Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-21815

Summary
Assigner-talos
Assigner Org ID-b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b
Published At-13 Aug, 2021 | 22:43
Updated At-03 Aug, 2024 | 18:23
Rejected At-
Credits

A stack-based buffer overflow vulnerability exists in the command-line-parsing HandleFileArg functionality of AT&T Labs' Xmill 0.7. Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to strcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow. An attacker can provide malicious input to trigger this vulnerability.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:talos
Assigner Org ID:b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b
Published At:13 Aug, 2021 | 22:43
Updated At:03 Aug, 2024 | 18:23
Rejected At:
▼CVE Numbering Authority (CNA)

A stack-based buffer overflow vulnerability exists in the command-line-parsing HandleFileArg functionality of AT&T Labs' Xmill 0.7. Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to strcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow. An attacker can provide malicious input to trigger this vulnerability.

Affected Products
Vendor
n/a
Product
AT&T
Versions
Affected
  • AT&T Labs Xmill 0.7
Problem Types
TypeCWE IDDescription
textN/Astack-based buffer overflow
Type: text
CWE ID: N/A
Description: stack-based buffer overflow
Metrics
VersionBase scoreBase severityVector
3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.0
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
x_refsource_MISC
Hyperlink: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
x_refsource_MISC
x_transferred
Hyperlink: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:talos-cna@cisco.com
Published At:13 Aug, 2021 | 23:15
Updated At:13 May, 2022 | 17:14

A stack-based buffer overflow vulnerability exists in the command-line-parsing HandleFileArg functionality of AT&T Labs' Xmill 0.7. Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to strcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow. An attacker can provide malicious input to trigger this vulnerability.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.07.8HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.0
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

att
att
>>xmill>>0.7
cpe:2.3:a:att:xmill:0.7:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280talos-cna@cisco.com
Exploit
Third Party Advisory
Hyperlink: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
Source: talos-cna@cisco.com
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1375Records found

CVE-2023-21499
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.2||HIGH
EPSS-0.03% / 6.42%
||
7 Day CHG~0.00%
Published-04 May, 2023 | 00:00
Updated-12 Feb, 2025 | 16:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write vulnerability in TA_Communication_mpos_encrypt_pin in mPOS TUI trustlet prior to SMR May-2023 Release 1 allows local attackers to execute arbitrary code.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devices
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21509
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.42%
||
7 Day CHG~0.00%
Published-04 May, 2023 | 00:00
Updated-12 Feb, 2025 | 16:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds Write vulnerability while processing BC_TUI_CMD_UPDATE_SCREEN in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 allows local attacker to execute arbitrary code.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-samsung_blockchain_keystoreSamsung Blockchain Keystore
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21040
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.94%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In buildCommand of bluetooth_ccc.cc, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238420277References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21637
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.50%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restrictions of Operations within the Bounds of a Memory Buffer in Linux

Memory corruption in Linux while calling system configuration APIs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_865_5gwsa8830wcd9380_firmwaresa6150p_firmwarewcn3990sa8145p_firmwaresw5100psd865_5gfastconnect_6800snapdragon_855\+\/860_firmwarewcd9360_firmwaresnapdragon_855wsa8835snapdragon_auto_5g_firmwarewcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_865\+_5gsnapdragon_x55_5gsnapdragon_wear_4100\+snapdragon_855_firmwaresxr2130qca6574asnapdragon_auto_5gsnapdragon_835_firmwareqca6426snapdragon_855\+\/860wcn3990_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980fastconnect_6200wcd9340_firmwarewcn3660bsd855wsa8815qca6320qca6426_firmwarewcn3660b_firmwareqca6320_firmwaresnapdragon_x55_5g_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6574a_firmwareqca6595aufastconnect_6200_firmwaresd835wcn3980_firmwareqca6391wcn3610_firmwareqca6420qca6436_firmwarewcd9360snapdragon_w5\+_gen_1_firmwaresnapdragon_xr2_5gsnapdragon_w5\+_gen_1aqt1000_firmwaresa6155p_firmwareqca6310snapdragon_wear_4100\+_firmwarefastconnect_6900fastconnect_6900_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresnapdragon_870_5gsa8155p_firmwarewcd9340sa8195pwsa8810_firmwarewcd9341_firmwaresw5100wsa8810qca6436wcd9335sa6155psw5100p_firmwaresnapdragon_865\+_5g_firmwaresa6145pwcn3680bsd835_firmwaresnapdragon_835sxr2130_firmwarewcd9341qca6696_firmwaresa8145pqca6696qca6391_firmwaresnapdragon_xr2_5g_firmwareaqt1000sa8150psa6150psdx55sa8155pwsa8830_firmwaresnapdragon_870_5g_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwarefastconnect_6800_firmwaresnapdragon_865_5g_firmwarewcn3610Snapdragon
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20967
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.26%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In avdt_scb_hdl_pkt_no_frag of avdt_scb_act.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-225879503

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21649
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 8.23%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:14
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN

Memory corruption in WLAN while running doDriverCmd for an unspecific command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610qca8337qca6431_firmwaremdm9628_firmwaremdm9650wcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwarewcd9370qca6426qca6584au_firmwaresm4375wcn3998qca6554a_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950mdm9628wcn3660bqca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3610_firmwareqca6420qca6436_firmwareqca6564au_firmwareqca6584ausa6155p_firmwaresdxr2_5gwcn3988_firmwareqca6430qcn9074sa6145p_firmwareqca6421sa8195pwsa8810_firmwaresm4375_firmwaresw5100qca6436wcn6851sa6155pwcd9385wcd9341qca6431qca6696_firmwaresd870_firmwareqca6390wcd9375aqt1000sa8150pwsa8830_firmwaresda429wsd855_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn3610wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresw5100pqca6554asd865_5gqca6595qca6564auqcc5100sdx55m_firmwarewsa8835qca6574wcd9380qcs410qca6574aqca6430_firmwarewcn3980qca6574_firmwaresd855wsa8815wcn6850mdm9650_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd695wcn3980_firmwareqca6391sdx55mqcc5100_firmwareqca6421_firmwareaqt1000_firmwaresd480_firmwarewcn6851_firmwareqca6574ausa8155p_firmwareqca6564a_firmwarewcd9341_firmwaresd480sd870wsa8810sw5100p_firmwareqcs610_firmwaresa6145pwcn3680bsd695_firmwareapq8096auqca6595_firmwaresa8145pqca6696qca6391_firmwarewcd9370_firmwaresa6150psdx55apq8096au_firmwaresa8155psw5100_firmwareqcn9074_firmwareqcs410_firmwareSnapdragonwcn3991_firmwareqca8337_firmwaresda429w_firmwaresa6150p_firmwarewcd9380_firmwaresa8145p_firmwareqca6431_firmwaresdx55m_firmwaremdm9628_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwareqca6584au_firmwareqca6430_firmwareqca6554a_firmwarewcd9385_firmwaresdxr2_5g_firmwareqca6574_firmwaremdm9650_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwarewcn3998_firmwarewcn3980_firmwarewcn3610_firmwareqca6436_firmwareqcc5100_firmwareqca6421_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwaresd480_firmwarewcn6851_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwaresm4375_firmwaresw5100p_firmwareqcs610_firmwaresd695_firmwareqca6696_firmwareqca6595_firmwaresd870_firmwareqca6391_firmwarewcd9370_firmwareapq8096au_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21451
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.47%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 00:00
Updated-24 Mar, 2025 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Stack-based overflow vulnerability in IpcRxEmbmsSessionList in SECRIL prior to Android S(12) allows attacker to cause memory corruptions.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devices
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21633
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.50%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux

Memory Corruption in Linux while processing QcRilRequestImsRegisterMultiIdentityMessage request.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6431sw5100psa6150p_firmwaresd865_5gsxr1120qca6595qcs610_firmwarewcd9335sxr2130_firmwarewcd9370snapdragon_730gqca6696wcd9341_firmwareqca6426snapdragon_720g_firmwareqca6564auwcn3610sm6250p_firmwarewsa8815_firmwaresnapdragon_865_5gsa8195p_firmwaresnapdragon_wear_4100\+_firmwareqca6426_firmwareqca6574au_firmwaresnapdragon_w5\+_gen_1qca6564_firmwaresm7250p_firmwareqam8295pwcd9341qca6574auvision_intelligence_400_firmwarewcn3950wsa8810_firmwaresd730_firmwaresnapdragon_690_5gsnapdragon_690_5g_firmwaresnapdragon_865\+_5gsnapdragon_765_5gwcn3660b_firmwaresd730fastconnect_6800_firmwaresa8295p_firmwaresnapdragon_855\+\/860sd_675_firmwaresd835_firmwaresnapdragon_865\+_5g_firmwaresm6250_firmwaresm7250psa8155snapdragon_768g_5g_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_710_firmwaresnapdragon_x50_5gsnapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaresw5100_firmwaresnapdragon_732gsnapdragon_710sxr1120_firmwaresnapdragon_730fastconnect_6800snapdragon_wear_4100\+snapdragon_765g_5g_firmwareqca6595_firmwarefastconnect_6900video_collaboration_vc1_platformwcd9371snapdragon_855\+\/860_firmwarewcd9385_firmwareqca6421fastconnect_6900_firmwaresnapdragon_670sa6145p_firmwaresa6155_firmwaresnapdragon_678_firmwaresa8155_firmwarewcd9380snapdragon_xr2_5gsa8150psnapdragon_732g_firmwaresnapdragon_765g_5gsnapdragon_x50_5g_firmwaremsm8996au_firmwaresa6155pqca6421_firmwareqca6564au_firmwarewsa8810snapdragon_670_firmwaresnapdragon_855_firmwaresw5100video_collaboration_vc3_platformqca6595auaqt1000snapdragon_678snapdragon_865_5g_firmwarewcd9326_firmwaresa6155p_firmwaresnapdragon_730g_firmwareqam8295p_firmwaresd855qca6431_firmwaresd835wcn3990_firmwaresnapdragon_750g_5gqca6564a_firmwareqca6436_firmwareqca6698aq_firmwarewcd9385wcd9371_firmwarewcn3610_firmwaresnapdragon_675_firmwareqca6420qca6430apq8064au_firmwaresm6250pwcd9370_firmwaresnapdragon_855sdx55_firmwaresnapdragon_x55_5gsnapdragon_765_5g_firmwarewcn3660bqca6574asxr2130sa8195psnapdragon_750g_5g_firmwaresnapdragon_870_5gqca6420_firmwareaqt1000_firmwaresnapdragon_x55_5g_firmwarewcn3988sd855_firmwarewcd9335_firmwarewcn3980_firmwareqca6436qca6574wsa8835qca6595au_firmwareqca6391_firmwaresd675_firmwareqca6430_firmwaresw5100p_firmwareqca6696_firmwarewcd9380_firmwaresnapdragon_820_firmwaresa6150pqca6574_firmwarewcd9326sa8155p_firmwarewsa8815qca6564asa8155pwsa8830snapdragon_870_5g_firmwaresa6145psnapdragon_730_firmwaresnapdragon_720gqca6574a_firmwaresdx55msm8996auqca6564sa6155snapdragon_820sd675wcd9375_firmwaresnapdragon_w5\+_gen_1_firmwareqca6391apq8064auqca6698aqwcn3950_firmwaresm6250sa8295psnapdragon_675fastconnect_6200sd670wcn3680bsa8145p_firmwaresd865_5g_firmwaresnapdragon_xr1wcd9375sa8150p_firmwarewcn3988_firmwaresnapdragon_768g_5gvideo_collaboration_vc3_platform_firmwaresa8145psd_675wcn3990vision_intelligence_400wsa8835_firmwaresd670_firmwarewcn3980fastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcs610Snapdragonqualcomm_video_collaboration_vc1_platform_firmwarewcd9380_firmwaresa6150p_firmwaresm6250p_firmwaresa8145p_firmwaremsm8996au_firmwareqca6431_firmwaresnapdragon_820_automotive_platform_firmwaresnapdragon_670_mobile_platform_firmwaresd670_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwaresd730_firmwaresd_675_firmwaresd675_firmwarewcn3990_firmwareqca6430_firmwarewcd9335_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9371_firmwarewcd9385_firmwarewcd9326_firmwareqca6574_firmwareqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3680b_firmwareqca6574au_firmwaresdx55_firmwarewcd9375_firmwaresa6155_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwaresnapdragon_690_5g_mobile_platform_firmwareapq8064au_firmwaresa8155_firmwarefastconnect_6900_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwaresw5100p_firmwareqcs610_firmwareqca6698aq_firmwaresd835_firmwareqca6564_firmwaresxr2130_firmwareqca6696_firmwareqca6595_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresm6250_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwarefastconnect_6800_firmwaresxr1120_firmwaresa8295p_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_675_mobile_platform_firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21663
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.48%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restrictions of Operations within the Bounds of a Memory Buffer in Display

