Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-27504

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-21 Nov, 2023 | 17:43
Updated At-03 Aug, 2024 | 21:26
Rejected At-
Credits

Texas Instruments FREERTOS Integer Overflow or Wraparound

Texas Instruments devices running FREERTOS, malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'malloc' for FreeRTOS, resulting in code execution.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:21 Nov, 2023 | 17:43
Updated At:03 Aug, 2024 | 21:26
Rejected At:
▼CVE Numbering Authority (CNA)
Texas Instruments FREERTOS Integer Overflow or Wraparound

Texas Instruments devices running FREERTOS, malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'malloc' for FreeRTOS, resulting in code execution.

Affected Products
Vendor
Texas Instruments
Product
CC32XX
Default Status
unaffected
Versions
Affected
  • From 0 before 4.40.00.07 (custom)
Vendor
Texas Instruments
Product
SimpleLink MSP432E4XX
Default Status
unaffected
Versions
Affected
  • all versions
Vendor
Texas Instruments
Product
SimpleLink-CC13XX
Default Status
unaffected
Versions
Affected
  • From 0 before 4.40.00 (custom)
Vendor
Texas Instruments
Product
SimpleLink-CC26XX
Default Status
unaffected
Versions
Affected
  • From 0 before 4.40.00 (custom)
Vendor
Texas Instruments
Product
SimpleLink-CC32XX
Default Status
unaffected
Versions
Affected
  • From 0 before 4.10.03 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-190CWE-190: Integer Overflow or Wraparound
Type: CWE
CWE ID: CWE-190
Description: CWE-190: Integer Overflow or Wraparound
Metrics
VersionBase scoreBase severityVector
3.17.4HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Texas Instruments CC32XX – Update to v4.40.00.07 Texas Instruments SimpleLink CC13X0 – Update to v4.10.03 https://www.ti.com/technologies/security/report-product-security-vulnerabilities.html Texas Instruments SimpleLink CC13X2-CC26X2 – Update to v4.40.00 https://www.ti.com/technologies/security/report-product-security-vulnerabilities.html Texas Instruments SimpleLink CC2640R2 – Update to v4.40.00 https://www.ti.com/technologies/security/report-product-security-vulnerabilities.html Texas Instruments SimpleLink MSP432E4 – Confirmed. No update currently planned

Configurations

Workarounds

Exploits

Credits

finder
David Atch, Omri Ben Bassat, and Tamir Ariel from Microsoft Section 52, and the Azure Defender for IoT research group reported these vulnerabilities to CISA.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04
N/A
https://www.ti.com/tool/TI-RTOS-MCU
N/A
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04
Resource: N/A
Hyperlink: https://www.ti.com/tool/TI-RTOS-MCU
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04
x_transferred
https://www.ti.com/tool/TI-RTOS-MCU
x_transferred
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04
Resource:
x_transferred
Hyperlink: https://www.ti.com/tool/TI-RTOS-MCU
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:21 Nov, 2023 | 18:15
Updated At:01 Dec, 2023 | 20:16

Texas Instruments devices running FREERTOS, malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'malloc' for FreeRTOS, resulting in code execution.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.4HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

amazon
amazon
>>freertos>>10.4.1
cpe:2.3:o:amazon:freertos:10.4.1:*:*:*:*:*:*:*
ti
ti
>>simplelink_cc13xx_software_development_kit>>Versions before 4.40.00(exclusive)
cpe:2.3:a:ti:simplelink_cc13xx_software_development_kit:*:*:*:*:*:*:*:*
ti
ti
>>simplelink_cc26xx_software_development_kit>>Versions before 4.40.00(exclusive)
cpe:2.3:a:ti:simplelink_cc26xx_software_development_kit:*:*:*:*:*:*:*:*
ti
ti
>>simplelink_cc32xx_software_development_kit>>Versions before 4.10.03(exclusive)
cpe:2.3:a:ti:simplelink_cc32xx_software_development_kit:*:*:*:*:*:*:*:*
ti
ti
>>simplelink_msp432e401y>>-
cpe:2.3:a:ti:simplelink_msp432e401y:-:*:*:*:*:*:*:*
ti
ti
>>simplelink_msp432e411y>>-
cpe:2.3:a:ti:simplelink_msp432e411y:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-190Primarynvd@nist.gov
CWE-190Secondaryics-cert@hq.dhs.gov
CWE ID: CWE-190
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-190
Type: Secondary
Source: ics-cert@hq.dhs.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04ics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
https://www.ti.com/tool/TI-RTOS-MCUics-cert@hq.dhs.gov
Product
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-21-119-04
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.ti.com/tool/TI-RTOS-MCU
Source: ics-cert@hq.dhs.gov
Resource:
Product

Change History

0
Information is not available yet

Similar CVEs

265Records found

CVE-2021-27502
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.4||HIGH
EPSS-0.06% / 17.64%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 17:41
Updated-03 Aug, 2024 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Texas Instruments TI-RTOS Integer Overflow or Wraparound

Texas Instruments TI-RTOS, when configured to use HeapMem heap(default), malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'HeapMem_allocUnprotected' and result in code execution.

Action-Not Available
Vendor-tiTexas Instruments
Product-cc3200cc3230sfcc3220scc3220rcc3235sfsimplelink_msp432e401ysimplelink_cc26xx_software_development_kitcc3235ssimplelink_cc32xx_software_development_kitsimplelink_cc13xx_software_development_kitcc3230sreal-time_operating_systemsimplelink_msp432e411ycc3220sfSimpleLink-CC13XXSimpleLink-CC26XXSimpleLink-CC32XXSimpleLink MSP432E4XXCC32XX
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-22677
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.16%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 15:11
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow exists in the APIs of the host MCU while trying to connect to a WIFI network may lead to issues such as a denial-of-service condition or code execution on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior).

Action-Not Available
Vendor-tin/a
Product-simplelink_cc13x2_software_development_kitsimplelink_cc26xx_software_development_kitsimplelink_msp432e4_software_development_kitsimplelink_cc32xx_software_development_kitcc3100_software_development_kitsimplelink_cc13x0_software_development_kitcc3200_software_development_kitSimpleLink Wi-Fi, MSP432, CC13XX, CC26XX, CC32XX, CC3100
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-22636
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.4||HIGH
EPSS-0.04% / 12.53%
||
7 Day CHG~0.00%
Published-20 Nov, 2023 | 19:02
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Texas Instruments TI-RTOS Integer Overflow or Wraparound

Texas Instruments TI-RTOS, when configured to use HeapMem heap(default), malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'HeapMem_allocUnprotected' and result in code execution.

Action-Not Available
Vendor-tiTexas Instruments
Product-cc3200cc3230sfcc3220scc3220rcc3235sfsimplelink_msp432e401ysimplelink_cc26xx_software_development_kitcc3235ssimplelink_cc32xx_software_development_kitsimplelink_cc13xx_software_development_kitcc3230sreal-time_operating_systemsimplelink_msp432e411ycc3220sfSimpleLink-CC13XXSimpleLink-CC26XXSimpleLink-CC32XXSimpleLink MSP432E4XXCC32XX
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-27429
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-10
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.4||HIGH
EPSS-0.04% / 12.60%
||
7 Day CHG~0.00%
Published-20 Nov, 2023 | 19:00
Updated-03 Aug, 2024 | 20:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Texas Instruments TI-RTOS Integer Overflow or Wraparound

Texas Instruments TI-RTOS returns a valid pointer to a small buffer on extremely large values. This can trigger an integer overflow vulnerability in 'HeapTrack_alloc' and result in code execution.

Action-Not Available
Vendor-tiTexas Instruments
Product-cc3200cc3230sfcc3220scc3220rcc3235sfsimplelink_msp432e401ysimplelink_cc26xx_software_development_kitcc3235ssimplelink_cc32xx_software_development_kitsimplelink_cc13xx_software_development_kitcc3230sreal-time_operating_systemsimplelink_msp432e411ycc3220sfSimpleLink-CC13XXSimpleLink-CC26XXSimpleLink-CC32XXSimpleLink MSP432E4XXCC32XX
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-28115
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.04% / 12.74%
||
7 Day CHG~0.00%
Published-07 Mar, 2024 | 20:54
Updated-01 Oct, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation in FreeRTOS Kernel ARMv7-M MPU ports and ARMv8-M ports with MPU support enabled

FreeRTOS is a real-time operating system for microcontrollers. FreeRTOS Kernel versions through 10.6.1 do not sufficiently protect against local privilege escalation via Return Oriented Programming techniques should a vulnerability exist that allows code injection and execution. These issues affect ARMv7-M MPU ports, and ARMv8-M ports with Memory Protected Unit (MPU) support enabled (i.e. `configENABLE_MPU` set to 1). These issues are fixed in version 10.6.2 with a new MPU wrapper.

Action-Not Available
Vendor-amazonFreeRTOSfreertos
Product-freertosFreeRTOS-Kernelfreertos-kernel
CWE ID-CWE-284
Improper Access Control
CVE-2024-37293
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.6||HIGH
EPSS-0.15% / 35.92%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 16:49
Updated-16 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
aws-deployment-framework's potential risk can lead to privilege escalation

The AWS Deployment Framework (ADF) is a framework to manage and deploy resources across multiple AWS accounts and regions within an AWS Organization. ADF allows for staged, parallel, multi-account, cross-region deployments of applications or resources via the structure defined in AWS Organizations while taking advantage of services such as AWS CodePipeline, AWS CodeBuild, and AWS CodeCommit to alleviate the heavy lifting and management compared to a traditional CI/CD setup. ADF contains a bootstrap process that is responsible to deploy ADF's bootstrap stacks to facilitate multi-account cross-region deployments. The ADF bootstrap process relies on elevated privileges to perform this task. Two versions of the bootstrap process exist; a code-change driven pipeline using AWS CodeBuild and an event-driven state machine using AWS Lambda. If an actor has permissions to change the behavior of the CodeBuild project or the Lambda function, they would be able to escalate their privileges. Prior to version 4.0.0, the bootstrap CodeBuild role provides access to the `sts:AssumeRole` operation without further restrictions. Therefore, it is able to assume into any AWS Account in the AWS Organization with the elevated privileges provided by the cross-account access role. By default, this role is not restricted when it is created by AWS Organizations, providing Administrator level access to the AWS resources in the AWS Account. The patches for this issue are included in `aws-deployment-framework` version 4.0.0. As a temporary mitigation, add a permissions boundary to the roles created by ADF in the management account. The permissions boundary should deny all IAM and STS actions. This permissions boundary should be in place until you upgrade ADF or bootstrap a new account. While the permissions boundary is in place, the account management and bootstrapping of accounts are unable to create, update, or assume into roles. This mitigates the privilege escalation risk, but also disables ADF's ability to create, manage, and bootstrap accounts.

Action-Not Available
Vendor-amazonawslabsawslabs
Product-aws_deployment_frameworkaws-deployment-frameworkaws-deployment-framework
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2023-51386
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.15%
||
7 Day CHG~0.00%
Published-22 Dec, 2023 | 21:58
Updated-02 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sandbox Accounts for Events vulnerable to privilege escalation to read running events data

Sandbox Accounts for Events provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially read data from the events table by sending request payloads to the events API, collecting information on planned events, timeframes, budgets and owner email addresses. This data access may allow users to get insights into upcoming events and join events which they have not been invited to. This issue has been patched in version 1.10.0.

Action-Not Available
Vendor-amazonawslabs
Product-awslabs_sandbox_accounts_for_eventssandbox-accounts-for-events
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-43997
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.02%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 00:00
Updated-04 Aug, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FreeRTOS versions 10.2.0 through 10.4.5 do not prevent non-kernel code from calling the xPortRaisePrivilege internal function to raise privilege. FreeRTOS versions through 10.4.6 do not prevent a third party that has already independently gained the ability to execute injected code to achieve further privilege escalation by branching directly inside a FreeRTOS MPU API wrapper function with a manually crafted stack frame. These issues affect ARMv7-M MPU ports, and ARMv8-M ports with MPU support enabled (i.e. configENABLE_MPU set to 1). These are fixed in V10.5.0 and in V10.4.3-LTS Patch 3.

