarex2000090_firmwarexg101002wsa8845wcd9380fastconnect_6900cologneSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30298
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.12%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound access due to improper validation of item size and DIAG memory pools data while switching between USB and PCIE interface in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewsa8830wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwareqcs610qcn9000ipq8072afsm10056qca8337ipq8076a_firmwaresd865_5gsdx55m_firmwarecsra6620fsm10055_firmwarewsa8835wcn3950_firmwaresd665_firmwarewcd9380sd765g_firmwareqca6595au_firmwareqca6390_firmwarequalcomm215qcs410wcd9370csra6620_firmwarecsra6640_firmwareqrb5165n_firmwareqcn9000_firmwarewcd9335_firmwarewcn3980wcn3998wcd9385_firmwarewcn3950ipq8076awcd9340_firmwarewcn3660bwsa8815wcn6850sd665ipq8074asd662sd460_firmwaresd765wcn3660b_firmwareqca6574au_firmwaresdx55_firmwaresd768g_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwarewcn3980_firmwarewcn3610_firmwaresd460qca6391sdx55mqrb5165nwcn3999ar8031_firmwareqrb5165_firmwareqrb5165wcn6851_firmwaresd662_firmwareipq8072a_firmwareqcs405wcn3988_firmwareqca6574auqcn9074sd205sa8155p_firmwaresd205_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwarefsm10056_firmwaresd870wcn6851wcd9335sd210_firmwareqcs610_firmwaremdm9150wcd9385wcd9341sd768gar8031qca6696_firmwareqcs405_firmwaresd870_firmwareqca6696qca6391_firmwarear8035qca6390wcd9375wcd9370_firmwaresdx55sa8155pwsa8830_firmwaresda429wsd210csra6640sd865_5g_firmwarewcn3620_firmwareipq8074a_firmwarewcn3988wcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresm7250pqcn9074_firmwareqcs410_firmwarear8035_firmwarewcn3610Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-29540
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.5||LOW
EPSS-0.03% / 9.18%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 19:11
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in `Conv2DBackpropFilter`

TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L495-L497) computes the size of the filter tensor but does not validate that it matches the number of elements in `filter_sizes`. Later, when reading/writing to this buffer, code uses the value computed here, instead of the number of elements in the tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-1679
Matching Score-4
Assigner-Zephyr Project
ShareView Details
Matching Score-4
Assigner-Zephyr Project
CVSS Score-7.3||HIGH
EPSS-0.05% / 16.12%
||
7 Day CHG~0.00%
Published-27 Mar, 2026 | 23:21
Updated-01 Apr, 2026 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
net: eswifi socket send payload length not bounded

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly.

Action-Not Available
Vendor-Zephyr Project
Product-zephyrZephyr
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-26571
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.11%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 18:43
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webgetactivexcfg function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-baseboard_management_controllerapollo_70_systemHPE Apollo 70 System
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25123
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.22%
||
7 Day CHG~0.00%
Published-29 Jan, 2021 | 12:30
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice addlicense_func function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-cloudline_cl5200_gen9_servercloudline_cl3100_gen10_server_firmwarecloudline_cl5800_gen10_servercloudline_cl3100_gen10_servercloudline_cl4100_gen10_servercloudline_cl5200_gen9_server_firmwarecloudline_cl5800_gen9_server_firmwarecloudline_cl5800_gen9_servercloudline_cl5800_gen10_server_firmwarecloudline_cl4100_gen10_server_firmwareHPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-10491
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.90%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 17:11
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ADSP can be compromised since it`s a general-purpose CPU processing untrusted data in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaresd_632mdm9640_firmwaresd_820asd_675msm8996au_firmwaresd_439sd_670_firmwaresd_429sdx24sdm439mdm9650sd_636sd616_firmwaresd_615_firmwaresd616msm8909w_firmwaremsm8996ausd_820sd_450_firmwaresd_845_firmwaresd_820a_firmwareqcs605_firmwaresd_675_firmwareipq4019_firmwaremdm9206sd_425_firmwaresd_665sdx24_firmwaresd_625_firmwareipq8074sd_450sd_845mdm9206_firmwareqcs605sd_632_firmwaresd_835_firmwaremdm9650_firmwaresd_835sda660ipq8064sd_210_firmwaresd_415_firmwaremsm8909wsd_665_firmwaresd_205_firmwareipq8064_firmwaresd_415sd_212sd_427_firmwaresd_712sd_855sd_730_firmwarequalcomm_215sdx20sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435sd_615sd_710_firmwaresdm630qcs405sd_625ipq8074_firmwaresd_820_firmwaresd_210mdm9607sd_636_firmwaresd_439_firmwarequalcomm_215_firmwaremdm9150sd_429_firmwaresd_730sd_212_firmwaresd_850_firmwaresd_855_firmwaresdm439_firmwareqcs405_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaresd_430ipq4019sd_427sd_670sd_435_firmwaresdx20_firmwaresd_710sd_205sdm660_firmwaremdm9640Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2026-1110
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 6.02%
||
7 Day CHG~0.00%
Published-18 Jan, 2026 | 04:32
Updated-23 Feb, 2026 | 08:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
cijliu librtsp rtsp_parse_method buffer overflow