Memory Corruption while accessing metadata in Display.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sda429w_firmwarewcd9380_firmwaresa6150p_firmwarewsa8830sa8145p_firmwaresw5100pqcc5100wcn6856_firmwarewsa8835sd_8_gen1_5gwcd9380sa8150p_firmwaresd888_5gqca6420_firmwarewcn6855_firmwareqca6430_firmwarewcn3980wcn3998wcd9385_firmwaresd_8_gen1_5g_firmwaresd855wcn3660bwcn6850wsa8815wcn3660b_firmwarewcn7850qca6574au_firmwarewcn3680b_firmwarewcn3998_firmwarewcn3980_firmwarewcn3610_firmwareqca6420qcc5100_firmwareaqt1000_firmwaresa6155p_firmwarewcn7851wcn6851_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100wsa8810wcn6855wcn6851sa6155psw5100p_firmwarewcn7851_firmwarewcn6856sa6145pwcn3680bwcd9385wcd9341qca6696_firmwaresa8145pqca6696aqt1000sa8150psa6150psa8155pwsa8830_firmwaresda429wsd855_firmwarewsa8815_firmwarewcn3988wsa8835_firmwaresd888_5g_firmwarewcn6850_firmwarewcn7850_firmwaresa8195p_firmwaresw5100_firmwarewcn3610Snapdragon
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21643
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.07% / 21.09%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:14
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in Automotive

Memory corruption due to untrusted pointer dereference in automotive during system call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6564au_firmwareqca6584ausa6155p_firmwaresa6150p_firmwaresa8145p_firmwaremsm8996au_firmwareapq8064au_firmwareqca6595qca6564ausa8155_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaremsm8996auqca6564a_firmwaresa8195psa8540p_firmwaresa8150p_firmwareqca6595au_firmwaresa6155sa6155psa8540psa8295p_firmwareqca6574asa6145pqca6584au_firmwareapq8096auqca6696_firmwareqca6595_firmwaresa8145pqca6696qam8295psa9000papq8064ausa8150psa6150papq8096au_firmwaresa8155pqam8295p_firmwaresa8155qca6574a_firmwaresa9000p_firmwareqca6574au_firmwaresa8195p_firmwareqca6595ausa6155_firmwareqca6564asa8295pSnapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20936
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.56%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In bta_av_rc_disc_done of bta_av_act.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-226927612

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-34678
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 10.61%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 02:17
Updated-12 Nov, 2024 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in libsapeextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21022
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.03%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BufferBlock of Suballocation.cpp, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236098131

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-33052
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.75%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 10:22
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in FM Host