Action-Not Available
Vendor-amazonn/a
Product-freertosn/a
CVE-2021-30354
Matching Score-6
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-6
Assigner-Check Point Software Ltd.
CVSS Score-8.6||HIGH
EPSS-0.88% / 74.99%
||
7 Day CHG~0.00%
Published-01 Sep, 2021 | 17:43
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Amazon Kindle e-reader prior to and including version 5.13.4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function CJBig2Image::expand() and results in a memory corruption that leads to code execution when parsing a crafted PDF book.

Action-Not Available
Vendor-amazonn/a
Product-kindle_firmwarekindleAmazon Kindle e-reader
CWE ID-CWE-680
Integer Overflow to Buffer Overflow
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-22671
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.69% / 71.44%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 13:12
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflow issues exist while processing long domain names, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior).

Action-Not Available
Vendor-tin/a
Product-simplelink_cc13x2_software_development_kitsimplelink_cc26xx_software_development_kitsimplelink_msp432e4_software_development_kitsimplelink_cc32xx_software_development_kitcc3100_software_development_kitsimplelink_cc13x0_software_development_kitcc3200_software_development_kitSimpleLink Wi-Fi, MSP432, CC13XX, CC26XX, CC32XX, CC3100
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-22679
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.69% / 71.44%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 12:46
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The affected product is vulnerable to an integer overflow while processing HTTP headers, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior).

Action-Not Available
Vendor-tin/a
Product-simplelink_cc13x2_software_development_kitsimplelink_cc26xx_software_development_kitsimplelink_msp432e4_software_development_kitsimplelink_cc32xx_software_development_kitcc3100_software_development_kitsimplelink_cc13x0_software_development_kitcc3200_software_development_kitSimpleLink Wi-Fi, MSP432, CC13XX, CC26XX, CC32XX, CC3100
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-22675
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.2||HIGH
EPSS-0.77% / 73.13%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 12:01
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The affected product is vulnerable to integer overflow while parsing malformed over-the-air firmware update files, which may allow an attacker to remotely execute code on SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior).

Action-Not Available
Vendor-tin/a
Product-simplelink_cc13x2_software_development_kitsimplelink_cc26xx_software_development_kitsimplelink_msp432e4_software_development_kitsimplelink_cc32xx_software_development_kitcc3100_software_development_kitsimplelink_cc13x0_software_development_kitcc3200_software_development_kitSimpleLink Wi-Fi, MSP432, CC13XX, CC26XX, CC32XX, CC3100
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-31571
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.67% / 70.88%
||
7 Day CHG-0.34%
Published-22 Apr, 2021 | 17:56
Updated-03 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kernel in Amazon Web Services FreeRTOS before 10.4.3 has an integer overflow in queue.c for queue creation.

Action-Not Available
Vendor-amazonn/a
Product-freertosn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-31572
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.67% / 70.88%
||
7 Day CHG-0.34%
Published-22 Apr, 2021 | 17:56
Updated-03 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kernel in Amazon Web Services FreeRTOS before 10.4.3 has an integer overflow in stream_buffer.c for a stream buffer.

Action-Not Available
Vendor-amazonn/a
Product-freertosn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-43638
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.14% / 33.56%
||
7 Day CHG~0.00%
Published-07 Dec, 2021 | 20:00
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Amazon Amazon WorkSpaces agent is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amazon WorkSpaces agent below v1.0.1.1537 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.

Action-Not Available
Vendor-amazonn/a
Product-workspacesn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-40994
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.87%
||
7 Day CHG~0.00%
Published-12 Jul, 2024 | 12:37
Updated-03 Nov, 2025 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ptp: fix integer overflow in max_vclocks_store

In the Linux kernel, the following vulnerability has been resolved: ptp: fix integer overflow in max_vclocks_store On 32bit systems, the "4 * max" multiply can overflow. Use kcalloc() to do the allocation to prevent this.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-30274
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 9.22%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:25
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible integer overflow in access control initialization interface due to lack and size and address validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaremdm9150_firmwarewcn3991_firmwaresd678qcn9070sa6150p_firmwaresa8145p_firmwareqcs610sm6250p_firmwarewsa8830qcs2290_firmwarefsm10056qca8337sd7c_firmwarecsrb31024csra6620fsm10055_firmwareqcn9072qcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqcs2290qca6595au_firmwareqca6390_firmwaresa6155ipq6000sd690_5gsd730_firmwarecsra6620_firmwarewcd9370sd_675_firmwaresd675_firmwarecsra6640_firmwareqcn5152_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sa415msd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950qcn6024_firmwaresd720gsm6375_firmwaresd662sd460_firmwaresa8155qca6574au_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqca8081_firmwareqcn6023_firmwaresa6155_firmwaresm7250p_firmwarewcd9375_firmwarewcn3999_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwarewcd9306sm6225wcn3999sa515m_firmwareqcs6490qrb5165_firmwaresdxr2_5gqcn5052sa8155_firmwareipq6010qca4004_firmwaresd662_firmwaresa415m_firmwareqcs405wcn3988_firmwareqcn9074sa6145p_firmwaresm6250sd778g_firmwarewcd9306_firmwarewcd9340sa8195psd765gsd765_firmwarefsm10056_firmwareqca6436wcn6851wcd9335sa6155pqca8081qcn6023qca6174a_firmwareqcs4290_firmwarewcd9385qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwarear8035csr8811qca6390sd_8cxsa8150psd750g_firmwaresm6250_firmwarewcd9375wcn3910_firmwareqca4004wsa8830_firmwaresd660sd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988sd660_firmwarewcn6850_firmwarewsa8835_firmwaresa8195p_firmwareqcn5121qcx315qcn5022_firmwareqca6564awcn6750_firmwareqca8072qcm2290_firmwaresm6375wcn3991qca8337_firmwarewcd9380_firmwarewcn3990qcn9000sd_675sd865_5gqca6564ausdx24sdx55m_firmwarewcn6856_firmwarewsa8835qca6574qcx315_firmwaresd665_firmwarecsr8811_firmwarewcd9380sd888_5gsm6250pqcs410qca8075_firmwareqca6574asd690_5g_firmwareipq6005_firmwarewcn6855_firmwareqca6174asm7325psdx24_firmwareqca8072_firmwarewcd9335_firmwareqcn5052_firmwarewcn3980wcn6750ipq6018_firmwaremdm9205sa515mqca6574_firmwarewcd9340_firmwaresm7325p_firmwaresd665sd7cwcn3910wcn6850sdx57m_firmwaresd765qca6426_firmwareqca6574a_firmwareqca9984ipq6028qcn5021qcn5152qcn9024sd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55mipq6005sd678_firmwarear8031_firmwarecsrb31024_firmwareqcm4290qcm6490_firmwareqcn9070_firmwareqrb5165sd480_firmwarewcn6851_firmwareipq6028_firmwaresm6225_firmwareqca6574ausa8155p_firmwareqcn5122qca6564a_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresd480sd870qcn5121_firmwarewcn6855qcs610_firmwaremdm9150wcn6856qsm8250ipq6018qcn5022sa6145pqca6564_firmwareipq6010_firmwarear8031sd768gqcs405_firmwaresa8145pqca6696mdm9205_firmwareqca6391_firmwarewcd9370_firmwaresa6150psdx55qca8075qcn5021_firmwareqcn9022_firmwarecsra6640qcn6024qcn9022sa8155psd675qcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwareqcn9074_firmwareqcs410_firmwarear8035_firmwareqcm2290qsm8250_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-30260
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 16.87%
||
7 Day CHG~0.00%
Published-17 Sep, 2021 | 07:05
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible Integer overflow to buffer overflow issue can occur due to improper validation of input parameters when extscan hostlist configuration command is received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresm7250mdm9640_firmwaresm6250p_firmwareipq4028_firmwareqca1023qca8337ar9380ipq8173_firmwareqcn5124mdm9645msm8992_firmwarewcn3950_firmwaresc8180x\+sdx55qca6595au_firmwaresa6155mdm8215sd_455_firmwareapq8076qcs6125_firmwaresa415mwcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125mdm9206_firmwarewcn3660bqsm8350_firmwareqsm8350sd460_firmwareqca8081_firmwarewcn3998_firmwareqca6420apq8053_firmwareipq8070_firmwareqca9367_firmwareipq8078a_firmwareipq8072_firmwareqca0000sa8155_firmwareqca6430wcd9340sdm830_firmwaresd765gmdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sd870_firmwareqca1062qcn5154_firmwaremdm8215_firmwaresd_8cxsa8150pqca9992_firmwaresd660sd865_5g_firmwaresd712sd660_firmwareqcn5121qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca6428_firmwarewcn3991ipq4018_firmwareqca4531_firmwareqca9980_firmwareipq8078sdx55m_firmwareipq8173msm8976_firmwareqca6574sd670_firmwarecsr8811_firmwarewcd9380qcs410qcn5024sd690_5g_firmwareqca9379_firmwaresdx24_firmwareqcn9012_firmwareipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqca6584_firmwaresd_8c_firmwaremdm9215_firmwareipq6028ipq8064sd835pmp8074qca1990wcn3980_firmwarewcn6745_firmwaresd730qca2062_firmwarewcn6740_firmwareqcn5064_firmwaresd678_firmwareapq8064au_firmwareipq8078_firmwareqca6234qcn5054qcs603qca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwarewcn6855qcn7605_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031qca1023_firmwaresdm630_firmwaresd820_firmwareqca6391_firmwareqca4024wcd9370_firmwaresdx55apq8053qcn5021_firmwarecsra6640qca9379qca6234_firmwareqcn7606wsa8830qca1062_firmwarecsrb31024mdm9628_firmwaremdm9650sd_636qca9378aqca9992qcs4290mdm9250qca6420_firmwareapq8009_firmwareqca2064_firmwaresd690_5gmdm9310_firmwaresd675_firmwareipq8072qca6564qca6426wcn3990_firmwareqca9984_firmwareqca9377qca4531wcd9385_firmwaresdxr2_5g_firmwarewhs9410wcd9326_firmwarewcn3615_firmwareipq8074aapq8094sa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwarewcn3610_firmwareqca6584ausd778gipq8174qcn5052qca9367apq8092sdm630mdm9607_firmwaresa415m_firmwarewcn3988_firmwareqcn9074qca6421sd778g_firmwaresa8195pqca6694wcd9326wcd9335qcn6023qcs4290_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000msm8976wcd9375sc8180x\+sdx55_firmwaresm6250_firmwaremsm8994apq8092_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareapq8017qcm6125_firmwaresd780gsd865_5gqca6595sd665_firmwareqcn5154qca8075_firmwareipq6005_firmwaremdm9206wcn6855_firmwareqca9888qca6310_firmwaresm7325apq8094_firmwareipq8070a_firmwaremdm9615qca6574_firmwareqca9886sd665qca6175asd765qca6574a_firmwaresd850_firmwareapq8009mdm9310csrb31024_firmwareqcn9070_firmwaresd480_firmwareipq6028_firmwareipq8072a_firmwaremdm9626_firmwareqca9889_firmwaresd710mdm9607qcn5122mdm9645_firmwaresdx20m_firmwareqcn5022qca6564_firmwaresd768gqca1064_firmwarewcn6740qca8075apq8096au_firmwareqcn6024qcn9022sd845mdm9615_firmwaresdm830ipq6000_firmwaresdx12qcs410_firmwareqca6175a_firmwaresm7325_firmwareqca2066sa6150p_firmwareqcs610qcn5550qca6431_firmwarewcd9360_firmwareqca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qca2062qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareipq8076amdm9628sd710_firmwareqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresdx12_firmwarewcd9360sdx20mqca6438_firmwarewhs9410_firmwarewcn3999qrb5165_firmwareipq5028ipq4029_firmwareqcs6125ipq6010sd662_firmwareqcs405sc8280xp_firmwareqca1990_firmwareqca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarewcd9341qca2066_firmwareqca6431sd750gwcn3910_firmwarewsa8830_firmwaresd855_firmwarewcn3988qca6438sa8195p_firmwareqca9898ipq4028wcn3610mdm9640ipq5018_firmwareqca8337_firmwarewcd9380_firmwareipq8072awcd9330msm8996au_firmwarecsr6030ipq8076a_firmwareqca6564auwcn6856_firmwareqcn5164qcn5054_firmwaresdx50m_firmwareqca8072_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcs605sd7cwcn3910qca6320mdm9650_firmwareqca6426_firmwarewcn3660b_firmwareqca9984qcn9024qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqca6421_firmwaresd821_firmwarear8031_firmwareqrb5165wcn6851_firmwareipq8070sd_636_firmwareqca6564a_firmwaresd480sd870qcn5121_firmwaresd210_firmwareipq6018sdxr1apq8096auqca6595_firmwareqcs405_firmwaresa8145pqca2064sd780g_firmwaresd888_firmwaresc8280xpsa8155psd675qca9378a_firmwarear8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresd678qcn9070sa8145p_firmwareqcs2290_firmwaresm7250_firmwaresd7c_firmwarecsra6620qcn9072sd765g_firmwareipq8069_firmwareqca6390_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca0000_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwareipq5018sd_8cx_firmwareqcn7605wcn6745qca2065sd662qcn5124_firmwareqca1064qca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310sa515m_firmwareqca9990sdxr2_5gsd821msm8994_firmwaresa6145p_firmwaremsm8992sm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresd765_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qca2065_firmwarear8035csr8811apq8064auqca6694_firmwareqcn9100_firmwaresd210sd820wcn6850_firmwarewsa8835_firmwarecsr6030_firmwareqca6564aqca8072qcm2290_firmwarewcn3990qcn9000sd_675ar9380_firmwaresdx24qcn9012sd888qcn6122_firmwarewsa8835msm8996ausd888_5gsm6250pipq4018qca6574aqca9889qca6174aipq8074qca9994_firmwarewcn6750ipq8076_firmwaresa515msd855sm4125_firmwareipq8076qcn5021ipq8069qcn5152sd768g_firmwaresd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcn9100mdm9626qcm4290sdx50msdx20mdm9215sd_455ipq8074_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125wsa8810wcn6856sd_8cwcn3680bsd835_firmwareipq6010_firmwareqca6696sd845_firmwaresa6150pqcn9022_firmwareqca9990_firmwareipq8070aqcn9072_firmwaresd720g_firmwareipq8071_firmwareqcn9074_firmwareipq4029sd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-36900
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-24.03% / 95.90%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:08
Updated-01 Jan, 2025 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_11_21h2windows_10_22h2windows_server_2022windows_10windows_11_22h2windows_server_2019windows_10_1607Windows Server 2022Windows 10 Version 1607Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-35644
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-4.04% / 88.23%
||
7 Day CHG~0.00%
Published-12 Dec, 2023 | 18:10
Updated-01 Jan, 2025 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Sysmain Service Elevation of Privilege Vulnerability

