Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-38563

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-11 Aug, 2021 | 21:16
Updated At-04 Aug, 2024 | 01:44
Rejected At-
Credits

An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It mishandles situations in which an array size (derived from a /Size entry) is smaller than the maximum indirect object number, and thus there is an attempted incorrect array access (leading to a NULL pointer dereference, or out-of-bounds read or write).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:11 Aug, 2021 | 21:16
Updated At:04 Aug, 2024 | 01:44
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It mishandles situations in which an array size (derived from a /Size entry) is smaller than the maximum indirect object number, and thus there is an attempted incorrect array access (leading to a NULL pointer dereference, or out-of-bounds read or write).

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.foxitsoftware.com/support/security-bulletins.php
x_refsource_MISC
Hyperlink: https://www.foxitsoftware.com/support/security-bulletins.php
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.foxitsoftware.com/support/security-bulletins.php
x_refsource_MISC
x_transferred
Hyperlink: https://www.foxitsoftware.com/support/security-bulletins.php
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:11 Aug, 2021 | 22:15
Updated At:08 Feb, 2022 | 18:30

An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It mishandles situations in which an array size (derived from a /Size entry) is smaller than the maximum indirect object number, and thus there is an attempted incorrect array access (leading to a NULL pointer dereference, or out-of-bounds read or write).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Foxit Software Incorporated
foxit
>>pdf_reader>>Versions up to 11.0.0.0510(inclusive)
cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*
Foxit Software Incorporated
foxitsoftware
>>pdf_editor>>Versions up to 11.0.0.0510(inclusive)
cpe:2.3:a:foxitsoftware:pdf_editor:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-129Primarynvd@nist.gov
CWE ID: CWE-129
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.foxitsoftware.com/support/security-bulletins.phpcve@mitre.org
Vendor Advisory
Hyperlink: https://www.foxitsoftware.com/support/security-bulletins.php
Source: cve@mitre.org
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

83Records found

CVE-2018-17611
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.56%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 09:00
Updated-17 Sep, 2024 | 03:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-416
Use After Free
CVE-2018-17607
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.56%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 09:00
Updated-17 Sep, 2024 | 01:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-416
Use After Free
CVE-2018-17608
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.56%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 09:00
Updated-17 Sep, 2024 | 02:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-416
Use After Free
CVE-2018-17610
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.56%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 09:00
Updated-16 Sep, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-416
Use After Free
CVE-2021-38572
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 6.45%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 21:13
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows writing to arbitrary files because the extractPages pathname is not validated.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CVE-2021-38574
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 4.05%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 21:12
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows SQL Injection via crafted data at the end of a string.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2021-38568
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 7.56%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 21:14
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows memory corruption during conversion of a PDF document to a different document format.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-38573
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 6.45%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 21:12
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows writing to arbitrary files because a CombineFiles pathname is not validated.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CVE-2021-33793
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 7.56%
||
7 Day CHG~0.00%
Published-11 Aug, 2021 | 19:34
Updated-03 Aug, 2024 | 23:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 have an out-of-bounds write because the Cross-Reference table is mishandled during Office document conversion.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-26537
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 7.56%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 08:01
Updated-04 Aug, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 10.1. In a certain Shading calculation, the number of outputs is unequal to the number of color components in a color space. This causes an out-of-bounds write.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-26534
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 9.46%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 08:02
Updated-04 Aug, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 10.1. There is an Opt object use-after-free related to Field::ClearItems and Field::DeleteOptions, during AcroForm JavaScript execution.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CWE ID-CWE-416
Use After Free
CVE-2020-26535
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 6.58%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 08:01
Updated-04 Aug, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 10.1. If TslAlloc attempts to allocate thread local storage but obtains an unacceptable index value, V8 throws an exception that leads to a write access violation (and read access violation).

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-28104
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 68.90%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 12:48
Updated-03 Aug, 2024 | 05:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit PDF Editor v11.3.1 was discovered to contain an arbitrary file upload vulnerability.

Action-Not Available
Vendor-n/aApple Inc.Foxit Software Incorporated
Product-pdf_editoriphone_osn/a
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2020-13804
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 16.47%
||
7 Day CHG+0.01%
Published-04 Jun, 2020 | 14:38
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 9.7.2. It allows information disclosure of a hardcoded username and password in the DocuSign plugin.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-13805
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 5.63%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 14:40
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 9.7.2. It has brute-force attack mishandling because the CAS service lacks a limit on login failures.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2022-24955
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.69% / 71.99%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 01:40
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have an Uncontrolled Search Path Element for DLL files.