Memory corruption when user provides data for FM HCI command control operations.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_wear_3100_firmwaresdm429w_firmwareqcm8550_firmwareapq8017sd865_5gqcs410_firmwarerobotics_rb3sa6150p_firmwaresnapdragon_632_mobilesnapdragon_6_gen_1_mobile_firmwaresxr1120qca6595qcs610_firmwarewcd9335wcd9370snapdragon_670_mobilesnapdragon_x50_5g_modem-rf_systemqca6696wcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700wcn3610snapdragon_208_firmwaresnapdragon_780g_5g_mobilevision_intelligence_200_firmwaresnapdragon_685_4g_mobilesa4150psnapdragon_782g_mobile_firmwarewsa8832_firmwareqca6426_firmwarewcd9395qca6574au_firmwaresnapdragon_690_5g_mobile_firmwareqca6564_firmwareqam8295pwcd9341sd626_firmwaresnapdragon_7\+_gen_2_mobile_firmwareqca6574ausnapdragon_820_automotive205_mobilesnapdragon_888\+_5g_mobile_firmwarewcd9390wsa8810_firmwaresd730_firmwarewsa8845h_firmwaresnapdragon_212_mobilemsm8209_firmwaresnapdragon_778g_5g_mobile_firmwaresa9000p_firmwarewcn3660b_firmwaresd730snapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430snapdragon_690_5g_mobilesd835_firmwaresnapdragon_636_mobile_firmwareqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_625_mobilesa8770pqcm6125_firmwaresnapdragon_678_mobile_firmwaresnapdragon_425_mobilesnapdragon_xr2_5g_firmwaresnapdragon_632_mobile_firmwaremsm8108snapdragon_xr1_firmwaresxr1120_firmwarefastconnect_6900video_collaboration_vc1_platformsm8635snapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200snapdragon_x55_5g_modem-rf_systemqca6310qam8255p_firmwaresa8155_firmwareqca6335qcs4490snapdragon_730_mobilesnapdragon_wear_3100snapdragon_680_4g_mobilewsa8845snapdragon_626_mobile_firmwaresa6155pqca6421_firmwareqcm6125snapdragon_212_mobile_firmwareqca6564au_firmwaresnapdragon_429_mobile_firmwarewsa8810video_collaboration_vc5_platform_firmwaresa9000psnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesxr2250p_firmwaresm7315_firmwaresnapdragon_wear_2500snapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwarewcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840qcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesd835snapdragon_8_gen_2_mobile_firmwaresnapdragon_4_gen_2_mobile_firmwareqca6436_firmwaresnapdragon_695_5g_mobile_firmwareqcs4490_firmwarewcn3910_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobileqca6420wcn3910wcd9370_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asnapdragon_8\+_gen_2_mobilewcn3620_firmwaresa8195pwcd9340qcs8250_firmwareqcm2290talynplussnapdragon_835_mobile_pc_firmwareqca6335_firmwareqcm6490sm8550p_firmwaresxr2250pqcm8550wcn3988snapdragon_765_5g_mobile_firmwaresnapdragon_662_mobilesa8775pqca6574215_mobilesxr2230p_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaresa8775p_firmwarewsa8845hsa6150pwcd9326qcs410qcm2290_firmwarevision_intelligence_100sa8155p_firmwaresnapdragon_630_mobilesa8155psnapdragon_765g_5g_mobile_firmwaresnapdragon_wear_2100_firmwarewsa8830smart_display_200_firmwaresnapdragon_855\+sm8550pqca6564asa6145psnapdragon_wear_2100snapdragon_768g_5g_mobile_firmwaresnapdragon_625_mobile_firmwaresa8255p_firmwaresnapdragon_7_gen_1_mobile_firmwaremsm8996ausnapdragon_208snapdragon_4_gen_2_mobileqca6564sa6155wcn3620qcm4325snapdragon_865\+_5g_mobile_firmwaresnapdragon_429_mobileqca6698aqwcn3950_firmwaresm6250snapdragon_480\+_5g_mobilesnapdragon_7\+_gen_2_mobilefastconnect_6200sd670wcn3680bsm7325p_firmwaresa8145p_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_210_firmwaresnapdragon_660_mobile_firmwaresa8150p_firmwarefastconnect_6700_firmwaresnapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresd670_firmwaresnapdragon_855_mobilesnapdragon_8_gen_3_mobilesnapdragon_210qcs6490qcs8250snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarewsa8830_firmwaresnapdragon_460_mobile_firmwarevision_intelligence_100_firmwareqca6431wsa8845_firmwaresd660_firmwarewsa8832snapdragon_480_5g_mobilesxr2130_firmwaresnapdragon_860_mobile_firmware205_mobile_firmwaresnapdragon_778g\+_5g_mobileqca6320sa4150p_firmwaremsm8608_firmwaresd888_firmwaremsm8209qca6564auqcs6125_firmwaresnapdragon_425_mobile_firmwarewsa8815_firmwaresa8195p_firmwareqcm4290msm8608snapdragon_xr2\+_gen_1qcm6490_firmwaresm7250p_firmwarewcn3680_firmwareqcm4490_firmwaresnapdragon_7_gen_1_mobilevision_intelligence_400_firmwarewcn3950qcs6125snapdragon_870_5g_mobile_firmwaresnapdragon_730g_mobile_firmwaresm8750snapdragon_7c\+_gen_3_computetalynplus_firmwaresnapdragon_732g_mobilesnapdragon_778g\+_5g_mobile_firmwaresa8295p_firmwaresnapdragon_870_5g_mobilesnapdragon_855\+_firmwaresmart_audio_200_firmwaresnapdragon_678_mobilesa4155p_firmwaresnapdragon_720g_mobilesm7250psm6250_firmwaresa8155sd888qca6320_firmwarewcn6755_firmwaresnapdragon_675_mobile_firmwaresnapdragon_wear_2500_firmwarewcn6740snapdragon_768g_5g_mobilesnapdragon_780g_5g_mobile_firmwareqca6310_firmwaresnapdragon_845_mobilesd626fastconnect_6800snapdragon_8_gen_3_mobile_firmwareqcs7230qca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesnapdragon_865_5g_mobile_firmwaresm8635_firmwarefastconnect_6900_firmwareapq8017_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psmart_audio_200snapdragon_xr2_5gsa8150pwcn6755msm8996au_firmwaresm7435_firmwarevideo_collaboration_vc3_platformaqt1000snapdragon_4_gen_1_mobile_firmwareqcm2150_firmware215_mobile_firmwareqam8295p_firmwaresd855qca6431_firmwarewcn3990_firmwaresm7315snapdragon_660_mobileqca6698aq_firmwareqcs2290qca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqcs2290_firmwaremsm8909w_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615snapdragon_8_gen_1_mobilesnapdragon_630_mobile_firmwaresnapdragon_680_4g_mobile_firmwarewcn3680wcn3610_firmwaresa8255pqcs7230_firmwareqcs4290wcd9390_firmwaresnapdragon_865\+_5g_mobileqca6430snapdragon_765_5g_mobilesnapdragon_860_mobilesdx55_firmwaresm8750_firmwarewcn3615_firmwaresxr2130msm8108_firmwareqcm4490snapdragon_480\+_5g_mobile_firmwaresnapdragon_6_gen_1_mobilesm7325psnapdragon_732g_mobile_firmwarevideo_collaboration_vc5_platformsnapdragon_670_mobile_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresdm429wsd855_firmwarewcd9335_firmwarewcn3980_firmwareqca6436wsa8835wsa8840_firmwareqca6391_firmwareqca6595au_firmwareqcs610qca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarewsa8815sd660sg4150psd_8_gen1_5gqam8775pqcm4325_firmwaresnapdragon_439_mobile_firmwaresm7435qca6574a_firmwaresdx55snapdragon_4_gen_1_mobileqcm4290_firmwaresnapdragon_720g_mobile_firmwaresnapdragon_865_5g_mobilesnapdragon_835_mobile_pcsd_8_gen1_5g_firmwarewcd9375_firmwareqca6391snapdragon_710_mobileqcs5430_firmwaresnapdragon_439_mobilesg4150p_firmwaresa8770p_firmwaresa8295psnapdragon_x50_5g_modem-rf_system_firmwareqcs8550fastconnect_7800snapdragon_626_mobileqam8775p_firmwaresd865_5g_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_xr1wcd9375snapdragon_765g_5g_mobilewcn3988_firmwaresnapdragon_636_mobilesa8145psnapdragon_8\+_gen_1_mobile_firmwarevision_intelligence_400wsa8835_firmwaresmart_display_200wcn3980msm8909wqcm2150wcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwareSnapdragonqam8255p_firmwaretalynplus_firmwaresnapdragon_662_mobile_platform_firmwaresa6150p_firmwaresa8145p_firmwaresxr2230p_firmwareqcs2290_firmwareqca6431_firmwaresnapdragon_820_automotive_platform_firmwaresnapdragon_wear_2100_platform_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwarewcn6755_firmwareqca6420_firmwareqca6595au_firmwaresd730_firmwareqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwarequalcomm_video_collaboration_vc3_platform_firmwaremsm8108_firmwarewcd9385_firmwarewcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwaresnapdragon_660_mobile_platform_firmwareqam8295p_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwaresnapdragon_429_mobile_platform_firmwaresa6155_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwaresm7250p_firmwarewcd9375_firmwarewcn3610_firmwarewsa8845h_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa6155p_firmwareqcm8550_firmwaresa8775p_firmwarewsa8840_firmwaresa4155p_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqcs8550_firmwarewcn3988_firmwaresa6145p_firmwarefastconnect_6700_firmwareapq8017_firmwaresd626_firmwaresnapdragon_626_mobile_platform_firmwarewsa8810_firmwaresm7435_firmwarewcd9395_firmwaresa8255p_firmwaresm8750_firmwareqca6698aq_firmwaremsm8209_firmwareqcs4290_firmwarequalcomm_205_mobile_platform_firmwaresa8770p_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_210_processor_firmwaresm6250_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresd660_firmwaresnapdragon_636_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresxr1120_firmwaresa8295p_firmwaresxr2250p_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcm6125_firmwaresnapdragon_675_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc1_platform_firmwarewcd9380_firmwareqcm2150_firmwaresnapdragon_778g_5g_mobile_platform_firmwaremsm8996au_firmwareqcs7230_firmwaresnapdragon_670_mobile_platform_firmwaremsm8909w_firmwaresd670_firmwaresdm429w_firmwaresnapdragon_7_gen_1_mobile_platform_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_425_mobile_platform_firmwaresm8635_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwareqca6335_firmwareqcm4325_firmwareqca6574_firmwarewcd9340_firmwarewcn3680b_firmwaresm7325p_firmwarewsa8845_firmwaresnapdragon_630_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcs4490_firmwaresnapdragon_632_mobile_platform_firmwarewcn3680_firmwareqcm6490_firmwarewsa8832_firmwarefastconnect_6900_firmwaresa8155p_firmwaresmart_audio_200_platform_firmwareqca6564a_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarequalcomm_215_mobile_platform_firmwaresd835_firmwareqca6564_firmwaresnapdragon_wear_2500_platform_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresa4150p_firmwaremsm8608_firmwaresm8550p_firmwarewcd9370_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwaresnapdragon_6_gen_1_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwaresnapdragon_wear_3100_platform_firmwareqcs410_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_625_mobile_platform_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21634
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.11%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:03
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in Radio Interface Layer

Memory Corruption in Radio Interface Layer while sending an SMS or writing an SMS to SIM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_855\+\/860_mobile_platform_firmwarewsa8830wcd9380_firmwaresa6150p_firmwarewcn3990sa8145p_firmwaresw5100psd865_5gfastconnect_6800snapdragon_w5\+_gen_1_wearable_platformsnapdragon_835_mobile_pc_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_865_5g_mobile_platformwsa8835wcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_wear_4100\+_platform_firmwaresnapdragon_855\+\/860_mobile_platformsxr2130snapdragon_wear_4100\+_platformqca6426wcn3990_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980fastconnect_6200wcd9340_firmwarewcn3660bsd855wsa8815qca6320snapdragon_865\+_5g_mobile_platformsnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6320_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn3680b_firmwarefastconnect_6200_firmwareqca6595ausd835wcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6391wcn3610_firmwareqca6420qca6436_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareaqt1000_firmwaresa6155p_firmwareqca6310snapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_xr2_5g_platformfastconnect_6900fastconnect_6900_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwarewcd9340sa8195pwsa8810_firmwarewcd9341_firmwaresw5100wsa8810qca6436wcd9335sa6155psw5100p_firmwaresa6145pwcn3680bsd835_firmwaresxr2130_firmwarewcd9341qca6696_firmwaresa8145pqca6696qca6391_firmwaresnapdragon_855_mobile_platform_firmwareaqt1000sa8150psa6150psa8155pwsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwarefastconnect_6800_firmwaresnapdragon_855_mobile_platformwcn3610Snapdragon
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20931
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.22%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-28 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In avdt_scb_hdl_write_req of avdt_scb_act.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-242535997

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21632
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 16.49%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:39
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Automotive GPU

Memory corruption in Automotive GPU while querying a gsl memory node.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6564au_firmwareqca6584ausa6155p_firmwaresa6150p_firmwaresa8145p_firmwaremsm8996au_firmwareapq8064au_firmwareqca6698aqqca6595qca6564ausa8155_firmwaresnapdragon_820_automotive_platform_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaremsm8996auqca6564a_firmwaresa8195psa8540p_firmwaresa8150p_firmwareqca6595au_firmwaresa6155sa6155psa8540psa8295p_firmwareqca6574aqca6698aq_firmwaresa6145pqca6584au_firmwareqca6696_firmwareqca6595_firmwaresa8145pqca6696qam8295psa9000papq8064ausa8150psa6150psa8155pqam8295p_firmwaresa8155qca6574a_firmwaresa9000p_firmwareqca6574au_firmwaresa8195p_firmwareqca6595ausa6155_firmwareqca6564asnapdragon_820_automotive_platformsa8295pSnapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21100
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.39%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In inflate of inflate.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-242544249

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21664
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.49%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking the Size of Input(Classic Buffer Overflow) in Core Platform