Windows Sysmain Service Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_11_23h2Windows Server 2022Windows 10 Version 21H2Windows 11 version 22H3Windows 11 version 22H2Windows 11 Version 23H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows 11 version 21H2Windows Server 2019Windows 10 Version 22H2
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-35312
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.39% / 59.78%
||
7 Day CHG~0.00%
Published-11 Jul, 2023 | 17:03
Updated-28 Feb, 2025 | 21:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability

Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607Windows 10 Version 22H2Windows 10 Version 21H2Windows Server 2016 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H2Windows Server 2019Windows Server 2012Windows 10 Version 1809Windows Server 2008 R2 Service Pack 1Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 11 version 21H2Windows Server 2022Windows Server 2012 R2Windows 10 Version 1507Windows Server 2012 (Server Core installation)Windows Server 2016Windows Server 2019 (Server Core installation)Windows 10 Version 1607
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-57258
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.04% / 13.04%
||
7 Day CHG~0.00%
Published-18 Feb, 2025 | 00:00
Updated-03 Nov, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64.

Action-Not Available
Vendor-denxdenx
Product-u-bootU-Boot
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-40635
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.01% / 2.30%
||
7 Day CHG~0.00%
Published-17 Mar, 2025 | 21:32
Updated-02 Oct, 2025 | 01:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
containerd has an integer overflow in User ID handling

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

Action-Not Available
Vendor-containerdThe Linux FoundationDebian GNU/Linux
Product-containerddebian_linuxcontainerd
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-22451
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.97%
||
7 Day CHG~0.00%
Published-28 Oct, 2021 | 12:31
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-22556
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 2.91%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 15:50
Updated-21 Apr, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow in Fuchsia Kernel

The Security Team discovered an integer overflow bug that allows an attacker with code execution to issue memory cache invalidation operations on pages that they don’t own, allowing them to control kernel memory from userspace. We recommend upgrading to kernel version 4.1 or beyond.

Action-Not Available
Vendor-Google LLC
Product-fuchsiaFuchsia Kernel
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-33018
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.18%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow to Buffer Overflow in User Identity Module

Memory corruption while using the UIM diag command to get the operators name.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwaresnapdragon_x20_lte_modemsd865_5gmdm9215_firmwaresnapdragon_xr1_platformqca8081_firmwaresm7250-absnapdragon_x50_5g_modem-rf_systemwcd9340_firmwarewcd9395_firmwareqcn6024sdm845qcc710_firmwareqca6426sc8180x-abwcn3610sm7325-ae_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395qca6574au_firmwarewcn785x-59207_lte_modem_firmwarewcd9341sd626_firmwaresnapdragon_x12_lte_modemsnapdragon_1100_wearable_platformwsa8810_firmwaresd730_firmwarewsa8845h_firmwaresdm670qcs5430sm8150-acsm6375_firmwaresd835_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7150-acqcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresm6375msm8108sm7250-aa_firmwaresc8180xp-acvideo_collaboration_vc1_platformwcd9385_firmwareqca6421qca6310snapdragon_630_mobile_platformwcd9360apq8053-aa_firmwaresa6155psm7150-ac_firmwareqca6564au_firmwaresd820mdm8207sm7325_firmwaresa6155p_firmwaremdm9640_firmwareqca6390_firmwaresd835qca6436_firmwaresnapdragon_wear_4100\+_platform_firmwaresc8180x-afsnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwareqts110sm4125_firmwaresm8250-ac_firmwareqca6420wcn3910mdm9205s_firmwarecsrb31024snapdragon_x70_modem-rf_system_firmwareqca9367snapdragon_wear_3100_platform_firmwaresnapdragon_845_mobile_platformmdm9250_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asm7325-aewcn3620_firmwareqca6174aqca6584_firmwarewcd9340snapdragon_630_mobile_platform_firmwareqcm2290sm6150-acsm6225snapdragon_auto_5g_modem-rf_gen_2sc8180xp-aa_firmwaresm8150-ac_firmwaresm8550p_firmwarewcn3998_firmwareqcm8550snapdragon_x20_lte_modem_firmwarewcn3988qcn9024mdm8615mqca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemsdm710_firmwaresdx57msc8180xp-ac_firmwareqcs410qcm2290_firmwaremdm8215m_firmwaresa8155pwsa8830sm8550psa6145pwcn785x-1_firmwaremdm8215mmdm8215msm8996auwcn3620snapdragon_208_processor_firmwaresnapdragon_x5_lte_modemqm215_firmwarewcn3950_firmwaremdm9205ssc7180-acsm7325p_firmwaresd460wcd9360_firmwares820a_firmwaremdm9615mvideo_collaboration_vc3_platform_firmwaresd670_firmwaresm7150-aaqcn6224_firmwareqca6431sd660_firmwaresdx57m_firmwaresm6350sxr2130_firmwarear8035_firmwareapq8009_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320sd888_firmwaremdm9215snapdragon_662_mobile_platform_firmwarewcd9306qcs6125_firmwaresdm712_firmwarewsa8815_firmwaresm8250-abqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresm7325sm8350-ac_firmwaresm7250p_firmwarewcn3680_firmwarewcn785x-5_firmwarewcn3950sm4250-aasnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresm4350_firmwaresm7350-ab_firmwarewcn3991apq8037sd_675_firmwaresm7250pcsrb31024_firmwaresa8155sm7150-aa_firmwaresnapdragon_845_mobile_platform_firmwaresd888sd460_firmwaresnapdragon_4_gen_2_mobile_platformwcn685x-5qca6310_firmwaresd626sm8250-acs820awcd9371sc8180xp-aasnapdragon_xr2_5g_platform_firmwarevision_intelligence_300_platform_firmwaresm7350-absm8350_firmwarevideo_collaboration_vc3_platformsnapdragon_212_mobile_platformqca6431_firmwaresm7225_firmware9205_lte_modem_firmwaresm6125qca6698aq_firmwareqcs22908998_firmwareqcs2290_firmwarewcn3615qca9367_firmwaremdm9615m_firmwarewcn3680wcd9390_firmwaresc8180xp-abwcn6750qca6430wcn6750_firmwaresc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_208_processorsm7250-ab_firmwaresnapdragon_1100_wearable_platform_firmware9206_lte_modem_firmwaremsm8108_firmwarecsra6640_firmwaresm4350wcn3998qca6420_firmwareqcs6490_firmwaresm8450snapdragon_x65_5g_modem-rf_systemsd855_firmwarewcd9335_firmwaremdm9640qca6436wcn3980_firmwaresnapdragon_1200_wearable_platformsnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwaresm4250-aa_firmwaremdm9310_firmwaremsm8905_firmwareqcs4290_firmwarecsra6620sdm670_firmwareqca8081mdm9628sd660sm4375wsa8815qca9377qcm4325_firmwaresm7125_firmwaresnapdragon_430_mobile_platformqcm4290_firmwaresnapdragon_425_mobile_platform_firmwaremdm9615_firmwareqcs5430_firmwaresg4150p_firmwaresc8180xp-af_firmwarecsra6620_firmwareqcs8550mdm8215_firmwaresd865_5g_firmwaresc7180-ad_firmwarewcd9375sdm712snapdragon_wear_2100_platformsa8145psd_675sm4350-ac_firmwareapq8053-aaar6003_firmwaresm7250-ac_firmwaresc7180-ac_firmwarewcn685x-1_firmwarewcn3680b_firmwareqcm8550_firmwareapq8017qcs410_firmwaresa6150p_firmwaresnapdragon_429_mobile_platform_firmwaremsm8905sw5100psxr1120vision_intelligence_300_platformqcs610_firmwarewcd9335wcd9370qca4004qca6696wcd9341_firmware8998qca6390wcn6740_firmwaresnapdragon_auto_4g_modem9205_lte_modemsm8150_firmwareqca6574auwcd9390csra6640sc8180x-af_firmwaremsm8209_firmwarewcn3660b_firmwaresd7309207_lte_modemqcn6024_firmwareqcm5430sm8350snapdragon_210_processor_firmwareqcm6125_firmwarec-v2x_9150snapdragon_wear_3100_platformqcc710mdm9615sxr1120_firmwaresnapdragon_x5_lte_modem_firmware315_5g_iot_modem_firmwaresda845sm8450_firmwaresnapdragon_wear_2100_platform_firmwareqfw7114315_5g_iot_modemsnapdragon_x55_5g_modem-rf_systemsa8155_firmwaresm7150-absnapdragon_wear_1300_platform_firmwareqca6335qcs4490sc7180-adsc8180xp-afmdm9250snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qca6421_firmwareqcm6125sc8180x-adsm7125wsa8810snapdragon_8\+_gen_2_mobile_platformsm8350-acqca6595ausm7315_firmwarewcd9326_firmwarewsa8840qcs8550_firmwareqfw7124_firmwarewcd9371_firmwareqcs4490_firmwarewcn3910_firmwareapq8009snapdragon_212_mobile_platform_firmwarewcd9370_firmwaremdm9310sa8195pqca6335_firmwareqcm6490snapdragon_wear_2500_platformsd675_firmwareqca6430_firmwaresc8180x-aaqcn9024_firmwarewsa8845hsa6150psm7250-aawcd9326sa8155p_firmwareqca6564asnapdragon_675_mobile_platformsnapdragon_wear_1300_platformsnapdragon_662_mobile_platformvision_intelligence_400_platform_firmwaresc8180x\+sdx55_firmwarear8035sa6155qcm4325qcn6224sm8475_firmwaresc8180x\+sdx55qca6698aqsm6250sm7250-acsc8180x-aa_firmwaresd670wcn685x-1sa8145p_firmwarewcn3680bsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_636_mobile_platform_firmwarewcn3990qcs6490wsa8830_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwaresnapdragon_675_mobile_platform_firmwaresm8475sm8250-ab_firmwaremsm8608_firmwaremsm8209qca6564ausm6225_firmwaresc8180xp-adsm6250p_firmwarear6003sm7325-af_firmwaresa8195p_firmwareapq8053-ac_firmwareqcm4290sd_455_firmwaresm6125_firmwaremsm8608snapdragon_1200_wearable_platform_firmwaresg8275p_firmwareqca9377_firmwareqcm6490_firmwaresm4125qcm4490_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformqcs6125sda845_firmwareapq5053-aa_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_439_mobile_platformqca4004_firmwareapq5053-aasdm710sd_455sm6250_firmwaresc8180x-ad_firmwareqca6584auqca6320_firmwareqcn6274_firmwaresw5100_firmwaresnapdragon_439_mobile_platform_firmwaresnapdragon_425_mobile_platformwcn6740sm6225-ad_firmwareqfw7114_firmwaresm8250_firmwaresm7225apq8017_firmwarewcd9380sa6145p_firmwaresa6155_firmwaresa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresm6225-adsd662_firmwaresm4350-acsdm660_firmwaresw5100snapdragon_430_mobile_platform_firmwareaqt1000wcd9306_firmwarec-v2x_9150_firmwaresm8150wcn3991_firmwaresd855sdm660sc8180x-ab_firmwarewcd9330_firmwarewcn3990_firmwaresm7315qca6564a_firmwarewcd9385msm8909w_firmwaresc8180xp-ab_firmwarewcd9330mdm8207_firmwaresd662wcn3610_firmwareqcs4290sd820_firmwaresg8275psm6250psdx55_firmwarewcn3615_firmwaresnapdragon_210_processorsxr2130qcm44908098_firmwaresnapdragon_wear_2500_platform_firmwaresnapdragon_636_mobile_platformsm7150-ab_firmwareqca6174a_firmwaresm7325papq8037_firmwareaqt1000_firmwaresm6150-ac_firmwaresdm429wqca6584au_firmwaresc8180x-acqcn6274qfw7124qca6595au_firmwaresc8180x-ac_firmwaresw5100p_firmwaresm8250qca6696_firmwareapq8053-acwcd9380_firmwareqca6574_firmwaresg4150pmdm9628_firmwaresm4375_firmwarevision_intelligence_400_platform9206_lte_modemqca6574a_firmwaresdx55sdm845_firmwaresm6350_firmwaresd675wcd9375_firmwareqca6391snapdragon_x70_modem-rf_systemwcn785x-1qts110_firmwareqca6584snapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_xr1_platform_firmware8098snapdragon_x50_5g_modem-rf_system_firmwareqm215wcn685x-5_firmwarewcn3988_firmwaremdm8615m_firmwaresnapdragon_wear_4100\+_platformwsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980msm8909wqcs610Snapdragonsnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-680
Integer Overflow to Buffer Overflow
CVE-2021-22418
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.21%
||
7 Day CHG~0.00%
Published-03 Aug, 2021 | 17:21
Updated-03 Aug, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-3410
Matching Score-4
Assigner-Fedora Project
ShareView Details
Matching Score-4
Assigner-Fedora Project
CVSS Score-7.8||HIGH
EPSS-0.21% / 43.66%
||
7 Day CHG~0.00%
Published-23 Feb, 2021 | 22:22
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context.