A flaw has been found in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10fde13b04. This affects the function rtsp_parse_method. This manipulation causes buffer overflow. It is possible to launch the attack on the local host. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-cijliucijliu
Product-librtsplibrtsp
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2026-1109
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 6.02%
||
7 Day CHG~0.00%
Published-18 Jan, 2026 | 03:02
Updated-23 Feb, 2026 | 08:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
cijliu librtsp rtsp_parse_request buffer overflow

A vulnerability was detected in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10fde13b04. The impacted element is the function rtsp_parse_request. The manipulation results in buffer overflow. Attacking locally is a requirement. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-cijliucijliu
Product-librtsplibrtsp
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28741
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.09% / 24.92%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:06
Updated-02 Aug, 2024 | 13:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsquickassist_technology_libraryquickassist_technology_firmwarequickassist_technologyIntel(R) QAT drivers for Windows - HW Version 1.0
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2026-1108
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 6.02%
||
7 Day CHG~0.00%
Published-18 Jan, 2026 | 01:32
Updated-23 Feb, 2026 | 08:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
cijliu librtsp rtsp_rely_dumps buffer overflow

A security vulnerability has been detected in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10fde13b04. The affected element is the function rtsp_rely_dumps. The manipulation leads to buffer overflow. An attack has to be approached locally. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-cijliucijliu
Product-librtsplibrtsp
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-8177
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 7.70%
||
7 Day CHG~0.00%
Published-26 Jul, 2025 | 04:02
Updated-11 Sep, 2025 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LibTIFF thumbnail.c setrow buffer overflow

A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-n/aLibTIFF
Product-libtiffLibTIFF
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2017-18779
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.21% / 43.38%
||
7 Day CHG~0.00%
Published-22 Apr, 2020 | 14:37
Updated-05 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by a buffer overflow. This affects D6200 before 1.1.00.24, D7000 before 1.0.1.52, JNR1010v2 before 1.1.0.44, JR6150 before 1.0.1.12, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.20, R6020 before 1.0.0.26, R6050 before 1.0.1.12, R6080 before 1.0.0.26, R6120 before 1.0.0.36, R6220 before 1.1.0.60, R6700v2 before 1.2.0.12, R6800 before 1.2.0.12, R6900v2 before 1.2.0.12, WNDR3700v5 before 1.1.0.50, WNR1000v4 before 1.1.0.44, WNR2020 before 1.1.0.44, and WNR2050 before 1.1.0.44.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-jnr1010_firmwarewnr2020_firmwarewndr3700r6120wnr2020r6220_firmwarepr2000r6080_firmwarejwnr2010r6120_firmwarer6800wnr1000_firmwarer6050pr2000_firmwarer6220r6020r6020_firmwared7000r6080d7000_firmwarer6700wndr3700_firmwarewnr1000r6900d6200_firmwarer6900_firmwarer6050_firmwarewnr2050d6200jr6150_firmwarejr6150wnr2050_firmwarejnr1010r6700_firmwarer6800_firmwarejwnr2010_firmwaren/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-8726
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 26.72%
||
7 Day CHG~0.00%
Published-11 Jan, 2021 | 15:35
Updated-05 Aug, 2024 | 07:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.