Memory Corruption in Core Platform while printing the response buffer in log.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresa6150p_firmwareqca8337qca6431_firmwaresdx65wcn3950_firmwareipq5028_firmwaresa8150p_firmwareqca6595au_firmwaresa6155qca6335qcs605_firmwaresd_675_firmwarewcn3998qam8295psd_8cx_gen2_firmwareqcn6024_firmwareqca8386_firmwarewcn3950sd_8_gen1_5g_firmwareqca8084_firmwareqsm8350_firmwareqsm8350sm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420sd_8cx_gen2qrb5165_firmwareipq5028qrb5165m_firmwareqca6698aqsa4155p_firmwaresa8155_firmwareqca6430sdx65mwcd9340qcn6132sd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcn7851_firmwareqca6698aq_firmwareqcn6122wcd9341qca6431qca6696_firmwaresd870_firmwareipq9008_firmwaresd_8cxsa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwaresd660_firmwarewcn7850_firmwaresa8195p_firmwaresa8295p_firmwarewcn6750_firmwareipq5018_firmwarewcn3991qca8337_firmwarewcd9380_firmwaressg2125pqca8084qca6564ausdx55m_firmwarewcn6856_firmwareipq9008sd670_firmwareqca6574wcd9380sdx50m_firmwaresxr1230psdx24_firmwareqca6430_firmwareqcn9012_firmwareqcn9274_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605wcd9340_firmwarewsa8815wcn6850qca6426_firmwareqcn9024ipq9574_firmwarewcn3980_firmwaresdx55msa8295pqca6421_firmwarewcn6740_firmwaresd678_firmwareqrb5165wcn6851_firmwareqcs603sd670qca6564a_firmwareqcn9024_firmwaresdx57msd870wsa8832wcn6855sa8540psa6145pqca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155psd675sdx70mssg2115p_firmwareqcs8155_firmwaresa4155par8035_firmwarewcn3991_firmwarewsa8830sd678qcn9070sa8145p_firmwaresxr2230p_firmwarefsm10056qca8082qcn9072qca8386sd765g_firmwareqca6420_firmwareqca6390_firmwarewcd9370sd675_firmwaressg2115pqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareipq5018qca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcd9326_firmwareqam8295p_firmwareqcn9011_firmwareqca8082_firmwaresa8155sa9000p_firmwaresdx55_firmwareqca6595auqcn6023_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwaresd778gsa6155p_firmwareqca6310qcn9274qcs8155wcn7851qcs6490sdxr2_5gqcn9074sa6145p_firmwareqca6421qca8085sd778g_firmwaresa8195pwsa8810_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023sdx65m_firmwareqca6174a_firmwarewcd9385qca8085_firmwareqcs6490_firmwaresd_8cx_gen3sdx70m_firmwarear8035qca6390wcd9375aqt1000qcn9100_firmwareipq5010_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca6564asa4150pwcn3990qcn9000sd_675sd780gsd865_5gqca6595sdx24qcn9012sd888qcn6122_firmwarewsa8835sxr1230p_firmwaresa8540p_firmwaresd_8_gen1_5gsd888_5gssg2125p_firmwareqca6574awcn6855_firmwareqca6174asm7325pqcn6132_firmwareqca6310_firmwarewcn6750sa9000pqca6574_firmwaresd855sm7325p_firmwaresxr2230psdx57m_firmwaresd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315qca6391aqt1000_firmwareqcn9100sdx65_firmwareqcm6490_firmwaresdx50mwsa8832_firmwareqcn9070_firmwareqcn9011qca6574ausa8155p_firmwareipq9574wcd9341_firmwarewsa8810wcn6856qca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresa6150pqcn9022_firmwareqcn6024qcn9022sd845qcn9072_firmwaresm7250pqcn9074_firmwaresd850Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20966
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.22%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In inflate of inflate.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-242299736

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-1906
Matching Score-4
Assigner-Meta Platforms, Inc.
ShareView Details
Matching Score-4
Assigner-Meta Platforms, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.62%
||
7 Day CHG~0.00%
Published-06 Oct, 2020 | 17:35
Updated-04 Aug, 2024 | 06:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow in WhatsApp for Android prior to v2.20.130 and WhatsApp Business for Android prior to v2.20.46 could have allowed an out-of-bounds write when processing malformed local videos with E-AC-3 audio streams.

Action-Not Available
Vendor-WhatsApp LLCFacebook
Product-whatsappwhatsapp_businessWhatsApp for AndroidWhatsApp Business for Android
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21628
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 16.49%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:39
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN HAL

Memory corruption in WLAN HAL while processing WMI-UTF command or FTM TLV1 command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaremdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca1023ar9380ipq8173_firmwareqcn5124mdm9645wcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155mdm8215home_hub_100_platformsd_455_firmwareapq8076qcs6125_firmwaresm4375wcn3998sc8180xp-adwcd9371_firmwarewcn3950qcn6024_firmwaresm4125immersive_home_316_platform_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm4250-aasnapdragon_636_mobile_platformwcn3998_firmwareqca8081_firmwareqca6420qca9986snapdragon_auto_5g_modem-rf_firmwareipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwareipq8072_firmwaresc8180xp-aa_firmwareqca0000sa8155_firmwarerobotics_rb3_platform_firmwareipq8068qca6430snapdragon_630_mobile_platformwcd9340snapdragon_808_processorqca6698aq_firmwaresnapdragon_808_processor_firmwarewcn685x-1_firmwaremdm9250_firmwareqca9888_firmwareqcn6122sm8150_firmwaresnapdragon_810_processor_firmwareqca6696_firmwarewcd9371sc8180x-abqcn5154_firmwaremdm8215_firmwaresm4350_firmwaresd_8cxsa8150pqca9992_firmwaresd660sm7225_firmwaresd660_firmwareqcn5121qcn5022_firmwarewcn6750_firmwareqcn7606_firmwaresm6125_firmwareimmersive_home_216_platform_firmwareqca4010_firmwaresnapdragon_675_mobile_platform_firmwareqca6428_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca4531_firmwareqca9980_firmwareipq8078ipq8173sd670_firmwareqca6574csr8811_firmwarewcd9380qcs410qcn5024qca9379_firmwaresc8180xp-ad_firmwareqca9985qcn9012_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815sm6150-ac_firmwareqca6584_firmwaresnapdragon_630_mobile_platform_firmwaremdm9215_firmwareipq6028ipq8064sd835snapdragon_821_mobile_platformqca1990wcn3980_firmwaresd730sc7180-ac_firmwaresm6350qcn5064_firmwareqcs4490_firmwareapq8064au_firmwareipq8078_firmwareqcn5054qca9994sm6350_firmwareqca9980sd670qcn9024_firmwareipq8174_firmwaresmart_audio_200_platform_firmwareqcm4290_firmwareqcn7605_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031immersive_home_214_platformqca1023_firmwaresd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640snapdragon_x20_lte_modemqca9379sa4155pqcn7606wsa8830qca9561sdm712_firmwaresnapdragon_850_mobile_compute_platformsnapdragon_x24_lte_modem_firmwarecsrb31024mdm9628_firmwaremdm9650qca9992qcs4290snapdragon_x20_lte_modem_firmwaremdm9250qca6420_firmwaresc7180-acsnapdragon_auto_4g_modem_firmwaremdm9310_firmwaresd675_firmwareipq8072qca6564wcn3990_firmwareqca9984_firmwareqca9377qca4531wcd9385_firmwarewcd9326_firmwarewcn3615_firmwareipq8074aqca9982apq8094sa8155snapdragon_x55_5g_modem-rf_systemqca6584snapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqca6584auqfe1952sm6225ipq8174qcn5052qca9367apq8092wcn3988_firmwareqcn9074sm7250-aasa8195psxr1120sdm710_firmwaresm4375_firmwarewcd9326wcd9335qca9982_firmwareqcm4490qcn6023qcs4290_firmwaresm7150-abqca6390qca9898_firmwarewcd9375aqt1000sc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_662_mobile_platformapq8092_firmwareipq5010_firmwareipq8074a_firmwaresm8150wsa8815_firmwaresnapdragon_636_mobile_platform_firmwareapq8017sxr1120_firmwareqcm6125_firmwaresnapdragon_x5_lte_modemqca9882qca6595ipq8065_firmwareqcn5154qca8075_firmwaresc8180xp-acsmart_audio_400_platformipq6005_firmwarewcn685x-5_firmwareqcn6132_firmwaresdm670_firmwareqca9888qca6310_firmwareapq8094_firmwareipq8070a_firmwaremdm9615qca6574_firmwareqca9886qca6175aqca6574a_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaremdm9310snapdragon_auto_4g_modemcsrb31024_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwarewcn685x-5ipq6028_firmwareipq8072a_firmwareqca9531sc8180xp-af_firmwareqca9889_firmwareqcn5122mdm9645_firmwaresdx20m_firmwaresm7250-aa_firmwaresc8180x-aa_firmwaresm8150-ac_firmwareqcn5022sc8180x-aaqca6564_firmwaresc8180x-af_firmwaresm6150-acsnapdragon_x50_5g_modem-rf_systemqca8075qcn6024qcn9022mdm9615_firmwareipq6000_firmwareqcs410_firmwareqca6175a_firmwaresdm660_firmwaresa6150p_firmwareqcs610qcn5550sc8180x-ab_firmwarewcd9360_firmwaresnapdragon_820_automotive_platform_firmwareqca9561_firmwareqca4024_firmwareimmersive_home_318_platform_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335sdm712qcn5064sdm670csra6620_firmwaresd_675_firmwarecsra6640_firmwarewcn685x-1qca6554a_firmwareipq8076amdm9628sm7150-acqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresm6225-adwcd9360sdx20mqca6438_firmwaresc8180xp-afsmart_audio_400_platform_firmwarewcn3999sm6225-ad_firmwareipq5028qca7500ipq4029_firmwareqca6698aqqcs6125sa4155p_firmwareipq6010sd662_firmwaresm7250-ab_firmwarerobotics_rb3_platformqcn6132snapdragon_820_mobile_platformqca1990_firmwaresw5100home_hub_100_platform_firmwaresa6155pwcd9341ipq8068_firmwaresc8180xp-ab_firmwaresnapdragon_x12_lte_modemwcn3910_firmwareqfe1922wsa8830_firmwaresd855_firmwarewcn3988qca6438sm4250-aa_firmwaresa8195p_firmwareqca9898ipq4028wcn3610mdm9640wcd9380_firmwareipq8072aqca7500_firmwaresw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platformqca6564auqcn5164qca9558sc8180xp-aaqcn5054_firmwareipq4019_firmwaresm7150-aa_firmwaresc8180x-ac_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwaresm7225wcn3910qca6320mdm9650_firmwareqca9986_firmwaresm4450wcn3660b_firmwareqca9984sc8180x-adqcn9024qcn5550_firmwarewcd9330_firmwareipq8064_firmwaresm7150-aasnapdragon_820_automotive_platformsnapdragon_x50_5g_modem-rf_system_firmwaresm7125smart_audio_200_platformsd821_firmwaresnapdragon_652_mobile_platformar8031_firmwaresm7150-ab_firmwareipq8070sdm660qca9887_firmwaresdm710qca6564a_firmwareqca9880snapdragon_x24_lte_modemqcn5121_firmwaresc8180xp-ac_firmwarewsa8832snapdragon_810_processoripq6018qcs4490qca6595_firmwaresa8145pimmersive_home_214_platform_firmwaresm4350-ac_firmwaresa8155psd675qca9531_firmwarear8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresnapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwaresm6125qcs2290_firmwarecsra6620qcn9072sm7250-ac_firmwareqca9880_firmwareqca6390_firmwareipq8069_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca0000_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwaresd_8cx_firmwareqcn7605immersive_home_216_platformimmersive_home_316_platformimmersive_home_318_platformsd662qcn5124_firmwareqfe1952_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwaresm4350-acsnapdragon_w5\+_gen_1_wearable_platform_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310snapdragon_821_mobile_platform_firmwareqca9990snapdragon_x5_lte_modem_firmwaresd821vision_intelligence_300_platform_firmwaresa6145p_firmwaresm6250apq8017_firmwarewsa8810_firmwarevision_intelligence_400_platformsc7180-adqca4010sg4150pqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385snapdragon_x12_lte_modem_firmwaresc8180x-acar8035csr8811apq8064auipq4019qcn9100_firmwarevision_intelligence_400_platform_firmwaresd820wsa8835_firmwareqca6564asa4150psg4150p_firmwareqcm4325qcm2290_firmwaresnapdragon_845_mobile_platformwcn3990qcn9000sd_675qca6554aar9380_firmwaresnapdragon_835_mobile_pc_platformsm8150-acqcn9012qca9558_firmwareqcn6122_firmwarewsa8835msm8996ausc7180-ad_firmwaresnapdragon_auto_5g_modem-rfsm6250pipq4018qca6574aqca9889qca6174asc8180x-afipq8074wcn6750qca9994_firmwareipq8076_firmwaresm7150-ac_firmwaresm7250-absd855sm4125_firmwareipq8076qfe1922_firmwareqca9887qcn5021ipq8069qcn5152vision_intelligence_300_platformsd460qca6391ipq6005aqt1000_firmwareqcn9100qcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290qca9882_firmwaremdm9215sd_455sm6225_firmwareipq8074_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125wsa8810sm7250-acwcn3680bsd835_firmwaresnapdragon_675_mobile_platformipq6010_firmwareqca6696sm4350sm7125_firmwaresa6150psc8180xp-abqcn9022_firmwareqca9990_firmwareipq8070asnapdragon_652_mobile_platform_firmwaresc8180x-ad_firmwareqcn9072_firmwaresnapdragon_820_mobile_platform_firmwaresm7250pipq8071_firmwareqcn9074_firmwaresw5100_firmwareipq4029snapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21506
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.42%
||
7 Day CHG~0.00%
Published-04 May, 2023 | 00:00
Updated-12 Feb, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds Write vulnerability while processing BC_TUI_CMD_SEND_RESOURCE_DATA_ARRAY command in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 allows local attacker to execute arbitrary code.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-samsung_blockchain_keystoreSamsung Blockchain Keystore
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21648
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 8.81%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 09:14
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow to Buffer Overflow in RIL