Action-Not Available
Vendor-libcaca_projectn/aDebian GNU/LinuxFedora Project
Product-debian_linuxfedoralibcacalibcaca
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2026-22801
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 3.07%
||
7 Day CHG~0.00%
Published-12 Jan, 2026 | 22:57
Updated-21 Jan, 2026 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.

Action-Not Available
Vendor-libpngpnggroup
Product-libpnglibpng
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-33022
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.69%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow to Buffer Overflow in HLOS

Memory corruption in HLOS while invoking IOCTL calls from user-space.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsw5100psxr1120vision_intelligence_300_platformqca6595snapdragon_xr1_platformqcs610_firmwarewcd9335wcd9370qca8081_firmwaresm7250-absnapdragon_x50_5g_modem-rf_systemqca6696wcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024qca6390qcc710_firmwareqca6426sc8180x-abwcn6740_firmwaresa4150psm7325-ae_firmwarewsa8832_firmwareqca8337qdu1110qca6426_firmwarewcd9395qca6574au_firmwareqcn7606_firmwarewcn785x-5qam8295psm8150_firmwarewcd9341qca6574auwcd9390wsa8810_firmwaresd730_firmwarewsa8845h_firmwarecsra6640sc8180x-af_firmwaresa9000p_firmwaresd730sdm670qcs5430sm8150-acsm6375_firmwareqcn6024_firmwaresm7150-acqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psm8350sa8770pqcm6125_firmwaressg2115pqcc710sm6375sa8540psm7250-aa_firmwaresxr1120_firmwareqsm8250_firmwaresc8180xp-acqsm8350_firmware315_5g_iot_modem_firmwaresm8450_firmwarevideo_collaboration_vc1_platformqru1032_firmwareqfw7114wcd9385_firmwareqca6421315_5g_iot_modemsnapdragon_x55_5g_modem-rf_systemqam8255p_firmwaresa8155_firmwaresm7150-abqcs603_firmwarewcd9360snapdragon_ar2_gen_1_platform_firmwaresc7180-adsc8180xp-afsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155pqca6421_firmwareqcm6125sm7150-ac_firmwaresc8180x-adsm7125wsa8810qam8650pqdu1000_firmwaresa9000pqsm8250snapdragon_8\+_gen_2_mobile_platformsm8350-acqca6595ausm7325_firmwaresm7315_firmwareqdu1010wcd9326_firmwaresa6155p_firmwarewsa8840qcs8550_firmwareqca6390_firmwareqdu1210_firmwareqfw7124_firmwareqca6436_firmwaresc8180x-afwcd9371_firmwaresnapdragon_8_gen_2_mobile_platformwcn3910_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwaresm8250-ac_firmwareqca6420wcn3910wcd9370_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqdu1110_firmwareqdu1000qca6574asm7325-aesa8195pwcd9340qcm2290qdu1210sm6150-acsm6225snapdragon_auto_5g_modem-rf_gen_2sc8180xp-aa_firmwareqcm6490sa8540p_firmwaresm8150-ac_firmwaresm8550p_firmwarewcn3998_firmwareqcm8550wcn3988qcn9024sa8775pqca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemsxr2230p_firmwaresd675_firmwaresdm710_firmwareqca6430_firmwaresc8180x-aasa8775p_firmwareqcs605qcn9024_firmwarewsa8845hsc8180xp-ac_firmwaresa6150psm7250-aawcd9326qcs410qcm2290_firmwaresa8155p_firmwaresa8155pwsa8830snapdragon_675_mobile_platformsnapdragon_662_mobile_platformsm8550psa6145psc8180x\+sdx55_firmwaresa8255p_firmwareflight_rb5_5g_platform_firmwarewcn785x-1_firmwarear8035sa6155qrb5165m_firmwareqcm4325qcn6224sc8280xp-absc8180x\+sdx55qca6698aqwcn3950_firmwaressg2125p_firmwaresm6250qrb5165nsc7180-acsm7250-acsc8180x-aa_firmwaresd670wcn685x-1sm7325p_firmwaresa8145p_firmwarewcd9360_firmwareqdx1011sa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformvideo_collaboration_vc3_platform_firmwarewcn3990sd670_firmwareqcs6490sc8280xp-bb_firmwarewsa8830_firmwaresm7150-aaqcn6224_firmwareqca6431wsa8845_firmwarewsa8832qcs603sm6350sxr2130_firmwaresnapdragon_675_mobile_platform_firmwarear8035_firmwareqrb5165msc8380xpsnapdragon_w5\+_gen_1_wearable_platform_firmwaresm8250-ab_firmwaresa4150p_firmwaresd888_firmwaresnapdragon_662_mobile_platform_firmwareqcs6125_firmwaresm6225_firmwaresc8180xp-adsm6250p_firmwaresm7325-af_firmwaresdm712_firmwarewsa8815_firmwaresm8250-absa8195p_firmwareqca8337_firmwareqcm4290sm7325sm6125_firmwaresg8275p_firmwareqcm6490_firmwaresm8350-ac_firmwaresm7250p_firmwaresm4125qru1032wcn785x-5_firmwarewcn3950flight_rb5_5g_platformsnapdragon_xr2_5g_platformsm4250-aaqcs6125apq5053-aa_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwaresm4350_firmwaresm7350-ab_firmwarewcn3991sa8295p_firmwaresd_675_firmwareapq5053-aasdm710sa4155p_firmwaresm7250psm6250_firmwaresa8155sc8180x-ad_firmwaresm7150-aa_firmwareqca6584ausd888qcn6274_firmwareqru1062_firmwaresw5100_firmwarewcn685x-5wcn6740sc8380xp_firmwareqru1062sm6225-ad_firmwareqfw7114_firmwareqcs605_firmwaresc8280xp-ab_firmwareqca6595_firmwaresm8250-acsm8250_firmwarewcd9371sc8180xp-aasm7225wcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwaresa8150pvision_intelligence_300_platform_firmwaresm7350-absnapdragon_auto_5g_modem-rf_firmwareqrb5165_firmwaresm8350_firmwaresxr1230psm6225-adsm4350-acsw5100video_collaboration_vc3_platformaqt1000sm8150wcn3991_firmwareqam8295p_firmwaresd855qca6431_firmwaresc8180x-ab_firmwaresm7225_firmwarewcn3990_firmwaresm7315sm6125qca6698aq_firmwareqcs2290wcd9385qcn7606qsm8350qcs2290_firmwaresc8280xp-bbsc8180xp-ab_firmwaresa8255pqcs4290sxr1230p_firmwarewcd9390_firmwaresc8180xp-abwcn6750qca6430sg8275pwcn6750_firmwaresm6250psdx55_firmwareqdx1011_firmwaresc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfsm7250-ab_firmwaressg2125pqru1052sxr2130sm7150-ab_firmwarecsra6640_firmwaresm4350snapdragon_xr2\+_gen_1_platformsm7325pqam8650p_firmwarewcn3998qca6420_firmwareaqt1000_firmwareqcs6490_firmwaresm8450sm6150-ac_firmwaresnapdragon_x65_5g_modem-rf_systemsd855_firmwarewcd9335_firmwareqrb5165n_firmwareqca6436wcn3980_firmwareqca6584au_firmwarewsa8835wsa8840_firmwareqca6391_firmwaresc8180x-acqcn6274qfw7124qdu1010_firmwareqca6595au_firmwaresc8180x-ac_firmwaresm4250-aa_firmwaresw5100p_firmwaresm8250snapdragon_ar2_gen_1_platformqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarecsra6620sdm670_firmwareqca8081wsa8815sm4375sg4150pqam8775pqca6797aqsm4375_firmwareqcm4325_firmwaresm7125_firmwareqca6574a_firmwaresdx55qcm4290_firmwaresm6350_firmwaresd675wcd9375_firmwareqca6391qrb5165wcn785x-1qcs5430_firmwaresg4150p_firmwareqru1052_firmwaresc8180xp-af_firmwarecsra6620_firmwaresa8770p_firmwaresa8295psnapdragon_8_gen_2_mobile_platform_firmwareqcs8550snapdragon_xr1_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqam8775p_firmwaresd865_5g_firmwaresc7180-ad_firmwarewcd9375wcn685x-5_firmwaresdm712wcn3988_firmwaresa8145psd_675sm4350-ac_firmwarewsa8835_firmwaressg2115p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwaresc7180-ac_firmwaresm7250-ac_firmwarewcn3980qdx1010wcn685x-1_firmwareqcs610Snapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-680
Integer Overflow to Buffer Overflow
CVE-2023-33032
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.69%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-16 Jun, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in TZ Secure OS