Action-Not Available
Vendor-k7computingn/a
Product-total_securityantivriusenterprise_securityultimate_securityn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-4204
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.90%
||
7 Day CHG~0.00%
Published-19 Feb, 2020 | 15:15
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 174960.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-aixdb2windowslinux_kernelDB2 for Linux- UNIX and Windows
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-3438
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.55% / 67.99%
||
7 Day CHG~0.00%
Published-20 May, 2021 | 13:32
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.

Action-Not Available
Vendor-n/aSamsungHP Inc.
Product-proxpress_sl-c3060_ss211alaserjet_mfp_m438_8af44aproxpress_sl-c3010_ss210jxpress_sl-m2826_ss344aproxpress_sl-m3870_ss377aproxpress_sl-m4020_ss383yxpress_sl-m2621_ss325asf-760_ss199aproxpress_sl-m3375fd_ss368fmultixpress_sl-m5360_ss403ascx-5637_ss182ascx-4833_ss181axpress_sl-m2885_ss359aclx-3305_ss095aml-5510_ss152acolor_laser_mfp_170_4zb96alaser_mfp_130_4zb90ascx-5737_sw045axpress_sl-m2020_ss272acolor_laser_mfp_170_6hu08aproxpress_sl-c4010_ss216sxpress_sl-m2625_ss326alaserjet_mfp_m443_8af72axpress_sl-m2825_ss342axpress_sl-m2676_ss337axpress_sl-m2875_ss353ascx-3405_sv943ascx-3405_sw314aproxpress_sl-m3375fd_ss369cxpress_sl-c480_ss255ascx-3401_ss158aproxpress_sl-m3820_ss372csf-760_ss196ascx-4650_sb983acolor_laser_mfp_170_6hu09aml-3750_ss138alaser_100_4zb81axpress_sl-c1860_ss205axpress_sl-m2070_ss297amultixpress_clx-9301_ss007axpress_sl-m2875_ss352aml-5510_sv897aproxpress_sl-c3060_ss213fmultixpress_clx-9301_sw179aproxpress_sl-m4075_ss394aproxpress_sl-c4010_ss216bml-6510_ss154amultixpress_sl-x7500_ss055alaser_mfp_130_4zb84aproxpress_sl-c3010_ss210flaserjet_mfp_m440_8af46alaser_408_7uq75alaser_mfp_130_4zb91aproxpress_sl-m4580_ss402aproxpress_sl-c4010_ss216fproxpress_sl-c4010_ss216kclp-365_ss066aproxpress_sl-m3375fd_ss369dproxpress_sl-c4010_ss216vproxpress_sl-m3875_ss382amultixpress_scx-8128_ss018amultixpress_sl-k7500_ss040aclx-3305_ss096asf-760_ss197ascx-3401_ss157aproxpress_sl-m3325_ss367aml-6510_sv901aproxpress_sl-m4024_ss385axpress_sl-m2676_ss338ascx-3401_sv393aclp-680_ss075axpress_sl-c480_ss254aproxpress_sl-c3060_ss213dmultixpress_sl-k7500_ss039axpress_sl-m2880_ss358aproxpress_sl-m3820_ss373wproxpress_sl-c3060_ss211lclp-775_ss079aproxpress_sl-c4010_ss216eproxpress_sl-c3060_ss213gxpress_sl-m2820_ss339aproxpress_sl-m3370_ss378ascx-3400_sv938alaserjet_mfp_m42625_8af52axpress_sl-m2675_sw112aproxpress_sl-c4060_ss218alaser_mfp_130_4zb82amultixpress_sl-k7600_ss042aproxpress_sl-m4530_ss398dproxpress_sl-m4025_ss387aml-5017_ss148aclx-3300_ss088aproxpress_sl-c3010_ss210hscx-4021_ss165aproxpress_sl-c4012_ss217aproxpress_sl-m3321_ss366aproxpress_sl-c4010_ss216pproxpress_sl-m3320nd_ss365amultixpress_sl-x4300_ss049axpress_sl-m2620_ss324aproxpress_sl-c4010_ss216dscx-4521_ss168aproxpress_sl-m3820_ss373dproxpress_sl-c3010_ss210aproxpress_sl-c3010_ss210gproxpress_sl-c3060_ss211nproxpress_sl-m3820_ss373sproxpress_sl-m4072_ss391acolor_laser_150_4zb95aclp-680_ss076aclx-3305_ss094aproxpress_sl-m3820_ss371bsf-760_ss195amultixpress_sl-x7600_ss058aproxpress_sl-m4070_ss390cmultixpress_scx-8230_ss021aproxpress_sl-m3820_ss373uscx-5639_st676alaser_100_4zb79ascx-3405_ss162aproxpress_sl-c3010_ss201claserjet_mfp_m42523_7ab26axpress_sl-m2620_ss322alaser_mfp_432_7uq76amultixpress_scx-8128_ss020axpress_sl-m2625_ss327aproxpress_sl-m4025_ss386alaserjet_mfp_m442_8af71axpress_sl-m2821_ss341aproxpress_sl-m4020_ss383cproxpress_sl-m3820_ss373qlaserjet_mfp_m438_8af45axpress_sl-m2675_ss336aproxpress_sl-m3820_ss373lxpress_sl-m2876_ss355axpress_sl-m2070_ss294aproxpress_sl-m3825_ss375aproxpress_sl-m4070_ss389jlaser_mfp_130_4zb87amultixpress_sl-x4220_ss047aclx-6260_ss105aproxpress_sl-c4062_ss219alaserjet_mfp_m72625-m72630_2zn50aproxpress_sl-m4075_ss393aproxpress_sl-m3875_ss380amultixpress_sl-x7600_ss059aproxpress_sl-c3060_ss211eproxpress_sl-m3820_ss373mproxpress_sl-c3060_ss211pml-6510_sv899cmultixpress_sl-k7400_ss038ascx-3405_sw313ascx-5737_ss183axpress_sl-m2871_ss350amultixpress_sl-x7500_ss056aml-5015_ss147axpress_sl-m2875_ss354aclp-775_ss078aproxpress_sl-m3820_ss373jproxpress_sl-c4010_ss216jproxpress_sl-m3375fd_ss369elaserjet_mfp_m436_w7u01amultixpress_scx-8240_ss022alaser_mfp_130_6hu10amultixpress_sl-m4370_ss396axpress_sl-m2825_ss343ascx-3400_ss155ascx-4521_sv968aclx-6260_ss106axpress_sl-m2626_ss328ascx-4521_sv967aproxpress_sl-m3870_ss378ascx-5635_sw041amultixpress_clx-9301_sw152ascx-4655_ss174aproxpress_sl-m3820_ss373tproxpress_sl-c3060_ss211qproxpress_sl-c3060_ss211dproxpress_sl-m4530_ss397escx-4650_ss171ascx