Memory corruption in RIL while trying to send apdu packet.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sda429w_firmwarewsa8830sa6150p_firmwaresa8145p_firmwaresw5100pqcc5100wcd9360_firmwarewsa8835sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6574aqca6430_firmwarewcn3980wcn3998sa515msd855wcn3660bwsa8815wcn3660b_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn3980_firmwareqca6391wcn3610_firmwarewcd9360qca6420qcc5100_firmwareaqt1000_firmwaresa6155p_firmwaresa515m_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100wsa8810sa6155psw5100p_firmwaresa6145pwcn3680bwcd9341qca6696_firmwaresa8145pqca6696qca6391_firmwareaqt1000sa8150psa6150psdx55sa8155pwsa8830_firmwaresda429wsd855_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwarewcn3610Snapdragon
CWE ID-CWE-680
Integer Overflow to Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-2124
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-15 May, 2023 | 00:00
Updated-02 Aug, 2024 | 06:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-debian_linuxlinux_kernelh500sh410s_firmwareh700s_firmwareh300s_firmwareh410c_firmwareh500s_firmwareh410sh410ch300sh700sKernel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21639
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.50%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking the Size of Input in Audio

Memory corruption in Audio while processing sva_model_serializer using memory size passed by HIDL client.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-aqt1000_firmwaresnapdragon_w5\+_gen_1sa6155p_firmwarewsa8830sw5100psa4155p_firmwaresnapdragon_855\+\/860_firmwarewcn3988_firmwareqca6430snapdragon_855sa8155p_firmwarewsa8835sa8195pwsa8810_firmwarewcd9341_firmwareqca6420_firmwaresw5100wsa8810sa6155psw5100p_firmwaresnapdragon_855_firmwarewcd9341snapdragon_855\+\/860qca6430_firmwarewcn3980sa4150p_firmwarefastconnect_6200aqt1000sd855wsa8815sa8155pwsa8830_firmwaresd855_firmwarewcn3988wsa8815_firmwarewsa8835_firmwarefastconnect_6200_firmwaresa8195p_firmwaresw5100_firmwarewcn3980_firmwaresa4155pqca6420sa4150psnapdragon_w5\+_gen_1_firmwareSnapdragonaqt1000_firmwaresa6155p_firmwareqca6430_firmwaresa4155p_firmwaresa4150p_firmwaresnapdragon_855_mobile_platform_firmwarewcn3988_firmwarewsa8830_firmwaresa8155p_firmwaresd855_firmwarewsa8815_firmwarewsa8835_firmwarewsa8810_firmwarefastconnect_6200_firmwarewcd9341_firmwaresa8195p_firmwareqca6420_firmwaresw5100_firmwarewcn3980_firmwaresw5100p_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-33042
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.75%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 10:22
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in FM Host