Action-Not Available
Vendor-n/aMicrosoft CorporationFoxit Software Incorporated
Product-pdf_readerpdf_editorwindowsn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2022-24954
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.90% / 75.75%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 01:40
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have a Stack-Based Buffer Overflow related to XFA, for the 'subform colSpan="-2"' and 'draw colSpan="1"' substrings.

Action-Not Available
Vendor-n/aMicrosoft CorporationFoxit Software Incorporated
Product-pdf_readerpdf_editorwindowsn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-20827
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 6.45%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 16:55
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit PhantomPDF Mac 3.3 and Foxit Reader for Mac before 3.3. It allows stack consumption because of interaction between ICC-Based color space and Alternate color space.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-21242
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.65% / 87.92%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 16:23
Updated-05 Aug, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows Remote Code Execution via a GoToE or GoToR action.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-26539
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.83% / 86.27%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 08:01
Updated-04 Aug, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 10.1. When there is a multiple interpretation error for /V (in the Additional Action and Field dictionaries), a use-after-free can occur with resultant remote code execution (or an information leak).

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CWE ID-CWE-416
Use After Free
CVE-2020-13814
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 7.61%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 15:36
Updated-04 Aug, 2024 | 12:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 9.7.1. It has a use-after-free via a document that lacks a dictionary.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-416
Use After Free
CVE-2019-14209
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.04% / 10.56%
||
7 Day CHG~0.00%
Published-21 Jul, 2019 | 18:17
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to Heap Corruption due to data desynchrony when adding AcroForm.

Action-Not Available
Vendor-n/aMicrosoft CorporationFoxit Software Incorporated
Product-phantompdfwindowsn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-21244
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 15.27%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 16:17
Updated-05 Aug, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit PhantomPDF before 8.3.6. It allows arbitrary application execution via an embedded executable file in a PDF portfolio, aka FG-VD-18-029.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfn/a
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2019-20822
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 6.45%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 15:49
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the 3D Plugin Beta for Foxit Reader and PhantomPDF before 9.7.0.29430. It has an out-of-bounds write via incorrect image data.

Action-Not Available
Vendor-n/aMicrosoft CorporationFoxit Software Incorporated
Product-windows3dn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-20830
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.04% / 10.56%
||
7 Day CHG+0.01%
Published-04 Jun, 2020 | 16:52
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 9.6. It has an out-of-bounds write when Internet Explorer is used.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-20248
Matching Score-8
Assigner-Check Point Software Ltd.
ShareView Details
Matching Score-8
Assigner-Check Point Software Ltd.
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.39%
||
7 Day CHG~0.00%
Published-24 Dec, 2018 | 19:00
Updated-05 Aug, 2024 | 11:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Foxit Quick PDF Library (all versions prior to 16.12), issue where loading a malformed or malicious PDF containing invalid xref table pointers or invalid xref table data using the LoadFromFile, LoadFromString, LoadFromStream, DAOpenFile or DAOpenFileReadOnly functions may result in an access violation caused by out of bounds memory access.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-quick_pdf_libraryFoxit Quick PDF Library
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-17609
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.56%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 09:00
Updated-17 Sep, 2024 | 00:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-416
Use After Free
CVE-2018-14442
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.96% / 89.71%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 12:00
Updated-16 Sep, 2024 | 22:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Foxit Reader before 9.2 and PhantomPDF before 9.2 have a Use-After-Free that leads to Remote Code Execution, aka V-88f4smlocs.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdffoxit_readern/a
CWE ID-CWE-416
Use After Free
CVE-2019-20825
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 6.45%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 16:58
Updated-05 Aug, 2024 | 02:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit PhantomPDF before 8.3.11. It has an out-of-bounds write when Internet Explorer is used.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-7406
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.23% / 79.28%
||
7 Day CHG~0.00%
Published-24 May, 2018 | 21:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader before 9.1 and PhantomPDF before 9.1. This vulnerability allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the u3d images inside of a pdf. The issue results from the lack of proper validation of user-supplied data, which can result in an array indexing issue. An attacker can leverage this to execute code in the context of the current process.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfreadern/a
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2003-0721
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.82% / 86.24%
||
7 Day CHG~0.00%
Published-12 Sep, 2003 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.

Action-Not Available
Vendor-washingtonn/a
Product-pinen/a
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2021-3121
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.6||HIGH
EPSS-0.14% / 32.91%
||
7 Day CHG~0.00%
Published-11 Jan, 2021 | 05:57
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.

Action-Not Available
Vendor-n/aHashiCorp, Inc.Go
Product-protobufconsuln/a
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2023-28004
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-9.8||CRITICAL
EPSS-1.28% / 79.72%
||
7 Day CHG~0.00%
Published-18 Apr, 2023 | 21:16
Updated-02 Aug, 2024 | 12:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-129: Improper validation of an array index vulnerability exists where a specially crafted Ethernet request could result in denial of service or remote code execution.