Memory corruption in TZ Secure OS while requesting a memory allocation from TA region.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqcn9070sa6150p_firmwaresa8145p_firmwareqcs610sm6250p_firmwaresnapdragon_x24_lte_modem_firmwarefsm10056csrb31024csra6620qca4024_firmwareqca8082qcn9072qca8386wcn3950_firmwaresc8180x\+sdx55sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresa6155ipq6000sd730_firmwaresnapdragon_auto_4g_modem_firmwarecsra6620_firmwarewcd9370sd_675_firmwaresd675_firmwarecsra6640_firmwareqcn5152_firmwareqca6564qcs6125_firmwarewcn3990_firmwareqcn9000_firmwareqca9377wcd9371_firmwarewcn3950qcn6024_firmwarefastconnect_6200qca8386_firmwaresnapdragon_7c_gen_2_compute_platformqca8084_firmwareqca8082_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6574au_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqca8081_firmwareqcn6023_firmwaresa6155_firmwarewcd9375_firmwarewcn3999_firmwareqca6420qca6564au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa6155p_firmwarewcd9306qcn9274qcs8155smart_audio_400_platform_firmwarewcn3999qcn5052qcs6125sa4155p_firmwaresa8155_firmwareipq6010qca4004_firmwarewcn3988_firmwareqca6430qcn9074sa6145p_firmwareqts110qca8085c-v2x_9150sm6250snapdragon_678_mobile_platform_firmwaresa8195psnapdragon_720g_mobile_platformsnapdragon_8cx_compute_platformwcd9306_firmwarewcd9340wsa8810_firmwarefsm10056_firmwarewcd9335sa6155pqca8081qcn6023qca6174a_firmwaresnapdragon_wear_1300_platform_firmwareqca8085_firmwarewcd9341qca6696_firmwarewcd9371ipq9008_firmwaresnapdragon_665_mobile_platform_firmwarecsr8811snapdragon_855_mobile_platform_firmwareaqt1000sa8150pwcd9375sc8180x\+sdx55_firmwaresm6250_firmwareqca4004sd855_firmwarewcn3988wsa8815_firmwaresa8195p_firmwareqcn5121fastconnect_6800_firmwareqcn5022_firmwareqca6564asnapdragon_7c_gen_2_compute_platform_firmwaresa4150psnapdragon_730_mobile_platform_firmwareqcm6125_firmwaresnapdragon_675_mobile_platform_firmwareqca8072snapdragon_855\+\/860_mobile_platform_firmwarewcd9380_firmwarewcn3990qcn9000sd_675snapdragon_8cx_gen_2_5g_compute_platformfastconnect_6800qca6595qca8084qca6564au9205_lte_modemipq9008snapdragon_8c_compute_platformqca6574csr8811_firmwaresnapdragon_auto_5g_modem-rfwcd9380sm6250psnapdragon_678_mobile_platformsnapdragon_x50_5g_modem-rf_systemqcs410snapdragon_855\+\/860_mobile_platformqca8075_firmwareqca6574asmart_audio_400_platformipq6005_firmwareqca6174ac-v2x_9150_firmwareqca8072_firmwareqca6430_firmwareqcn5052_firmwareqcn9274_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareipq6018_firmwareqca6574_firmwarewcd9340_firmwaresd855wsa8815qca6574a_firmwarefastconnect_6200_firmwareipq6028qcn5021qcn5152qcn9024snapdragon_665_mobile_platformipq9574_firmwaresnapdragon_730g_mobile_platformsnapdragon_x55_5g_modem-rf_system_firmwaresd730qca6391wcn3980_firmwaresnapdragon_x50_5g_modem-rf_system_firmware9205_lte_modem_firmwareaqt1000_firmwareipq6005snapdragon_7c_compute_platform_firmwaresnapdragon_8cx_compute_platform_firmwaresnapdragon_auto_4g_modemar8031_firmwarecsrb31024_firmwareqcn9070_firmwareipq6028_firmwareqca6574ausa8155p_firmwareipq9574qcn5122qca6564a_firmwareqcn9024_firmwarewcd9341_firmwareqcm6125wsa8810snapdragon_x24_lte_modemqcn5121_firmwaresnapdragon_730g_mobile_platform_firmwareqcs610_firmwareipq6018qcn5022sa6145psnapdragon_730_mobile_platformsnapdragon_8c_compute_platform_firmwareqca6564_firmwaresnapdragon_675_mobile_platformipq6010_firmwarear8031qca6595_firmwaresnapdragon_720g_mobile_platform_firmwaresa8145pqca6696snapdragon_732g_mobile_platformqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresa6150psdx55qca8075qcn5021_firmwareqcn9022_firmwarecsra6640qcn6024qcn9022sa8155psd675qcn9072_firmwareipq6000_firmwareqcs8155_firmwareqcn9074_firmwareqcs410_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_wear_1300_platformsa4155psnapdragon_7c_compute_platformsnapdragon_855_mobile_platformqts110_firmwareSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33038
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.75%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-14 Nov, 2024 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Radio Interface Layer

Memory corruption while receiving a message in Bus Socket Transport Server.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwaresm6250p_firmwareqcs610315_5g_iot_modem_firmwareqca8337qca6431_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwarewcd9360_firmwaresnapdragon_888_5g_mobile_platformwcn3950_firmwaresc8180x\+sdx55sa8150p_firmwaresm4450_firmwareqcs2290qca6595au_firmwaresa6155snapdragon_480_5g_mobile_platformsnapdragon_x70_modem-rf_systemcsra6620_firmwaresd_675_firmwarecsra6640_firmwaresnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcd9371_firmwarewcn3950qcn6024_firmwaresnapdragon_460_mobile_platformsd460_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca8081_firmwaresa6155_firmwarewcd9375_firmwareqca6420wcd9360snapdragon_782g_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_firmwaresmart_audio_400_platform_firmwareqca6698aqqcs6125sa8155_firmwaresd662_firmwaresnapdragon_765g_5g_mobile_platformqca6430snapdragon_678_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platformsnapdragon_720g_mobile_platformsnapdragon_8cx_compute_platformwcd9340snapdragon_780g_5g_mobile_platformsw5100qca6436sa6155psnapdragon_765_5g_mobile_platform_firmwareqca6698aq_firmwaresnapdragon_690_5g_mobile_platformwcd9341qca6431qca6696_firmwarewcd9371wcn3910_firmwaresnapdragon_855_mobile_platform_firmwaresa8150pwsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresnapdragon_7c_gen_2_compute_platform_firmwaresnapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresw5100psnapdragon_8cx_gen_2_5g_compute_platformsnapdragon_w5\+_gen_1_wearable_platformqca6564ausnapdragon_7c\+_gen_3_computewcd9380snapdragon_782g_mobile_platformfastconnect_6700qcs410qca6430_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815wcn3910snapdragon_865\+_5g_mobile_platformsnapdragon_4_gen_1_mobile_platformqca6426_firmwaresm4450qcn9024wcn3980_firmwaresd730snapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwarewcn6740_firmwaresnapdragon_8cx_compute_platform_firmwareqcs4490_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_systemfastconnect_6900fastconnect_6900_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresnapdragon_x24_lte_modemwsa8832sw5100p_firmwareqcs610_firmwaresa6145psnapdragon_730_mobile_platformqcs4490sa8145psnapdragon_750g_5g_mobile_platformsnapdragon_888\+_5g_mobile_platform_firmwareqca6391_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675snapdragon_695_5g_mobile_platformsnapdragon_720g_mobile_platform_firmwaresnapdragon_855_mobile_platformar8035_firmwareqcm2290snapdragon_480\+_5g_mobile_platformsnapdragon_662_mobile_platform_firmwarewsa8830sa8145p_firmwareqcs2290_firmwaresnapdragon_x24_lte_modem_firmwarecsrb31024snapdragon_865_5g_mobile_platformcsra6620qcs4290snapdragon_888_5g_mobile_platform_firmwareqca6420_firmwaresd730_firmwaresnapdragon_auto_4g_modem_firmwarewcd9370sd675_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6426wcn3990_firmwareqca9377wcd9385_firmwarewcd9326_firmwarefastconnect_6200snapdragon_7c_gen_2_compute_platformsd662sa8155snapdragon_x55_5g_modem-rf_systemsdx55_firmwaresnapdragon_778g_5g_mobile_platformqca6595ausm7250p_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_x70_modem-rf_system_firmwareqcs6490qcs8550_firmwarewcn3988_firmware315_5g_iot_modemsa6145p_firmwareqca6421sm6250fastconnect_6700_firmwaresa8195pwsa8810_firmwarewcd9326wcd9335sg4150pqca8081qcm4490snapdragon_888\+_5g_mobile_platformqca6174a_firmwareqcs4290_firmwarewcd9385sxr2130_firmwareqcs6490_firmwaresnapdragon_665_mobile_platform_firmwarear8035wcd9375aqt1000sc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_768g_5g_mobile_platform_firmwareqcm6490wsa8815_firmwarewsa8835_firmwaresg4150p_firmwareqcm6125_firmwareqcm4325qcm2290_firmwaresnapdragon_855\+\/860_mobile_platform_firmwarewcn3990sd_675sd865_5gfastconnect_6800snapdragon_8c_compute_platformsd888wsa8835snapdragon_auto_5g_modem-rfsm6250psnapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresxr2130qca6574asmart_audio_400_platformqca6174asm7325psd855sm7325p_firmwaresdx57m_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformsm7315sd460qca6391snapdragon_x55_5g_modem-rf_system_firmwarefastconnect_7800aqt1000_firmwaresnapdragon_7c_compute_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_auto_4g_modemqcm4290csrb31024_firmwareqcm6490_firmwarewsa8832_firmwareqca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_765g_5g_mobile_platform_firmwaresnapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_8c_compute_platform_firmwaresnapdragon_675_mobile_platformwcn6740qca6696snapdragon_732g_mobile_platformqcs8550sa6150psnapdragon_x50_5g_modem-rf_systemsnapdragon_768g_5g_mobile_platformqcn6024snapdragon_765_5g_mobile_platformsm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresw5100_firmwareqcs410_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_7c_compute_platformSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-38215
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.73% / 72.16%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 17:30
Updated-10 Jul, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2022_23h2windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_11_23h2Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2022Windows 11 version 22H2Windows 11 Version 24H2Windows 11 Version 23H2Windows Server 2019 (Server Core installation)Windows 11 version 21H2Windows 10 Version 22H2Windows 10 Version 1809Windows Server 2019Windows 10 Version 21H2
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-38034
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.33% / 79.64%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 17:02
Updated-10 Feb, 2026 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Filtering Platform Elevation of Privilege Vulnerability

Windows Filtering Platform Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows 11 version 21H2Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows Server 2012 R2Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2012Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-38080
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-13.65% / 94.08%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 17:02
Updated-10 Feb, 2026 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-07-30||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Windows Hyper-V Elevation of Privilege Vulnerability

Windows Hyper-V Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_22h2windows_11_23h2windows_server_2022windows_server_2022_23h2windows_11_21h2Windows Server 2022Windows 11 version 21H2Windows 11 Version 23H2Windows 11 version 22H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-1059
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.78%
||
7 Day CHG~0.00%
Published-08 Jan, 2021 | 15:05
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input index is not validated, which may lead to integer overflow, which in turn may cause tampering of data, information disclosure, or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).