-3406_ss164alaser_mfp_130_4zb85axpress_sl-m2671_ss333axpress_sl-m2620_ss323amultixpress_sl-k4250_ss030ascx-4655_sv989amultixpress_sl-x4250_ss048aproxpress_sl-c3010_ss210kxpress_sl-m2870_ss349aproxpress_sl-m4560_ss400aproxpress_sl-c3010_ss210eproxpress_sl-c3010_ss210mproxpress_sl-c4010_ss216claserjet_mfp_m437_7zb19aproxpress_sl-m3820_ss373gproxpress_sl-c3060_ss211mlaser_mfp_130_4zb83aproxpress_sl-c3060_ss211gproxpress_sl-c3060_ss211cxpress_sl-m2070_ss295axpress_sl-m2070_ss298aproxpress_sl-c3060_s221bxpress_sl-m2070_ss293aproxpress_sl-m3820_ss373fproxpress_sl-c3060_ss213axpress_sl-c430_ss229aclp-560_sv611ascx-3400_ss156aclp-560_sv612alaser_mfp_130_4zb86ascx-4835_sw020ascx-3405_ss161axpress_sl-c480_ss257amultixpress_sl-k4300_ss032amultixpress_sl-m5370_sw121alaserjet_mfp_m42625_8af50aproxpress_sl-m4080_ss395amultixpress_clx-9251_sv719aproxpress_sl-m3820_ss373aclp-360_ss062amultixpress_sl-m4370_sw117aproxpress_sl-c3060_ss211hscx-3405_ss159acolor_laser_150_4zb94aproxpress_sl-m3820_ss373nproxpress_sl-c3060_ss211flaser_mfp_130_5ue15alaserjet_mfp_m433_1vr14aclp-366_ss068aclx-3305_ss093ascx-3405_ss163aproxpress_sl-m4560_ss399aproxpress_sl-m3375fd_ss369bproxpress_sl-m4020_ss383kproxpress_sl-m3820_ss371aproxpress_sl-m3875_ss381aclp-368_sv601aproxpress_sl-m3820_ss371dlaserjet_mfp_m439_7zb22ascx-4833_sw019aclx-6260_ss108aproxpress_sl-m3820_ss373pml-6510_sv900aproxpress_sl-c4010_ss216hml-5010_ss145amultixpress_sl-m5370_ss404aclp-365_sw139ascx-4521_sv530ascx-5637_sw043amultixpress_sl-k4250_ss031aml-4510_ss141aproxpress_sl-m3820_ss373vproxpress_sl-m4020_4pt87amultixpress_clx-9251_ss005ascx-5635_sw093axpress_sl-m2876_ss357ascx-5635_sw040amultixpress_sl-k3250_ss027eproxpress_sl-c3010_ss210plaserjet_mfp_m440_8af48ascx-4835_sw021aproxpress_sl-m4030_ss388aproxpress_sl-c3010_ss209alaser_100_4zb80aproxpress_sl-c3060_ss213hproxpress_sl-c4010_ss216qxpress_sl-m2820_ss340ascx-3406_sw127axpress_sl-m2676_sw113alaserjet_mfp_m42523_7zb72aml-5012_ss146aproxpress_sl-c3060_ss213blaserjet_mfp_m437_7zb20amultixpress_sl-k2200_ss025axpress_sl-m2835_ss346axpress_sl-m2670_ss331amultixpress_sl-k3300_ss028aproxpress_sl-c4010_ss216mmultixpress_sl-x7400_ss054alaserjet_mfp_m439_7zb23aproxpress_sl-m3820_ss373hproxpress_sl-m3820_ss373zxpress_sl-m2626_ss329ascx-4650_ss172axpress_sl-m2671_ss332aproxpress_sl-c4010_ss216zproxpress_sl-m3825_ss376aproxpress_sl-m3820_ss373bml-6510_ss153amultixpress_sl-x3280_ss044ascx-5737_sw046aclx-6260_ss107aproxpress_sl-c3060_ss211jlaserjet_mfp_m439_7zb24alaserjet_mfp_m436_w7u02ascx-4521_sw129aclx-3300_sv677alaserjet_mfp_m440_8af47aproxpress_sl-c4010_ss215acolor_laser_mfp_170_4zb97aproxpress_sl-c3060_ss211kmultixpress_sl-k2200_ss024aclx-6260_sw177alaser_mfp_130_4zb88aml-5510_sv898aproxpress_sl-m3820_ss373cxpress_sl-m2876_ss356amultixpress_sl-x3220nr_ss043eclp-366_sv600alaser_mfp_130_6hu11axpress_sl-c480_ss256amultixpress_scx-8128_sw172ascx-4655_sv988alaserjet_mfp_m42523_7zb25ascx-3406_sv946ascx-4521_ss167axpress_sl-m2670_ss330aproxpress_sl-m3375fd_ss369amultixpress_scx-8128_ss019aproxpress_sl-c4010_ss216nproxpress_sl-c4010_ss216gproxpress_sl-m3820_ss373eproxpress_sl-m4020_ss383xproxpress_sl-m4075_ss392aproxpress_sl-c4010_ss216llaserjet_mfp_m436_2ky38ascx-3405_ss160axpress_sl-m2070_ss296aproxpress_sl-c4010_ss216uproxpress_sl-m3825_ss374alaserjet_mfp_m42625_8af49alaser_mfp_130_4zb93aproxpress_sl-m3820_ss371cmultixpress_sl-x7400_ss053asf-760_ss198aclp-365_ss067alaser_100_5ue14axpress_sl-m2675_ss335alaser_mfp_130_9vv52aproxpress_sl-m4020_4pt7blaser_mfp_130_6hu12amultixpress_sl-k7400_ss037aproxpress_sl-c3060_ss213cmultixpress_scx-8240_st717alaser_mfp_130_4zb92aproxpress_sl-m3820_ss373kscx-4833_ss180axpress_sl-c430_ss230ascx-4521_sv966aproxpress_sl-m3875_ss379alaser_mfp_130_4zb89alaserjet_mfp_m42625_8af51aproxpress_sl-m4020_ss383lproxpress_sl-m3820_ss375bproxpress_sl-c3010_ss210lmultixpress_sl-k7600_ss041aml-4512_ss142axpress_sl-m2675_ss334aml-5510_ss151amultixpress_scx-8240_sw185alaserjet_mfp_m437_7zb21ascx-3406_sv298aproxpress_sl-c4010_ss216tproxpress_sl-c3010_ss210bxpress_sl-m3015_ss360axpress_sl-m2870_ss348alaser_100_209u7aml-5510_ss150alaserjet_mfp_m438_8af43alaserjet_mfp_m72625-m72630_2zn49aproxpress_sl-m4530_ss397gxpress_sl-m2875_ss351aproxpress_sl-m4580_ss401aproxpress_sl-c3060_ss213escx-4521_sv969aml-5510_ss149aproxpress_sl-c3010_ss210dscx-3406_sv945amultixpress_sl-k4350_ss033aproxpress_sl-c4010_ss216ascx-3406_sv947axpress_sl-m2020_ss271aCertain HP LaserJet products and Samsung product printers, see Security Bulletin
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21476
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.96%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Computer Vision