Memory corruption when Alternative Frequency offset value is set to 255.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_wear_3100_firmwaresdm429w_firmwareqcm8550_firmwareapq8017sd865_5gqcs410_firmwarerobotics_rb3sa6150p_firmwaresxr1120qca6595qcs610_firmwaresnapdragon_8\+_gen_1wcd9335wcd9370snapdragon_730gsnapdragon_429_firmwaresnapdragon_x50_5g_modem-rf_systemqca6696wcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqca6426wcn6740_firmwaresnapdragon_720g_firmwarefastconnect_6700wcn3610snapdragon_208_firmwarevision_intelligence_200_firmwaresnapdragon_695_5gsa4150psnapdragon_888_5gwsa8832_firmwareqca6426_firmwarewcd9395snapdragon_4_gen_2_firmwareqca6574au_firmwareqca6564_firmwareqam8295pwcd9341sd626_firmwareqca6574ausnapdragon_820_automotivewcd9390wsa8810_firmwaresd730_firmwarewsa8845h_firmwaresnapdragon_429msm8209_firmwaresa9000p_firmwaresnapdragon_690_5gsnapdragon_778g\+_5g_firmwaresnapdragon_865\+_5gsnapdragon_765_5gwcn3660b_firmwaresd730snapdragon_626snapdragon_8\+_gen_2snapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430snapdragon_865\+_5g_firmwaresd835_firmwareqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_888\+_5g_firmwaresnapdragon_636_firmwaresa8770pqcm6125_firmwaresnapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaremsm8108sxr1120_firmwaresnapdragon_710snapdragon_730snapdragon_765g_5g_firmwaresnapdragon_660_firmwaresnapdragon_4_gen_2fastconnect_6900snapdragon_8_gen_2_firmwarevideo_collaboration_vc1_platformsm8635wcd9385_firmwareqca6421vision_intelligence_200snapdragon_x55_5g_modem-rf_systemqca6310qam8255p_firmwaresnapdragon_778g_5gsnapdragon_670snapdragon_678_firmwaresa8155_firmwareqca6335qcs4490snapdragon_732g_firmwaresnapdragon_662_firmwaresnapdragon_7\+_gen_2_firmwaresnapdragon_wear_3100wsa8845sa6155pqca6421_firmwareqcm6125qca6564au_firmwarewsa8810205video_collaboration_vc5_platform_firmwaresa9000psnapdragon_855_firmwaresnapdragon_670_firmwaresnapdragon_678qca6595ausxr2250p_firmwaresm7315_firmwaresnapdragon_wear_2500snapdragon_865_5g_firmwarewcd9326_firmwaresa6155p_firmwaresnapdragon_730g_firmwarewsa8840qcs8550_firmwaresd835qca6436_firmwareqcs4490_firmwarewcn3910_firmwaresnapdragon_675_firmwaresnapdragon_680_4gqca6420wcn3910snapdragon_212_firmwarewcd9370_firmwaresnapdragon_8_gen_2snapdragon_480\+_5g_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_765_5g_firmwarewcn3660bqca6574awcn3620_firmwaresa8195psnapdragon_695_5g_firmwarewcd9340qcs8250_firmwareqcm2290talynplussnapdragon_835_mobile_pc_firmwareqca6335_firmwareqcm6490215sm8550p_firmwaresxr2250pqcm8550wcn3988sa8775pqca6574sxr2230p_firmwareqca6430_firmwaresa8775p_firmwaresnapdragon_439_firmwarewsa8845hsa6150pwcd9326qcs410qcm2290_firmwarevision_intelligence_100sa8155p_firmwareqca6564asa8155psnapdragon_wear_2100_firmwarewsa8830snapdragon_870_5g_firmwaresmart_display_200_firmwaresnapdragon_855\+sm8550psa6145psnapdragon_wear_2100snapdragon_6_gen_1sa8255p_firmwaresnapdragon_888\+_5gsnapdragon_720gmsm8996ausnapdragon_208qca6564sa6155wcn3620qcm4325snapdragon_860snapdragon_782gqca6698aqwcn3950_firmwaresm6250fastconnect_6200sd670wcn3680bsm7325p_firmwaresa8145p_firmwaresnapdragon_210_firmwaresnapdragon_630sa8150p_firmwarefastconnect_6700_firmwaresnapdragon_768g_5gvideo_collaboration_vc3_platform_firmwaresnapdragon_7_gen_1_firmwarerobotics_rb3_firmwaresnapdragon_778g_5g_firmwarewcn3990snapdragon_780g_5gsd670_firmwareqcs6490qcs8250snapdragon_210snapdragon_778g\+_5gfastconnect_6200_firmwarewsa8830_firmwarevision_intelligence_100_firmwareqca6431wsa8845_firmwaresd660_firmwaresnapdragon_7c\+_gen_3wsa8832sxr2130_firmwaresnapdragon_680_4g_firmwareqca6320sa4150p_firmwaremsm8608_firmwaresd888_firmwareqcm2150snapdragon_845_firmwaresnapdragon_630_firmwaremsm8209snapdragon_439qca6564auqcs6125_firmwaresnapdragon_460snapdragon_636wsa8815_firmwaresnapdragon_865_5gsa8195p_firmwareqcm4290snapdragon_480_5g_firmwaresnapdragon_4_gen_1_firmwaremsm8608snapdragon_685_4gsnapdragon_7\+_gen_2snapdragon_xr2\+_gen_1qcm6490_firmwaresnapdragon_626_firmwaresm7250p_firmwarewcn3680_firmware205_firmwareqcm4490_firmwarevision_intelligence_400_firmwarewcn3950qcs6125snapdragon_690_5g_firmwaresm8750talynplus_firmwaresa8295p_firmwaresnapdragon_460_firmwaresnapdragon_855\+_firmwaresnapdragon_7_gen_1smart_audio_200_firmwaresa4155p_firmwaresm7250psm6250_firmwaresa8155snapdragon_768g_5g_firmwaresnapdragon_710_firmwaresd888qca6320_firmwarewcn6755_firmwaresnapdragon_wear_2500_firmwarewcn6740snapdragon_732gqca6310_firmwaresd626fastconnect_6800snapdragon_662qcs7230qca6595_firmwarefastconnect_7800_firmwaresm8635_firmwarefastconnect_6900_firmwareapq8017_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psmart_audio_200snapdragon_xr2_5gsa8150pwcn6755215_firmwaresnapdragon_888_5g_firmwaresnapdragon_765g_5gsnapdragon_8\+_gen_2_firmwaremsm8996au_firmwaresm7435_firmwarevideo_collaboration_vc3_platformaqt1000qcm2150_firmwareqam8295p_firmwaresd855qca6431_firmwaresnapdragon_8_gen_1_firmwaresnapdragon_632_firmwarewcn3990_firmwaresm7315snapdragon_6_gen_1_firmwareqca6698aq_firmwareqcs2290qca6564a_firmwarewcd9385msm8909w_firmwareqcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615wcn3610_firmwarewcn3680snapdragon_8_gen_1sa8255pqcs7230_firmwareqcs4290wcd9390_firmwaresnapdragon_8_gen_3qca6430snapdragon_782g_firmwaresnapdragon_855sdx55_firmwaresnapdragon_625_firmwaresm8750_firmwarewcn3615_firmwaresxr2130msm8108_firmwareqcm4490snapdragon_4_gen_1snapdragon_870_5gsnapdragon_480\+_5gsm7325psnapdragon_685_4g_firmwaresnapdragon_845video_collaboration_vc5_platformqca6420_firmwaresnapdragon_625aqt1000_firmwareqcs6490_firmwaresnapdragon_480_5gsdm429wsd855_firmwarewcd9335_firmwarewcn3980_firmwareqca6436wsa8835wsa8840_firmwareqca6391_firmwareqca6595au_firmwareqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarewsa8815sd660sg4150psd_8_gen1_5gqam8775psnapdragon_860_firmwaresnapdragon_730_firmwareqcm4325_firmwaresm7435snapdragon_632snapdragon_660qca6574a_firmwaresdx55qcm4290_firmwaresnapdragon_835_mobile_pcsnapdragon_8\+_gen_1_firmwaresd_8_gen1_5g_firmwaresnapdragon_8_gen_3_firmwaresnapdragon_7c\+_gen_3_firmwareqca6391wcd9375_firmwareqcs5430_firmwaresg4150p_firmwaresnapdragon_780g_5g_firmwaresa8770p_firmwaresa8295psnapdragon_x50_5g_modem-rf_system_firmwareqcs8550snapdragon_675fastconnect_7800qam8775p_firmwaresd865_5g_firmwaresnapdragon_425_firmwaresnapdragon_xr1wcd9375wcn3988_firmwaresa8145psnapdragon_212vision_intelligence_400wsa8835_firmwaresmart_display_200wcn3980msm8909wsnapdragon_425wcn3680b_firmwareqcs610Snapdragonqam8255p_firmwaretalynplus_firmwaresnapdragon_662_mobile_platform_firmwaresa6150p_firmwaresa8145p_firmwaresxr2230p_firmwareqcs2290_firmwareqca6431_firmwaresnapdragon_820_automotive_platform_firmwaresnapdragon_wear_2100_platform_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwarewcn6755_firmwareqca6420_firmwareqca6595au_firmwaresd730_firmwareqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwarequalcomm_video_collaboration_vc3_platform_firmwaremsm8108_firmwarewcd9385_firmwarewcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwaresnapdragon_660_mobile_platform_firmwareqam8295p_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwaresnapdragon_429_mobile_platform_firmwaresa6155_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwaresm7250p_firmwarewcd9375_firmwarewcn3610_firmwarewsa8845h_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa6155p_firmwareqcm8550_firmwaresa8775p_firmwarewsa8840_firmwaresa4155p_firmwaresa8155_firmwarerobotics_rb3_platform_firmwareqcs8550_firmwarewcn3988_firmwaresa6145p_firmwarefastconnect_6700_firmwareapq8017_firmwaresd626_firmwaresnapdragon_626_mobile_platform_firmwarewsa8810_firmwaresm7435_firmwarewcd9395_firmwaresa8255p_firmwaresm8750_firmwareqca6698aq_firmwaremsm8209_firmwareqcs4290_firmwarequalcomm_205_mobile_platform_firmwaresa8770p_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_210_processor_firmwaresm6250_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresd660_firmwaresnapdragon_636_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresxr1120_firmwaresa8295p_firmwaresxr2250p_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcm6125_firmwaresnapdragon_675_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc1_platform_firmwarewcd9380_firmwareqcm2150_firmwaresnapdragon_778g_5g_mobile_platform_firmwaremsm8996au_firmwareqcs7230_firmwaresnapdragon_670_mobile_platform_firmwaremsm8909w_firmwaresd670_firmwaresdm429w_firmwaresnapdragon_7_gen_1_mobile_platform_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_425_mobile_platform_firmwaresm8635_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwareqca6335_firmwareqcm4325_firmwareqca6574_firmwarewcd9340_firmwarewcn3680b_firmwaresm7325p_firmwarewsa8845_firmwaresnapdragon_630_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcs4490_firmwaresnapdragon_632_mobile_platform_firmwarewcn3680_firmwareqcm6490_firmwarewsa8832_firmwarefastconnect_6900_firmwaresa8155p_firmwaresmart_audio_200_platform_firmwareqca6564a_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarequalcomm_215_mobile_platform_firmwaresd835_firmwareqca6564_firmwaresnapdragon_wear_2500_platform_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresa4150p_firmwaremsm8608_firmwaresm8550p_firmwarewcd9370_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwaresnapdragon_6_gen_1_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwaresnapdragon_wear_3100_platform_firmwareqcs410_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_625_mobile_platform_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21255
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.90%
||
7 Day CHG~0.00%
Published-12 Jul, 2023 | 23:33
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Debian GNU/LinuxGoogle LLC
Product-androiddebian_linuxAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21640
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.50%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-26 Nov, 2024 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Linux

Memory corruption in Linux when the file upload API is called with parameters having large buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800wsa8830_firmwarewcd9380_firmwarewsa8830wsa8835snapdragon_8_gen_1wsa8835_firmwarewcd9380fastconnect_7800_firmwarefastconnect_6900fastconnect_6900_firmwaresnapdragon_8_gen_1_firmwareSnapdragonsnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21508
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.42%
||
7 Day CHG~0.00%
Published-04 May, 2023 | 00:00
Updated-12 Feb, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds Write vulnerability while processing BC_TUI_CMD_SEND_RESOURCE_DATA command in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 allows local attacker to execute arbitrary code.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-samsung_blockchain_keystoreSamsung Blockchain Keystore
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21654
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.48%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:23
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in Audio

Memory corruption in Audio during playback session with audio effects enabled.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9150_firmwarewsa8830sda429w_firmwaresa6150p_firmwarewcd9380_firmwaresa8145p_firmwareqcs610sw5100pmsm8996au_firmwaresd865_5gqca6564auqcc5100sdx55m_firmwaremdm9628_firmwarewsa8835msm8996auwcn3950_firmwarewcd9380sa8150p_firmwareqca6420_firmwareqca6390_firmwareqcs410wcd9370qca6574aqca6426qca6564aqca6430_firmwarewcn3980sa415mwcn3998qam8295psdxr2_5g_firmwarewcn3950mdm9628wcn3660bsd855wsa8815wcn6850qam8295p_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcn3998_firmwarewcn3980_firmwareqca6391wcn3610_firmwareqca6420qca6436_firmwaresdx55msa8295pqcc5100_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwaresdxr2_5gwcn6851_firmwaresa415m_firmwarewcn3988_firmwareqca6430qca6574auqcn9074sa6145p_firmwaresa8155p_firmwareqca6564a_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100wsa8810sd870qca6436wcn6851sa6155psw5100p_firmwareqcs610_firmwaremdm9150qsm8250sa6145pwcn3680bwcd9341apq8096auqca6696_firmwaresa8145psd870_firmwareqca6696qca6391_firmwareqca6390wcd9370_firmwareaqt1000sa8150psa6150psdx55apq8096au_firmwarewsa8830_firmwaresda429wsa8155psd855_firmwaresd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwareqcn9074_firmwareqcs410_firmwaresa8295p_firmwarewcn3610qsm8250_firmwareSnapdragon
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21635
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.50%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input in Data Network Stack & Connectivity