Action-Not Available
Vendor-nutanixVMware (Broadcom Inc.)NVIDIA CorporationCitrix (Cloud Software Group, Inc.)Red Hat, Inc.
Product-enterprise_linux_kernel-based_virtual_machinehypervisorvirtual_gpu_managervsphereahvNVIDIA Virtual GPU Manager
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-33107
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.25% / 47.57%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:04
Updated-28 Oct, 2025 | 13:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-12-26||Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
Integer Overflow or Wraparound in Graphics Linux

Memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-msm8996auqcs8155snapdragon_626_mobile_platform_firmwarewcn3990_firmwareaqt1000_firmwaresnapdragon_865\+_5g_mobile_platformqca6426_firmwareqcs6490snapdragon_750g_5g_mobile_platform_firmwarerobotics_rb5_platformsnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_wear_2100_platform_firmwareqcs5430sa8150p_firmwaresnapdragon_685_4g_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_wear_3100_platformwcd9385qcn6024_firmwarewsa8835_firmwareqcn9074_firmwaresnapdragon_429_mobile_platformsnapdragon_208_processorwcn3680_firmwaremsm8108wcd9341_firmwarear8035_firmwareqca6698aq_firmwarewcn3660bqualcomm_205_mobile_platformqam8775p_firmwaresm8550pqcs8155_firmwaresnapdragon_480\+_5g_mobile_platformqca6391snapdragon_8\+_gen_2_mobile_platform_firmwarefastconnect_6900sa8145p_firmwareqca8081_firmwaresa9000pqam8295p_firmwarevision_intelligence_200_platformqca8081snapdragon_425_mobile_platform_firmwaresa8770psnapdragon_480\+_5g_mobile_platform_firmwareqca6574qca6431snapdragon_690_5g_mobile_platformsnapdragon_778g_5g_mobile_platform_firmwareqca6436_firmwaresmart_audio_400_platform_firmwaresnapdragon_730_mobile_platform_firmwaresa8775pwsa8830qcs5430_firmwareqcm6490qcs8550_firmwaresnapdragon_695_5g_mobile_platformqcs8250_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwarewcd9340snapdragon_w5\+_gen_1_wearable_platform_firmwareqcs8550snapdragon_212_mobile_platform_firmwaresnapdragon_660_mobile_platform_firmwareqca6564aqualcomm_215_mobile_platform_firmwareqcm6125_firmwaresnapdragon_210_processorsd730snapdragon_425_mobile_platformqcs4490qca6430sa8775p_firmwareqca6420_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_765_5g_mobile_platformsd888snapdragon_665_mobile_platformapq8064au_firmwaresd660_firmwarewcd9326_firmwaremsm8608_firmwarewcd9380_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_429_mobile_platform_firmwareqcs4290snapdragon_765g_5g_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwareqca6595auqcn9012_firmwaresnapdragon_720g_mobile_platform_firmwareqcm4490snapdragon_xr1_platformsa8255psnapdragon_632_mobile_platform_firmwaresm6250qcm6490_firmwarewcd9395_firmwareqrb5165nsm7250p_firmwaresd855snapdragon_439_mobile_platform_firmwareqcm6125snapdragon_678_mobile_platformmsm8996au_firmwaresm7325pwsa8845_firmwareqcm4290snapdragon_636_mobile_platform_firmwarefastconnect_6200qcn9011_firmwaresa6150p_firmwaresnapdragon_888_5g_mobile_platformwcd9370_firmwaresnapdragon_480_5g_mobile_platformwcn6740snapdragon_678_mobile_platform_firmwaresnapdragon_730_mobile_platformqcs6125_firmwarefastconnect_6900_firmwaresnapdragon_662_mobile_platformsw5100pwsa8810_firmwareqca9377snapdragon_210_processor_firmwareqcs7230snapdragon_208_processor_firmwaresnapdragon_8_gen_2_mobile_platformsa8150psnapdragon_x20_lte_modem_firmwaresa4155psnapdragon_670_mobile_platform_firmwareqca6174a_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_x12_lte_modem_firmwaresd626_firmwarewcn3620wcn3610_firmwaremsm8608snapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_888\+_5g_mobile_platform_firmwaresnapdragon_ar2_gen_1_platformwsa8810sm4125_firmwaresmart_display_200_platform_firmwaresdm429w_firmwarec-v2x_9150snapdragon_685_4g_mobile_platformflight_rb5_5g_platform_firmwaresnapdragon_782g_mobile_platformqcn9024mdm9250_firmwarewcd9395wcn3680brobotics_rb3_platform_firmwaresnapdragon_670_mobile_platformar8031snapdragon_665_mobile_platform_firmwarecsra6620_firmwaresnapdragon_845_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platformqcm4325_firmwaresm7315wcd9341flight_rb5_5g_platformqca6335robotics_rb3_platformar8035qcm2290_firmwareqcm8550wsa8832_firmwarewcn3680sd_675qca9377_firmwaresa8195p_firmwaresa6150psnapdragon_auto_4g_modemsdm429wwcn3988_firmwarewcn3660b_firmwaresa8155psnapdragon_778g_5g_mobile_platformsnapdragon_732g_mobile_platform_firmwaressg2125p_firmwaresdx55_firmwareqca6696_firmwarerobotics_rb5_platform_firmwaresnapdragon_460_mobile_platformwsa8832wcn3950_firmwarewcd9375sxr1120_firmwareqca6564video_collaboration_vc3_platformsnapdragon_675_mobile_platform_firmwareqcs2290qrb5165msm4125apq8017_firmwaresnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platformwcn3610qcs4290_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcd9390_firmwareaqt1000sm7325p_firmwareqsm8250sd_675_firmwarewsa8815wcd9370sd865_5g_firmwaresmart_audio_200_platform_firmwaresnapdragon_636_mobile_platformwsa8815_firmwaresnapdragon_626_mobile_platformsnapdragon_8_gen_1_mobile_platformqualcomm_205_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwaresnapdragon_x65_5g_modem-rf_systemwcn3988snapdragon_625_mobile_platformqrb5165m_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcd9335snapdragon_662_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platformsd675qca6335_firmwaresnapdragon_xr2_5g_platform_firmwaresd_8_gen1_5gcsrb31024_firmwarefastconnect_6800msm8909w_firmwareqca6421_firmwaresd888_firmwareqca6574_firmwareqca6698aqsxr1230psxr2230psa8155wsa8845h_firmwaresnapdragon_675_mobile_platformmdm9650snapdragon_auto_5g_modem-rfsnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_x50_5g_modem-rf_systemqam8650pqca6320_firmwareqrb5165n_firmwaresd670_firmwaremsm8209sg4150p_firmwaresnapdragon_212_mobile_platformwcn6740_firmwaressg2125pwcd9371wcn3615sd855_firmwareqcn9012qca6420qca6430_firmwarewsa8845sw5100p_firmwaresnapdragon_439_mobile_platformvision_intelligence_300_platform_firmwaresxr1120fastconnect_7800_firmwareqca6391_firmwareqsm8250_firmwaresm7315_firmwaresnapdragon_855_mobile_platformcsra6640sa4150psa8255p_firmwareqca6595sd660snapdragon_765_5g_mobile_platform_firmwaresnapdragon_730g_mobile_platform_firmwarewcn3615_firmwaresnapdragon_888\+_5g_mobile_platformfastconnect_6700msm8209_firmwareqam8295psa6155snapdragon_x12_lte_modemar8031_firmwaresmart_audio_200_platformwsa8840snapdragon_xr2_5g_platformwcd9385_firmwaresnapdragon_680_4g_mobile_platformqam8775pqcm2290sdx20msnapdragon_8\+_gen_2_mobile_platformcsra6640_firmwarewsa8830_firmwareqcs6125qam8255p_firmwaresnapdragon_x24_lte_modemsg4150psd626snapdragon_660_mobile_platformqca6797aq_firmwaressg2115p_firmwareqcs410fastconnect_6800_firmwarevideo_collaboration_vc5_platformsnapdragon_4_gen_1_mobile_platform_firmwarefastconnect_6200_firmwareqcs4490_firmwaresnapdragon_780g_5g_mobile_platformqca6421snapdragon_auto_4g_modem_firmwaresd835_firmwaresnapdragon_wear_4100\+_platformsnapdragon_690_5g_mobile_platform_firmwaresnapdragon_wear_4100\+_platform_firmwaresnapdragon_680_4g_mobile_platform_firmwaresm6250_firmwaresg8275psnapdragon_845_mobile_platformqam8255psa8155p_firmwareqca6310_firmwareqca6595au_firmwaresa6155pqcs410_firmwareqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwarewcn3910_firmwaresd670msm8108_firmwaresnapdragon_7c\+_gen_3_computeqca6426wsa8845hsw5100_firmwareqcn6024qcs610apq8064auapq8017mdm9650_firmwarewcn3910snapdragon_x20_lte_modemqcs7230_firmwarevision_intelligence_300_platformqca6574a_firmwaresnapdragon_732g_mobile_platformsxr2130snapdragon_625_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcd9326qca6797aqsnapdragon_768g_5g_mobile_platformsnapdragon_8_gen_2_mobile_platform_firmwareqam8650p_firmwaresxr1230p_firmwaresnapdragon_710_mobile_platformwcn3620_firmwaresd730_firmwaresnapdragon_8\+_gen_1_mobile_platformqualcomm_215_mobile_platformwcn3980_firmwaresa8770p_firmwaresa8295p_firmwaresnapdragon_wear_2500_platformwcn3680b_firmwaresd835snapdragon_x55_5g_modem-rf_systemqcm4290_firmwaresd_8_gen1_5g_firmwareqca8337snapdragon_820_automotive_platformqcs610_firmwareqca6564_firmwaresnapdragon_630_mobile_platformsnapdragon_835_mobile_pc_platform_firmwaresxr2230p_firmwaresnapdragon_632_mobile_platformsnapdragon_870_5g_mobile_platformsmart_audio_400_platformqca6310qca6595_firmwaresmart_display_200_platformqcn9011qca6574au_firmwareqcm8550_firmwarewsa8835sdx20m_firmwaresa8155_firmwaresa6145pwcd9335_firmwaremsm8909wsnapdragon_865\+_5g_mobile_platform_firmwarewcd9390snapdragon_wear_2500_platform_firmwaresa4150p_firmwareqca6174asa9000p_firmwareqcm4325wcd9340_firmwareqcs6490_firmwaresa8195pssg2115pwcn3980video_collaboration_vc3_platform_firmwarevideo_collaboration_vc5_platform_firmwaresa6155_firmwaresdx55sa8295pfastconnect_6700_firmwareqcm5430_firmwareqca6564a_firmwareqcm5430qcs2290_firmwarevision_intelligence_400_platform_firmwaresg8275p_firmwarewcd9375_firmwaresnapdragon_768g_5g_mobile_platform_firmware315_5g_iot_modemsnapdragon_765g_5g_mobile_platformwcd9380qca6574ausa4155p_firmwaresa6145p_firmwarevideo_collaboration_vc1_platformsnapdragon_xr2\+_gen_1_platformsw5100qcn9024_firmwarevision_intelligence_100_platformcsra6620c-v2x_9150_firmwarewcn3990snapdragon_x50_5g_modem-rf_system_firmwareqca6436snapdragon_720g_mobile_platformcsrb31024snapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_870_5g_mobile_platform_firmwaresa6155p_firmwareqca6431_firmwareqcs8250sm7250pvision_intelligence_100_platform_firmwareqca8337_firmwaresd865_5gsxr2130_firmwaresd675_firmwarefastconnect_7800video_collaboration_vc1_platform_firmwaresnapdragon_460_mobile_platform_firmware315_5g_iot_modem_firmwareqca6564au_firmwareqca6696snapdragon_782g_mobile_platform_firmwarevision_intelligence_200_platform_firmwarevision_intelligence_400_platformqca6320snapdragon_865_5g_mobile_platformsnapdragon_wear_2100_platformqca6574asnapdragon_4_gen_1_mobile_platformsnapdragon_480_5g_mobile_platform_firmwaresnapdragon_730g_mobile_platformwsa8840_firmwareqca6564ausnapdragon_888_5g_mobile_platform_firmwarewcd9371_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_835_mobile_pc_platformsnapdragon_w5\+_gen_1_wearable_platformsnapdragon_630_mobile_platform_firmwaresa8145pqcn9074wcn3950mdm9250snapdragon_wear_3100_platform_firmwareSnapdragonsnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_626_mobile_platform_firmwarewcn3990_firmwareaqt1000_firmwareqca6320_firmwareqca6426_firmwareqrb5165n_firmwaresd670_firmwaresg4150p_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x65_5g_modem-rf_system_firmwarewcn6740_firmwaresd855_firmwaresnapdragon_wear_2100_platform_firmwareqca6430_firmwaresa8150p_firmwaresw5100p_firmwareqcn6024_firmwareqcn9074_firmwarewsa8835_firmwarevision_intelligence_300_platform_firmwarefastconnect_7800_firmwareqca6391_firmwareqsm8250_firmwaresm7315_firmwarear8035_firmwareqca6698aq_firmwareqcs8155_firmwarewcd9341_firmwaresa8255p_firmwarewcn3680_firmwareqam8775p_firmwaresa8145p_firmwareqca8081_firmwareqam8295p_firmwaresnapdragon_425_mobile_platform_firmwarewcn3615_firmwaresnapdragon_778g_5g_mobile_platform_firmwareqca6436_firmwaremsm8209_firmwaresmart_audio_400_platform_firmwareqcs5430_firmwarear8031_firmwareqcs8550_firmwareqcs8250_firmwarewcd9385_firmwarewsa8830_firmwarequalcomm_video_collaboration_vc1_platform_firmwarecsra6640_firmwaresnapdragon_212_mobile_platform_firmwarequalcomm_video_collaboration_vc3_platform_firmwaresnapdragon_660_mobile_platform_firmwarequalcomm_215_mobile_platform_firmwareqcm6125_firmwareqam8255p_firmwaresa8775p_firmwareqca6420_firmwareqca6797aq_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwaressg2115p_firmwarefastconnect_6800_firmwareapq8064au_firmwaresnapdragon_4_gen_1_mobile_platform_firmwarefastconnect_6200_firmwaresd660_firmwarewcd9326_firmwaremsm8608_firmwareqcs4490_firmwarewcd9380_firmwaresnapdragon_auto_4g_modem_firmwaresnapdragon_855_mobile_platform_firmwaresd835_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platform_firmwaresm6250_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_429_mobile_platform_firmwaresa8155p_firmwareqca6310_firmwaresnapdragon_xr1_platform_firmwareqca6595au_firmwareqcs410_firmwareqcn9012_firmwaresnapdragon_720g_mobile_platform_firmwareqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwarewcn3910_firmwaresnapdragon_632_mobile_platform_firmwareqcm6490_firmwaremsm8108_firmwarewcd9395_firmwaresm7250p_firmwaresw5100_firmwaresnapdragon_439_mobile_platform_firmwaremsm8996au_firmwaremdm9650_firmwarewsa8845_firmwaresnapdragon_636_mobile_platform_firmwarewcd9370_firmwareqcn9011_firmwaresa6150p_firmwareqcs7230_firmwareqca6574a_firmwarewsa8845h_firmwareqcs6125_firmwarefastconnect_6900_firmwaresnapdragon_625_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresxr1230p_firmwareqam8650p_firmwarewsa8810_firmwarequalcomm_video_collaboration_vc5_platform_firmwarewcn3620_firmwaresnapdragon_210_processor_firmwaresnapdragon_208_processor_firmwaresnapdragon_x20_lte_modem_firmwaresd730_firmwaresnapdragon_670_mobile_platform_firmwareqca6174a_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_x12_lte_modem_firmwaresd626_firmwarewcn3980_firmwaresa8770p_firmwarewcn3610_firmwarewcn3680b_firmwareqcm4290_firmwaresd_8_gen1_5g_firmwareqcs610_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqca6564_firmwaresnapdragon_835_mobile_pc_platform_firmwaresxr2230p_firmwaresm4125_firmwaresdm429w_firmwareqca6595_firmwareflight_rb5_5g_platform_firmwareqca6574au_firmwaremdm9250_firmwareqcm8550_firmwaresdx20m_firmwaresa8155_firmwarewcd9335_firmwarerobotics_rb3_platform_firmwaresnapdragon_wear_2500_platform_firmwaresa4150p_firmwaresnapdragon_665_mobile_platform_firmwarecsra6620_firmwaresnapdragon_845_mobile_platform_firmwaresa9000p_firmwareqcm4325_firmwarewcd9340_firmwareqcm2290_firmwaresa6155_firmwarewsa8832_firmwareqca9377_firmwarefastconnect_6700_firmwareqcm5430_firmwareqca6564a_firmwareqcs2290_firmwaresa8195p_firmwarevision_intelligence_400_platform_firmwaresg8275p_firmwarewcd9375_firmwarewcn3660b_firmwarewcn3988_firmwaresdx55_firmwaressg2125p_firmwaresa4155p_firmwareqca6696_firmwarerobotics_rb5_platform_firmwaresa6145p_firmwareqcn9024_firmwarewcn3950_firmwarec-v2x_9150_firmwaresxr1120_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_675_mobile_platform_firmwaresa6155p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareapq8017_firmwareqca6431_firmwareqca8337_firmwareqcs4290_firmwaresd675_firmwaresnapdragon_865_5g_mobile_platform_firmwaresxr2130_firmwaresm7325p_firmwarewcd9390_firmware315_5g_iot_modem_firmwaresnapdragon_460_mobile_platform_firmwaresd_675_firmwareqca6564au_firmwaresd865_5g_firmwaresmart_audio_200_platform_firmwarewsa8815_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwaresnapdragon_662_mobile_platform_firmwareqrb5165m_firmwarewsa8840_firmwareqca6335_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_888_5g_mobile_platform_firmwarewcd9371_firmwarecsrb31024_firmwaremsm8909w_firmwareqca6421_firmwareqca6574_firmwaresd888_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_630_mobile_platform_firmwaresa8295p_firmwareqcs6490_firmwaresnapdragon_wear_3100_platform_firmwareMultiple Chipsets
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-1895
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 9.22%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 09:10
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible integer overflow due to improper length check while flashing an image in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qca9377_firmwareqpm5679_firmwaresm6250p_firmwareipq4028_firmwareqca8337qdm5579ar9380ipq8173_firmwareqfs2608_firmwareqfs2530qpm8870_firmwareqln1030pm6125qat5522_firmwarewcn3950_firmwarepm8150aqdm5670qca6595au_firmwareqpm5541_firmwareqpa5581_firmwaresa6155pm7150lqcc1110_firmwarepm8998_firmwareqpa8821wtr5975_firmwareqcs6125_firmwarepm456_firmwareqpa5580_firmwaresa415mwcn3998wcd9371_firmwarewcn3950sm4125sd720gqsw8573_firmwarewcn3660bsd450_firmwareqfe4320qsw8574_firmwaresd460_firmwaresmb2351_firmwarepm8953_firmwaresd6905gqpa4360_firmwareqca8081_firmwareqfe2520_firmwarewcn3998_firmwareapq8009w_firmwarepm855papq8053_firmwareqca6420pm6150aqpm6670_firmwareipq8070_firmwareipq8065ipq8078a_firmwarepm660_firmwarepm8150bipq8072_firmwaresa8155_firmwareipq8068qfe2101qca6430qat3522pmr735awcd9340sd765gsdr660qfs2630_firmwaresdr865qdm5620_firmwaresmb1358qca9888_firmwaresmr545qca6696_firmwareqln5020wcd9371sd870_firmwarepmm855au_firmwaresa8150ppm6350qdm5621qfe3340qtc800sqat3514_firmwareqca9992_firmwaresd660qet6105pm640p_firmwaresd660_firmwarewcn6750_firmwareqat5516_firmwarepm6150lsd450sd8885gpm855l_firmwareqca6428_firmwareqca9985_firmwareqtc410sipq4018_firmwarewcn3991qca9980_firmwareqpa8801sdm429wpm8150l_firmwareipq8173qat5533_firmwaresdx55m_firmwaresdxr25gqpa8673_firmwarepm6150smb1354_firmwaresd670_firmwareqca6574sd632_firmwareqfs2630qpa8842csr8811_firmwaresdr052_firmwarewcd9380qualcomm215qln4640qcs410qpm5579_firmwaresmb1380_firmwareqfe4309_firmwarepmk8350_firmwaresmb1381pm855p_firmwarepm7250wtr4905qpa8803sdx24_firmwareqca9985sd439_firmwaresdxr25g_firmwareqdm2301ipq6018_firmwarewcd9340_firmwarewsa8815wcn6850qfe2101_firmwareqdm5621_firmwareqdm2301_firmwareqpm6375ipq6028ipq8064wcn3980_firmwaresd730pm660l_firmwarepm6250_firmwarewcn6740_firmwarepm8008pm8350b_firmwareqtm525_firmwarepme605_firmwarepme605sd678_firmwareqpm5621_firmwareqln1021aq_firmwareqcs603rsw8577qpa6560_firmwareqca9994qpa8802_firmwareqln4640_firmwareqfe4308_firmwareqca9980qpm5621qpm6582ipq8174_firmwareapq8009wpm8009_firmwareqfe4303qfs2580_firmwaresd670qcm4290_firmwarepm8150lpmi8998_firmwareqcs610_firmwaresa6145ppm660a_firmwarepm215pm4250qca9886_firmwarear8031qpm5577wtr2965sa2150pqca6391_firmwarepm8150qca4024pmi8937_firmwarewcd9370_firmwareqat3516_firmwaresdx55apq8053csra6640pm8350bhsqat3555_firmwareqpa8803_firmwarewcn3660pm855bsmb2351qln1031qpm5870pm8909wsa8830pm660qet6110_firmwareqdm5579_firmwareqpm6325pm6125_firmwareqbt1500qpa5581csrb31024pmx24_firmwareqbt1500_firmwareqpm5870_firmwareqca9992qcs4290pmm855auqet6100qca6420_firmwaresmb1394_firmwaresmb1396pm7150asd675_firmwareipq8072pm8350qca6564qpa4361_firmwarepm8350c_firmwareqpa5461_firmwareqca6426wcn3990_firmwareqca9984_firmwareqca9377qpm5641qpa5373_firmwarewcd9385_firmwareqdm5650_firmwareqpa4340_firmwarewcd9326_firmwarewcn3615_firmwarewtr2955pm7250_firmwaresdr845_firmwareqdm5620qln1021aqipq8074asmb1380pmk8002_firmwareqsw6310_firmwaresa8155qln1031_firmwareqdm4650_firmwareqcn5122_firmwarepmm6155au_firmwareqat5533sdx55_firmwarewcn3615sm7250p_firmwarewcn3610_firmwareqsm7250_firmwareqpm6670pm7150l_firmwareqca6584auqpm4641qat5515_firmwareipq8174pm855qpm8830_firmwaresd429pm8250qdm4643qfs2530_firmwaresa415m_firmwarepmx55qpm4641_firmwarewcn3988_firmwaresd205sd429_firmwarepm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwaresa8195psdr735_firmwarepm8953qat5515qpm5677qat3514wcd9326wcd9335pm6350_firmwarepm8004_firmwaresdr8150_firmwareqcs4290_firmwarepm439qtc800h_firmwarepmk7350_firmwareqpm5620qpm4630qca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375sm6250_firmwarepmm8195auqln4642msm8917_firmwareqpm5677_firmwareipq8074a_firmwarewsa8815_firmwarepmi8937pm8998pmk7350sdw3100qpm8820_firmwaresmr525_firmwarewtr3925_firmwareqfe4301_firmwareapq8017qln1020_firmwareqpm6621_firmwarepm670a_firmwareqcm6125_firmwarepmx55_firmwarewtr2955_firmwareqfe4373fc_firmwareqca6595pm8150_firmwaresmb1398_firmwareqpm8830qat5522ipq8065_firmwarepm8150cpmr735bsd665_firmwareqpa4360pmk8003_firmwareqca8075_firmwareqpa4361qpm4640_firmwareqpm5577_firmwareqdm5679_firmwarepm8350csmr525qca9888qca6310_firmwareqfe4305_firmwareipq8070a_firmwarepm6150l_firmwarepmr525pm8150a_firmwareqca6574_firmwareqca9886qln1036aq_firmwaresd665pm6150a_firmwarepm6150_firmwaresd765qca6574a_firmwareqpm4630_firmwareqat3555qpa5461sd8c_firmwarewtr2965_firmwarepm670_firmwarecsrb31024_firmwareqfs2608sd480_firmwareqln1036aqqtc801sipq6028_firmwareipq8072a_firmwareqpm5641_firmwareqca9889_firmwaresd710qcn5122pm8008_firmwareqpm6621pmr735a_firmwarepmw3100pmx50qca6564_firmwaresdr8250sd768gqln1030_firmwarewcn6740pmw3100_firmwarepm8004pm640lpmk8002qca8075sd845ipq6000_firmwareqcs410_firmwareqpa5580qpm5579qfe2550sa6150p_firmwareqcs610qcn5550qpm5620_firmwareqdm2307qca6431_firmwareqpa8802wcd9360_firmwareqpm6585_firmwareqat3519qbt2000_firmwareqca4024_firmwareipq8078aqtc800hsa8150p_firmwareqcs2290sdr8250_firmwareqca6335msm8917csra6620_firmwareqcs605_firmwareqln1020smr546_firmwareqdm5671csra6640_firmwarepmc1000hqpm4650_firmwareqat3518sd8csd632sdr425_firmwaresmr526_firmwareipq8076apm640a_firmwarewgr7640_firmwareqdm2305_firmwareqpm5670_firmwaresd710_firmwareqca6428qdm5652qca6574au_firmwareipq8071qpm8870wcd9375_firmwareqpm5679qbt2000sa6155_firmwaremsm8909wwcd9360qca6438_firmwarepmx50_firmwareqpa8675_firmwaresdr735gwcn3999qdm3301_firmwareqca7500qsm7250ipq4029_firmwareqcs6125ipq6010sd662_firmwareqcc1110qcs405smb1360qualcomm215_firmwarersw8577_firmwareqdm2308_firmwarepm439_firmwareqca6436wcn6851sa6155pqcs603_firmwareqpa6560sdr675_firmwarewcn3660_firmwarewcd9341ipq8068_firmwarepmi8952pm8937_firmwareqca6431qdm4643_firmwaresm7350_firmwareqet4100_firmwaresd750gqfe4320_firmwareqdm3302wcn3910_firmwareqpm5657qpm5875_firmwarewsa8830_firmwaresd855_firmwareqdm5650wcn3988qca6438wtr3925sdr052sa8195p_firmwaresmb1390sdw3100_firmwareqca9898ipq4028qet4100wcn3610qpa8686_firmwareqpm6585qca8337_firmwaresda429w_firmwarewcd9380_firmwaresmb1355ipq8072aqca7500_firmwareqln4650sdr735g_firmwarepm8350bhs_firmwarewgr7640ipq8076a_firmwareqat5568qdm5671_firmwareqet5100qca6564auqpa8801_firmwareqtm527_firmwarewcn6856_firmwarepm8005_firmwareqet4101_firmwarepm7250bqln4642_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwaresdx50m_firmwaresdr735smb1395pm660lsmr526wtr5975qca6430_firmwarepmk8003qtc801s_firmwarewcd9335_firmwareqat3522_firmwarewcn3980pm7350c_firmwareqca6335_firmwareqsw8573qcs605wcn3910smb1394qca6426_firmwarepm8350_firmwarewcn3660b_firmwarewcn3680qca9984qfe4309pm8009qpa8675qcn5550_firmwaresdr051_firmwaresdx55mipq8064_firmwarepm670aqca6421_firmwareqfe4373fcmsm8953qat3518_firmwarepmi8998qfe2520qsw8574sd6905g_firmwarear8031_firmwarewcn3680_firmwarepm855lwcn6851_firmwareqdm5670_firmwareipq8070sd8655gpm7150a_firmwarepm8150b_firmwareqfe4302smr545_firmwarepmc1000h_firmwareqca6564a_firmwareqdm2310_firmwarepm4250_firmwareqca9880sd480sd870sd8885g_firmwarepm670sd210_firmwareqdm5677pm8005ipq6018pm855_firmwareqdm2302pmm6155ausdxr1pm855b_firmwareqca6595_firmwareqcs405_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwareqln4650_firmwareqpm5875qet5100msd888_firmwaresa8155psd675sd439qet4101qat3516pm670lqpm5658ar8035_firmwareqcm2290qpm5658_firmwarewcn3991_firmwareqdm5652_firmwarepmm8155au_firmwaresd678sdr051qln5030qcs2290_firmwarepm4125pmi632qpa2625_firmwarepm456pm8350bh_firmwarecsra6620pmr735b_firmwareqet5100_firmwareqpa5373qpm4621smb1360_firmwareqca9880_firmwareqet6100_firmwarepm670l_firmwaresdr660gsd765g_firmwareqpa8686smb1358_firmwareqca6390_firmwareipq6000sd730_firmwarewcd9370qcn5152_firmwaresdr425pmr525_firmwareqca6584au_firmwareqfe3340_firmwarepmi632_firmwareqpm5541qat5516sd662qpa8821_firmwareqfe4308sdr660g_firmwarepm8350bhpm3003awcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwaresm7350smb1354qca6564au_firmwareqdm2305sa6155p_firmwareqca6310qpm8820pm8937qpm2630qln5020_firmwaresa515m_firmwareqca9990smb1398sa6145p_firmwaresdr675sm6250apq8017_firmwarewsa8810_firmwaresd765_firmwareqdm5677_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qpm6325_firmwareqdm2302_firmwareqat3550_firmwarepmm8155auqln5040_firmwarepm4125_firmwarear8035csr8811qpa8673qdm2310qfe2550_firmwaremsm8953_firmwareqln5030_firmwaresda429wsd210wcn3620_firmwareqfe4302_firmwaresmb1396_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareqca6564asmr546pmx24qet6110pmi8952_firmwareqcm2290_firmwareqln5040qpm8895sdr845qpm5670wcn3990qtm527ar9380_firmwarepmk8350sdx24qdm3302_firmwaresd888pm8350bqdm2307_firmwaremsm8909w_firmwarewsa8835sdm429w_firmwareqpm5657_firmwaresm6250psdr660_firmwarepm8909_firmwareipq4018qca6574apm8916_firmwareqca9889qca6174asmb1390_firmwareipq8074qfe4303_firmwareqca9994_firmwareqpm4640wcn6750pm7350cqet5100m_firmwareipq8076_firmwareqpm4650qtm525sa515msa2150p_firmwarewtr6955sd855sm4125_firmwaresd8cxqfe4305ipq8076wtr6955_firmwarepm640pqcn5152sd768g_firmwaresdr865_firmwarepm8250_firmwaresd460qca6391sd8cx_firmwaresdxr1_firmwaresmb1351aqt1000_firmwarepm215_firmwareqpm8895_firmwarepm660aqpa4340qcm4290sdx50mpm640asdr8150pm8916smb1395_firmwareqdm4650pmd9655ipq8074_firmwareqca6574ausa8155p_firmwaresd205_firmwareqsw6310qet6105_firmwaresd8655g_firmwarewcd9341_firmwareqcm6125wsa8810qtc410s_firmwareqpm2630_firmwareqat5568_firmwareqdm2308qat3550wtr4905_firmwarewcn6856qdm5679wcn3680bipq6010_firmwarepm3003a_firmwareqca6696qfe4301qtc800s_firmwaresmb1381_firmwaresd845_firmwareqpa2625sa6150pqca9990_firmwareipq8070apmm8195au_firmwaresm7250psd720g_firmwareipq8071_firmwareqpm4621_firmwareipq4029pm6250Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0951
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.12%
||
7 Day CHG~0.00%
Published-11 Oct, 2022 | 00:00
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DevmemIntHeapAcquire of TBD, there is a possible arbitrary code execution due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-242345085