Memory corruption when passing parameters to the Trusted Virtual Machine during the handshake.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwaresm8750p_firmwarewcn7880_firmwareqcs5430sm7635_firmwarewcn7850_firmwaresm8650p_firmwarewcn6650sm8550p_firmwarewcn7880sm7675_firmwaresm8550psm8550_firmwareqcn9012sm8635_firmwareqcs5430_firmwarewcn6755sg8275_firmwarewcn6750_firmwareqcm8550sm8650_firmwareqcs9100_firmwareqca6391sm8650q_firmwarewcn7860_firmwareqca6391_firmwarewcn7850wcn3950qcm5430_firmwaresm8750_firmwareqcs615wcn7851wcn7851_firmwarewcn7881_firmwareqcn9012_firmwaresm7675psm7635sm6650qcm6490wcn7860wcn6855sm8635p_firmwarewcn3910qca6698aqsm8635psxr2330pqcs9100sm7675wcn6750qcs8550_firmwarewcn6856_firmwaresg8275psm8650wcn3950_firmwarewcn7861wcn6855_firmwareqcn9274_firmwaresg8275wcn7881sm8650qwcn6755_firmwareqcs615_firmwarewcn3910_firmwareqcm5430qcm6490_firmwarewcn7861_firmwaresm8550qcs8550qcs6490_firmwaresg8275p_firmwarewcn6856sm8635sm8750psm8750qcs6490wcn6650_firmwaresm6650_firmwaresm7675p_firmwareqcn9011qcn9274sxr2330p_firmwaresm8650pqca6698aq_firmwareqcn9011_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21445
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.84%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:48
Updated-21 Jul, 2025 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Data HLOS - QX

Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6574au_firmwareqamsrv1h_firmwareqam8650pqam8620psa8255pqam8650p_firmwareqca6595qca6595au_firmwaresa8650p_firmwaresrv1m_firmwaresa7775psrv1mqca6696_firmwareqca6698aqsa8295psa8650pqca6696qam8295p_firmwareqam8775psa9000p_firmwaresa8540p_firmwaresrv1lqca6688aq_firmwaresrv1l_firmwaresa7255p_firmwareqca6595_firmwaresa8295p_firmwareqca6797aq_firmwaresa8620p_firmwaresa8775p_firmwaresrv1h_firmwareqca6698aq_firmwaresa8775pqam8620p_firmwaresa8770psrv1hqamsrv1msa7255pqam8295psa8255p_firmwareqca6574ausa8770p_firmwareqamsrv1m_firmwaresa8620pqamsrv1hqam8775p_firmwareqca6797aqsa9000pqca6688aqsa8540psa7775p_firmwareqam8255pqca6595auqam8255p_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-21780
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.06%
||
7 Day CHG~0.00%
Published-27 Feb, 2025 | 02:18
Updated-11 May, 2026 | 21:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() It malicious user provides a small pptable through sysfs and then a bigger pptable, it may cause buffer overflow attack in function smu_sys_set_pp_table().