Memory Corruption in Data Network Stack & Connectivity when sim gets detected on telephony.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_865_5gwsa8830wcd9380_firmwaresa6150p_firmwaresa8145p_firmwaresw5100psd865_5gfastconnect_6800snapdragon_855\+\/860_firmwareqca6564aucsrb31024snapdragon_855wsa8835wcd9380sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_865\+_5gsnapdragon_x55_5gsnapdragon_wear_4100\+snapdragon_855_firmwaresxr2130qca6574aqca6564qca6426snapdragon_855\+\/860qca6430_firmwarewcn3980fastconnect_6200wcn3660bsd855wsa8815qca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresnapdragon_x55_5g_firmwareqca6574au_firmwarewcn3680b_firmwarefastconnect_6200_firmwareqca6595auwcn3980_firmwareqca6391wcn3610_firmwareqca6420qca6436_firmwaresnapdragon_w5\+_gen_1_firmwaresnapdragon_xr2_5gsnapdragon_w5\+_gen_1qca6564au_firmwareaqt1000_firmwaresa6155p_firmwaresnapdragon_wear_4100\+_firmwarecsrb31024_firmwarefastconnect_6900fastconnect_6900_firmwarewcn3988_firmwareqca6430qca6574ausa6145p_firmwaresnapdragon_870_5gsa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresw5100wsa8810qca6436sa6155psw5100p_firmwaresnapdragon_865\+_5g_firmwaresa6145pwcn3680bqca6564_firmwaresxr2130_firmwarewcd9341snapdragon_auto_4gqca6696_firmwaresa8145pqca6696qca6391_firmwaresnapdragon_xr2_5g_firmwareaqt1000sa8150psnapdragon_auto_4g_firmwaresa6150psa8155pwsa8830_firmwaresnapdragon_870_5g_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwarefastconnect_6800_firmwaresnapdragon_865_5g_firmwarewcn3610Snapdragonaqt1000_firmwareqca6564au_firmwaresa6155p_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwarecsrb31024_firmwarefastconnect_6900_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewsa8810_firmwaresa8150p_firmwarewcd9341_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_auto_4g_modem_firmwaresw5100p_firmwareqca6564_firmwaresxr2130_firmwareqca6696_firmwareqca6430_firmwareqca6391_firmwaresnapdragon_855_mobile_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwarewsa8815_firmwareqca6574a_firmwarefastconnect_6200_firmwareqca6574au_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcn3680b_firmwaresw5100_firmwarewsa8835_firmwarefastconnect_6800_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3980_firmwarewcn3610_firmwareqca6436_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-21041
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.26%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In append_to_params of param_util.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-250123688References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0510
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.85%
||
7 Day CHG~0.00%
Published-21 Jun, 2021 | 16:01
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444622

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-33054
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.81%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 10:22
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Computer Vision

Memory corruption during the handshake between the Primary Virtual Machine and Trusted Virtual Machine.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwaresdm429w_firmwarewsa8845_firmwarewsa8832wsa8840qcs8550_firmwarewcd9370snapdragon_8_gen_2_mobile_firmwarewcd9385wcd9395_firmwarewcd9390_firmwarefastconnect_6700snapdragon_8_gen_2_mobilesg8275pwsa8832_firmwarewcd9370_firmwarewcd9395sg8275p_firmwaresnapdragon_8\+_gen_2_mobileqcm6490_firmwarewcn3660bwcn3620_firmwarewcd9390qcm6490wsa8845h_firmwaresm8550p_firmwareqcm8550qcs6490_firmwaresdm429wwcn3660b_firmwarewsa8835wsa8840_firmwareqcs5430wsa8845hwcd9380_firmwareqcm5430qcm5430_firmwarewsa8830sm8550pwcn6755_firmwarewcn3620snapdragon_8_gen_3_mobile_firmwarewcd9375_firmwarefastconnect_6900fastconnect_7800_firmwaresnapdragon_429_mobilesm8635qcs5430_firmwaresm8635_firmwarewcd9385_firmwarefastconnect_6900_firmwareqcs8550wcd9380fastconnect_7800snapdragon_8\+_gen_2_mobile_firmwarewcd9375wcn6755wsa8845fastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewsa8835_firmwaresnapdragon_429_mobile_firmwareqcs6490snapdragon_8_gen_3_mobilewsa8830_firmwarevideo_collaboration_vc3_platformSnapdragonwcd9380_firmwareqcm8550_firmwareqcm6490_firmwarewsa8832_firmwarewsa8840_firmwaresg8275p_firmwarefastconnect_6900_firmwareqcs8550_firmwaresdm429w_firmwarefastconnect_6700_firmwarefastconnect_7800_firmwarewcn6755_firmwarewcd9395_firmwaresm8635_firmwareqcm5430_firmwareqcs6490_firmwareqcs5430_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcd9370_firmwaresm8550p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarewcd9375_firmwarewsa8845h_firmwaresnapdragon_8_gen_2_mobile_platform_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-1106
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.36%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 21:32
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Linux kernel distributions contain a vulnerability in nvmap, where writes may be allowed to read-only buffers, which may result in escalation of privileges, complete denial of service, unconstrained information disclosure, and serious data tampering of all processes on the system.

Action-Not Available
Vendor-NVIDIA Corporation
Product-jetson_agx_xaviershield_experiencejetson_tx2_nxjetson_tx2jetson_linuxjetson_tx1shield_tvjetson_nano_2gbjetson_nanojetson_xavier_nxJetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson Nano, Jetson Nano 2GB, Jetson TX1Shield TV
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-1646
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 29.12%
||
7 Day CHG~0.00%
Published-26 Mar, 2023 | 22:31
Updated-02 Aug, 2024 | 05:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IObit Malware Fighter IOCTL IMFCameraProtect.sys 0x8018E004 stack-based overflow

A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been declared as critical. This vulnerability affects the function 0x8018E000/0x8018E004 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224026 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-iobitIObit
Product-malware_fighterMalware Fighter
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-31858
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.3||HIGH
EPSS-0.02% / 4.41%
||
7 Day CHG~0.00%
Published-12 Feb, 2025 | 21:16
Updated-26 Feb, 2025 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/a
Product-Intel(R) QuickAssist Technology software
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-31311
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 15.22%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 20:09
Updated-17 Dec, 2024 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In increment_annotation_count of stats_event.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20555
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.74%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:07
Updated-24 Oct, 2024 | 14:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_9_5900xathlon_gold_pro_3150ge_firmwareryzen_5_3580uryzen_5_6600h_firmwareathlon_3015ceryzen_7_4800u_firmwareathlon_silver_3050u_firmwareathlon_silver_3050e_firmwareryzen_5_pro_5645ryzen_7_7800x3d_firmwareryzen_9_5900x_firmwareryzen_9_6900hx_firmwareathlon_gold_3150c_firmwareryzen_3_3300_firmwareryzen_9_5980hxathlon_3015eathlon_pro_300geryzen_7_5800hsryzen_5_5600xryzen_9_5900_firmwareryzen_7_pro_7730uryzen_3_pro_7330uryzen_5_5600hsryzen_3_5300geathlon_gold_pro_3150gryzen_3_4100_firmwareryzen_7_5825uryzen_7_5825u_firmwareryzen_5_3600x_firmwareryzen_7_3750h_firmwareryzen_5_6600hryzen_7_5800x3d_firmwareryzen_9_3800x_firmwareryzen_5_4500u_firmwareryzen_9_6980hxathlon_pro_3145bryzen_5_5560uryzen_9_7950xryzen_7_3750hryzen_7_5700u_firmwareryzen_9_7900xryzen_7_7700xryzen_5_6600hsathlon_silver_3050eryzen_7_3780uryzen_7_pro_5845athlon_3015e_firmwareryzen_9_5900hsryzen_3_4100ryzen_9_4900hsryzen_7_7700x_firmwareryzen_7_4980u_firmwareryzen_7_5700gryzen_9_5980hsryzen_7_3700cryzen_3_5125c_firmwareryzen_9_6900hxryzen_5_7600ryzen_5_5500u_firmwareryzen_7_5800h_firmwareryzen_9_6900hsryzen_3_3300xryzen_7_3700xryzen_5_3500uryzen_5_5500ryzen_3_5400uryzen_9_4900hs_firmwareryzen_9_4900h_firmwareathlon_pro_3045bathlon_gold_pro_3150geryzen_5_5600_firmwareryzen_7_5800xryzen_5_3550hryzen_5_4500uryzen_9_pro_5945ryzen_7_3780u_firmwareryzen_3_4300uathlon_gold_3150geryzen_7_4800h_firmwareryzen_7_7700_firmwareathlon_silver_3050c_firmwareryzen_3_4300u_firmwareryzen_5_5600x_firmwareryzen_7_4980uryzen_7_3700x_firmwareryzen_7_5800x3dryzen_3_5300gryzen_9_5900ryzen_9_pro_7945ryzen_5_5600ge_firmwareryzen_5_7600x_firmwareryzen_9_5980hs_firmwareryzen_7_6800h_firmwareryzen_7_6800u_firmwareryzen_5_3500c_firmwareryzen_5_5600hs_firmwareryzen_3_7320uryzen_5_pro_7530uryzen_7_pro_7745athlon_gold_3150uryzen_3_3350u_firmwareryzen_5_5600h_firmwareryzen_5_7520uryzen_7_5700ryzen_5_4680uryzen_5_5500uryzen_3_5400u_firmwareryzen_9_6900hs_firmwareathlon_silver_3050cryzen_7_5800ryzen_3_3300u_firmwareryzen_7_4700uryzen_7_6800hs_firmwareryzen_7_pro_7745_firmwareryzen_7_3700_firmwareathlon_gold_3150g_firmwareryzen_7_7800x3dryzen_5_4600uryzen_9_5950xryzen_9_7900x3d_firmwareryzen_5_3600_firmwareryzen_5_5500_firmwareryzen_5_3580u_firmwareryzen_5_3500cryzen_5_4600hryzen_5_4600u_firmwareryzen_3_3300x_firmwareryzen_5_5600hryzen_7_6800hsryzen_5_4500ryzen_3_5300u_firmwareryzen_7_6800uryzen_3_3300uryzen_3_5300uryzen_5_5600gryzen_9_pro_7945_firmwareryzen_3_5425u_firmwareryzen_7_3700ryzen_9_7900x3dryzen_5_3550h_firmwareryzen_7_4800hryzen_5_5600uathlon_pro_3045b_firmwareryzen_9_4900hryzen_9_5900hx_firmwareryzen_9_5950x_firmwareathlon_3015ce_firmwareryzen_5_5600x3d_firmwareryzen_5_5600geryzen_7_4800hsryzen_9_7900_firmwareryzen_5_7600xryzen_7_3700u_firmwareryzen_7_5800x_firmwareryzen_3_5300ge_firmwareryzen_5_5625uryzen_5_6600uryzen_9_6980hs_firmwareryzen_9_3850xryzen_7_5700geryzen_5_3450uryzen_7_4800hs_firmwareathlon_pro_3145b_firmwareryzen_3_5125cryzen_9_6980hx_firmwareryzen_7_pro_5845_firmwareryzen_9_5900hs_firmwareryzen_5_5600u_firmwareryzen_5_5600x3dryzen_5_3600xryzen_5_pro_7645_firmwareathlon_pro_300ge_firmwareryzen_5_6600u_firmwareryzen_7_5700g_firmwareryzen_7_5700_firmwareryzen_5_7600_firmwareryzen_5_7500f_firmwareryzen_9_pro_5945_firmwareryzen_5_7520u_firmwareryzen_5_4600h_firmwareathlon_gold_3150gryzen_5_4500_firmwareryzen_7_3700c_firmwareryzen_7_5700x_firmwareryzen_3_5300g_firmwareryzen_5_7500fryzen_5_4600hsryzen_7_5800u_firmwareryzen_3_7320u_firmwareryzen_7_4700u_firmwareryzen_7_3700uryzen_5_6600hs_firmwareryzen_3_3300ryzen_9_3800xryzen_5_pro_5645_firmwareryzen_3_pro_7330u_firmwareathlon_silver_3050uryzen_3_3350uryzen_3_5425uryzen_7_5800_firmwareryzen_9_5980hx_firmwareryzen_3_5100_firmwareryzen_5_5560u_firmwareryzen_4700s_firmwareryzen_7_5800uryzen_9_5900hxathlon_gold_pro_3150g_firmwareryzen_9_7950x3d_firmwareryzen_9_3850x_firmwareryzen_5_4600hs_firmwareathlon_gold_3150cryzen_5_4680u_firmwareryzen_5_5600g_firmwareryzen_5_pro_7645athlon_gold_3150u_firmwareryzen_9_7950x3dryzen_7_7700ryzen_5_5600ryzen_3_5100ryzen_4700sryzen_7_5800hryzen_7_pro_7730u_firmwareryzen_5_3450u_firmwareryzen_9_7900ryzen_5_3600ryzen_9_7950x_firmwareryzen_5_3500u_firmwareryzen_5_pro_7530u_firmwareryzen_7_5800hs_firmwareathlon_gold_3150ge_firmwareryzen_7_4800uryzen_5_5625u_firmwareryzen_7_5700uryzen_7_5700ge_firmwareryzen_7_5700xryzen_9_6980hsryzen_7_6800hryzen_9_7900x_firmwareRyzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Picasso”Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” FP5Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6Ryzen™ 6000 Series Mobile Processors "Rembrandt"Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso”Ryzen™ 3000 Series Desktop Processors “Matisse” AM4Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” FP5Ryzen™ 7020 Series Mobile Processors “Mendocino”Ryzen™ 7000 Series Processors “Raphael”Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” AM4Ryzen™ 7030 Series Mobile Processors “Barcelo” ryzen_7000_series_desktop_processorsathlon_3000gryzen_3000_series_desktop_processorsryzen_5000_series_desktop_processorsryzen_4000_series_desktop_processors_with_radeon_graphics
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-1664
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.31%
||
7 Day CHG~0.00%
Published-16 Oct, 2020 | 20:31
Updated-17 Sep, 2024 | 01:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: Buffer overflow vulnerability in device control daemon