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0875
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PVRSRVBridgeChangeSparseMem of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270400061

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0883
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PVRSRVBridgeCacheOpQueue of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270395013

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0873
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PVRSRVBridgeRGXKickRS of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270392711

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0882
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PVRSRVBridgeRGXKickSync of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270395803

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0881
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PVRSRVBridgeRGXKickCDM of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270396350

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0872
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PVRSRVBridgeRGXKickVRDM of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270401229

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0880
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-06 Feb, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PVRSRVBridgeRGXKickTA3D of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270396792

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-33631
Matching Score-4
Assigner-openEuler
ShareView Details
Matching Score-4
Assigner-openEuler
CVSS Score-5.5||MEDIUM
EPSS-0.21% / 43.78%
||
7 Day CHG~0.00%
Published-18 Jan, 2024 | 15:05
Updated-02 Apr, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel crash in EXT4 filesystem

Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.

Action-Not Available
Vendor-OpenAtom FoundationopenEuler (OpenAtom Foundation)Huawei Technologies Co., Ltd.
Product-openeulerkernel
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0510
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.09%
||
7 Day CHG~0.00%
Published-21 Jun, 2021 | 16:01
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444622

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0874
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.40%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In PVRSRVBridgeDevicememHistorySparseChange of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270399633

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-0610
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.23%
||
7 Day CHG~0.00%
Published-27 Sep, 2021 | 11:20
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.

Action-Not Available
Vendor-n/aGoogle LLCMediaTek Inc.
Product-mt6757cdmt6592hmt6873mt6893mt6799mt6580mt6750mt6582emt6755smt6595mt6757cmt6765mt6737mt6883mt6891mt6592tmt6853tmt6739mt6757mt6797mt6769mt6761mt6875mt6889mt6768mt6755mt6592_90mt6771mt6758mt6833mt6732mt6885mt6582tmt6735mt6750smt6753mt6762mt6795mt6877mt6582wmt6853mt6757chandroidmt6589tdmt6592emt6589mt6582hmt6582_90mt6752mt6779mt6785mt6731mt6763mt6592wMT6580, MT6582E, MT6582H, MT6582T, MT6582W, MT6582_90, MT6589, MT6589TD, MT6592E, MT6592H, MT6592T, MT6592W, MT6592_90, MT6595, MT6731, MT6732, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6752, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6785, MT6795, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893
CWE ID-CWE-190
Integer Overflow or Wraparound
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found