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-1587
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 8.46%
||
7 Day CHG~0.00%
Published-23 Feb, 2025 | 15:00
Updated-14 May, 2025 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Telecom Billing Management System Add New Record main.cpp addrecords buffer overflow

A vulnerability was found in SourceCodester Telecom Billing Management System 1.0. It has been rated as critical. This issue affects the function addrecords of the file main.cpp of the component Add New Record. The manipulation of the argument name/phonenumber leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Action-Not Available
Vendor-razormistSourceCodester
Product-telecom_billing_management_systemTelecom Billing Management System
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-1372
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 13.06%
||
7 Day CHG~0.00%
Published-17 Feb, 2025 | 03:00
Updated-04 Nov, 2025 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GNU elfutils eu-readelf readelf.c print_string_section buffer overflow

A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.

Action-Not Available
Vendor-elfutils_projectGNU
Product-elfutilselfutils
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-0303
Matching Score-4
Assigner-OpenHarmony
ShareView Details
Matching Score-4
Assigner-OpenHarmony
CVSS Score-8.8||HIGH
EPSS-0.07% / 22.19%
||
7 Day CHG~0.00%
Published-07 Feb, 2025 | 09:21
Updated-12 Feb, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Liteos_a has a buffer overflow vulnerability

in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmony
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-26936
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 6.91%
||
7 Day CHG~0.00%
Published-01 May, 2024 | 05:26
Updated-11 May, 2026 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ksmbd: validate request buffer size in smb2_allocate_rsp_buf()

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate request buffer size in smb2_allocate_rsp_buf() The response buffer should be allocated in smb2_allocate_rsp_buf before validating request. But the fields in payload as well as smb2 header is used in smb2_allocate_rsp_buf(). This patch add simple buffer size validation to avoid potencial out-of-bounds in request buffer.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-57509
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 37.09%
||
7 Day CHG~0.00%
Published-29 Jan, 2025 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-57510
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.36%
||
7 Day CHG~0.00%
Published-29 Jan, 2025 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2011-2534
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.57%
||
7 Day CHG~0.00%
Published-22 Jun, 2011 | 23:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the clusterip_proc_write function in net/ipv4/netfilter/ipt_CLUSTERIP.c in the Linux kernel before 2.6.39 might allow local users to cause a denial of service or have unspecified other impact via a crafted write operation, related to string data that lacks a terminating '\0' character.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2011-1145
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.22% / 44.31%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 01:01
Updated-06 Aug, 2024 | 22:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.