A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S4; 18.4 versions prior to 18.4R2-S5, 18.4R3-S5; 19.1 versions prior to 19.1R3-S3; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2. Versions of Junos OS prior to 17.3 are unaffected by this vulnerability.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junosJunos OS
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-1017
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-0.22% / 44.23%
||
7 Day CHG~0.00%
Published-28 Feb, 2023 | 18:02
Updated-02 Aug, 2024 | 05:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TPM2.0 vulnerable to out-of-bounds write

An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.

Action-Not Available
Vendor-trustedcomputinggroupTrusted Computing GroupMicrosoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_11_22h2windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_10_20h2trusted_platform_modulewindows_server_2019windows_10_1607TPM2.0
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-1078
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG-0.00%
Published-27 Mar, 2023 | 00:00
Updated-05 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kernelLinux kernel
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2020-17380
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 23.28%
||
7 Day CHG~0.00%
Published-30 Jan, 2021 | 05:38
Updated-04 Aug, 2024 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.

Action-Not Available
Vendor-n/aQEMUDebian GNU/Linux
Product-debian_linuxqemun/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-31313
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.17%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 20:09
Updated-17 Dec, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In availableToWriteBytes of MessageQueueBase.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-32504
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.18% / 40.21%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 00:00
Updated-13 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. The mobile processor lacks proper length checking, which can result in an OOB (Out-of-Bounds) Write vulnerability.

Action-Not Available
Vendor-n/aSamsung
Product-exynos_850exynos_w920_firmwareexynos_2100exynos_850_firmwareexynos_1380_firmwareexynos_1280exynos_1080exynos_1380exynos_1330exynos_w930exynos_1330_firmwareexynos_w920exynos_w930_firmwareexynos_1280_firmwareexynos_2100_firmwareexynos_1080_firmwaren/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-31956
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.24% / 46.87%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 00:00
Updated-14 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Samsung Mobile Processor Exynos 2200, Exynos 1480, Exynos 2400. It lacks proper buffer length checking, which can result in an Out-of-Bounds Write.

Action-Not Available
Vendor-n/aSamsung
Product-exynos_1480_firmwareexynos_1480exynos_2400exynos_2400_firmwareexynos_2200_firmwareexynos_2200n/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-1525
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-8.62% / 92.06%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:13
Updated-04 Aug, 2024 | 06:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Media Foundation Memory Corruption Vulnerability

A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2019windows_10Windows 10 Version 1607Windows Server version 2004Windows Server 2019 (Server Core installation)Windows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1709Windows 10 Version 1909Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows 10 Version 1803Windows Server, version 1909 (Server Core installation)Windows Server 2019Windows Server, version 1903 (Server Core installation)Windows 10 Version 1709 for 32-bit Systems
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-49846
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.98%
||
7 Day CHG~0.00%
Published-01 May, 2025 | 14:10
Updated-07 May, 2025 | 13:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
udf: Fix a slab-out-of-bounds write bug in udf_find_entry()

In the Linux kernel, the following vulnerability has been resolved: udf: Fix a slab-out-of-bounds write bug in udf_find_entry() Syzbot reported a slab-out-of-bounds Write bug: loop0: detected capacity change from 0 to 2048 ================================================================== BUG: KASAN: slab-out-of-bounds in udf_find_entry+0x8a5/0x14f0 fs/udf/namei.c:253 Write of size 105 at addr ffff8880123ff896 by task syz-executor323/3610 CPU: 0 PID: 3610 Comm: syz-executor323 Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106 print_address_description+0x74/0x340 mm/kasan/report.c:284 print_report+0x107/0x1f0 mm/kasan/report.c:395 kasan_report+0xcd/0x100 mm/kasan/report.c:495 kasan_check_range+0x2a7/0x2e0 mm/kasan/generic.c:189 memcpy+0x3c/0x60 mm/kasan/shadow.c:66 udf_find_entry+0x8a5/0x14f0 fs/udf/namei.c:253 udf_lookup+0xef/0x340 fs/udf/namei.c:309 lookup_open fs/namei.c:3391 [inline] open_last_lookups fs/namei.c:3481 [inline] path_openat+0x10e6/0x2df0 fs/namei.c:3710 do_filp_open+0x264/0x4f0 fs/namei.c:3740 do_sys_openat2+0x124/0x4e0 fs/open.c:1310 do_sys_open fs/open.c:1326 [inline] __do_sys_creat fs/open.c:1402 [inline] __se_sys_creat fs/open.c:1396 [inline] __x64_sys_creat+0x11f/0x160 fs/open.c:1396 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7ffab0d164d9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe1a7e6bb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffab0d164d9 RDX: 00007ffab0d164d9 RSI: 0000000000000000 RDI: 0000000020000180 RBP: 00007ffab0cd5a10 R08: 0000000000000000 R09: 0000000000000000 R10: 00005555573552c0 R11: 0000000000000246 R12: 00007ffab0cd5aa0 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 </TASK> Allocated by task 3610: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x3d/0x60 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:371 [inline] __kasan_kmalloc+0x97/0xb0 mm/kasan/common.c:380 kmalloc include/linux/slab.h:576 [inline] udf_find_entry+0x7b6/0x14f0 fs/udf/namei.c:243 udf_lookup+0xef/0x340 fs/udf/namei.c:309 lookup_open fs/namei.c:3391 [inline] open_last_lookups fs/namei.c:3481 [inline] path_openat+0x10e6/0x2df0 fs/namei.c:3710 do_filp_open+0x264/0x4f0 fs/namei.c:3740 do_sys_openat2+0x124/0x4e0 fs/open.c:1310 do_sys_open fs/open.c:1326 [inline] __do_sys_creat fs/open.c:1402 [inline] __se_sys_creat fs/open.c:1396 [inline] __x64_sys_creat+0x11f/0x160 fs/open.c:1396 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd The buggy address belongs to the object at ffff8880123ff800 which belongs to the cache kmalloc-256 of size 256 The buggy address is located 150 bytes inside of 256-byte region [ffff8880123ff800, ffff8880123ff900) The buggy address belongs to the physical page: page:ffffea000048ff80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x123fe head:ffffea000048ff80 order:1 compound_mapcount:0 compound_pincount:0 flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000010200 ffffea00004b8500 dead000000000003 ffff888012041b40 raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x0(), pid 1, tgid 1 (swapper/0), ts 1841222404, free_ts 0 create_dummy_stack mm/page_owner.c: ---truncated---

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-0182
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.79%
||
7 Day CHG~0.00%
Published-01 Apr, 2023 | 04:31
Updated-11 Feb, 2025 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an out-of-bounds write can lead to denial of service, information disclosure, and data tampering.

Action-Not Available
Vendor-Microsoft CorporationNVIDIA Corporation
Product-windowsvirtual_gpuvGPU software (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Windows)
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 27
  • 28
  • Next
Details not found