Action-Not Available
Vendor-unixodbcunixodbcDebian GNU/LinuxRed Hat, Inc.openSUSE
Product-opensusedebian_linuxunixodbcenterprise_linuxunixodbc
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-8712
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.95%
||
7 Day CHG~0.00%
Published-13 Aug, 2020 | 02:42
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-compute_module_hns2600bpblc24rserver_system_r1304wt2gsrserver_system_lsvrp_firmwarecompute_module_hns2600tpfrserver_system_r2208wt2ysrserver_board_s2600wftserver_system_r2312wftzsrserver_system_r1000sp_firmwareserver_board_s2600kprserver_system_r1304wf0ysserver_system_r1304wf0ysrserver_system_r1304sposhbnserver_board_s2600kpfserver_system_lsvrp4304es6xx1server_board_s2600cwtserver_board_s2600kpcompute_module_hns2600bpbserver_board_s2600stbcompute_module_hns2600kprserver_system_r1208wttgsrserver_board_s2600cw2rserver_board_s2600wfqrcompute_module_hns2600tp24rserver_system_r2308wftzsserver_system_r2308wttysserver_system_r1000wf_firmwareserver_board_s2600wftrserver_system_r1304wt2gscompute_module_hns2600tprserver_system_r2208wf0zsserver_board_s2600kptrserver_board_s2600st_firmwareserver_system_r1208sposhorrcompute_module_hns2600tp_firmwareserver_board_s1200splserver_board_s2600cw2srserver_system_r1208wt2gsserver_board_s2600tpserver_system_r2208wttyc1rserver_board_s2600stqrcompute_module_hns2600bpblc24server_board_s2600cw2scompute_module_hns2600kp_firmwareserver_system_vrn2208wfaf83server_board_s2600cwtrserver_board_s1200spsserver_board_s2600bpqserver_system_r2208wt2ysserver_system_r1208wttgsserver_system_r1304wttgsserver_system_r2208wttysrserver_system_r1304sposhbnrserver_system_r2208wfqzsrserver_board_s2600tpfserver_board_s2600cwtsserver_system_lr1304sp_firmwareserver_system_r2312wf0nprserver_board_s2600wttrserver_board_s2600wt2server_system_r1208wfqysrserver_system_vrn2208wfhy6server_board_s2600stqserver_system_r2224wftzsserver_board_s2600wf0rserver_system_r2208wfqzsserver_system_nb2208wfqnfviserver_system_r2208wftzsserver_system_r2224wftzsrcompute_module_hns2600bpq24rserver_system_r2224wttysserver_board_s1200sp_firmwareserver_system_lr1304spcfg1rserver_system_lr1304spcfg1server_system_mcb2208wfaf5compute_module_hns2600bps24server_board_s2600bpsserver_board_s2600wt_firmwareserver_board_s2600bpqrserver_system_r2000wt_firmwareserver_system_r1208wt2gsrserver_system_vrn2208wfaf82compute_module_hns2600bpb24rserver_system_r1208wftysserver_system_r2000wf_firmwareserver_board_s2600cwserver_system_r2308wftzsrserver_system_lnetcnt3ycompute_module_s2600tp_firmwarecompute_module_hns2600bps24rserver_system_r1304wftysrserver_system_lsvrp4304es6xxrcompute_module_hns2600bpsrserver_board_s2600wt2rserver_system_mcb2208wfhy2server_board_s2600tpfrcompute_module_hns2600bpblcrserver_board_s2600cwtsrserver_system_r2224wfqzsserver_system_r2308wttysrcompute_module_hns2600tpfserver_system_r2312wftzsserver_system_vrn2208wfaf81server_board_s2600stbrcompute_module_hns2600bpqrserver_system_r2224wttysrserver_system_r2312wttyscompute_module_hns2600bpbrserver_system_r1208sposhorserver_board_s2600bp_firmwareserver_board_s2600bpbrserver_system_r1000wt_firmwareserver_board_s2600wttserver_board_s2600wf0compute_module_hns2600kpserver_system_r2312wfqzsserver_system_mcb2208wfaf6server_system_r1304wftysserver_system_r2208wttysserver_system_r1304sposhorrserver_system_vrn2208waf6compute_module_hns2600bp_firmwareserver_system_r1304sposhorcompute_module_hns2600tpcompute_module_hns2600kpfrcompute_module_hns2600bpqserver_board_s1200sporserver_board_s2600bpbserver_system_mcb2208wfaf4server_board_s1200splrserver_system_lr1304spcfsgx1compute_module_hns2600kpfcompute_module_hns2600bpblcserver_system_r2208wttyc1server_board_s2600cw2server_board_s1200sposerver_board_s2600wfqserver_board_s2600bpsrserver_system_r2312wf0npserver_system_r1304wttgsrserver_system_r2312wttysrserver_board_s2600kp_firmwareserver_system_r1208wttgsbppserver_board_s1200spsrcompute_module_hns2600bpsserver_system_r2208wf0zsrserver_board_s2600kpfrcompute_module_hns2600bpb24server_system_r2208wftzsrserver_system_r1208wftysrserver_board_s2600tprcompute_module_hns2600tp24srserver_board_s2600wf_firmwarecompute_module_hns2600bpq24Intel(R) Server Boards, Server Systems and Compute Modules Advisory
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • Previous
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • 8
  • Next
Details not found