Action-Not Available
Vendor-
Product-powerlogic_hdpm6000_firmwarepowerlogic_hdpm6000PowerLogic HDPM6000
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2023-26066
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.49% / 65.79%
||
7 Day CHG~0.00%
Published-10 Apr, 2023 | 00:00
Updated-11 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain Lexmark devices through 2023-02-19 have Improper Validation of an Array Index.

Action-Not Available
Vendor-n/aLexmark International, Inc.
Product-mx521mx611x746mx622b2650mxlsg_firmwaremxngm_firmwarecx421m1242mc3224mx431ms822ms818b2338b3340xm9155c2325xc2235x748x46xx86xms811mxtgw_firmwarecx517xc9455mb3442xs795cx735c2132t65xc3426ms911m1246ms711xs955xc9465ms821mb2546c746xm3142csnzj_firmwarems431xc4352xm5365xm7170c736cslbl_firmwarexm9165mx717xm5163mxtpm_firmwarecx522x950cx510mx725mx811lr_firmwarex954c950m5255w850cs331b2865cx931mx617mc232mxtgm_firmwarems321xm7370xm7263xm7270cx417xs798mxtct_firmwarex952c734xs796ms421cs417cstpc_firmwarecslbn_firmwareb2236cstzj_firmwaremc2640cx730b2546c2326cx942m1342m5270b2442cxlbn_firmwaremx522mx810cs622mslbd_firmwarem5163dnmc3326cs421ms331mx931ms810dexm1242ms710xs950cx431c2535xc2132xm7155ms812decs4106500exm3150mx421ms817cs439cxlbl_firmwaremx610mx812c2425xc9325xc4240c3326m5163decs796lw80_firmwarem5170x792mx910cs517xm5170mb2650cx317cx944cx930xc4342mxlbd_firmwarecx310x548msngm_firmwarecx622mx6500exm5270cs310c748cxtpc_firmwarexc2130xm7355mc3426b3442mx321xc9445xm9145m5155mx912xm5370xs748mx826mx721cs510mb2236cs431mx711ms621mstgw_firmwarems823x65xms725ms622cx410cs521xc9335cs317mx911mx710cs748ms810dncxtzj_firmwarecx943mb2770mx822mx718lp_firmwarex73xmslsg_firmwaremsngw_firmwarexm7163x925c3224xs925ms812dnmb2442m3250xm3250xs548ms521mc2535c792e46xxm1246cs943ms439xm5263xc2326mx722mb2338cxtmm_firmwaremx331ms826mx432c925c2240xm1342mc2425lhs60_firmwarecx625ms825n/a
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2024-24563
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 37.66%
||
7 Day CHG~0.00%
Published-07 Feb, 2024 | 17:10
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vyper array negative index vulnerability

Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. Arrays can be keyed by a signed integer, while they are defined for unsigned integers only. The typechecker doesn't throw when spotting the usage of an `int` as an index for an array. The typechecker allows the usage of signed integers to be used as indexes to arrays. The vulnerability is present in different forms in all versions, including `0.3.10`. For ints, the 2's complement representation is used. Because the array was declared very large, the bounds checking will pass Negative values will simply be represented as very large numbers. As of time of publication, a fixed version does not exist. There are three potential vulnerability classes: unpredictable behavior, accessing inaccessible elements and denial of service. Class 1: If it is possible to index an array with a negative integer without reverting, this is most likely not anticipated by the developer and such accesses can cause unpredictable behavior for the contract. Class 2: If a contract has an invariant in the form `assert index < x`, the developer will suppose that no elements on indexes `y | y >= x` are accessible. However, by using negative indexes, this can be bypassed. Class 3: If the index is dependent on the state of the contract, this poses a risk of denial of service. If the state of the contract can be manipulated in such way that the index will be forced to be negative, the array access can always revert (because most likely the array won't be declared extremely large). However, all these the scenarios are highly unlikely. Most likely behavior is a revert on the bounds check.

Action-Not Available
Vendor-vyperlangvyperlang
Product-vypervyper
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2021-22333
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 39.57%
||
7 Day CHG~0.00%
Published-03 Jun, 2021 | 19:15
Updated-03 Aug, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-magic_uiemuiEMUI;Magic UI
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2021-1933
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.25% / 48.41%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 07:35
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UE assertion is possible due to improper validation of invite message with SDP body in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaresd678sm6250p_firmwareqcs610csrb31024wcd9360_firmwaresd_636qcs4290wcn3950_firmwaresc8180x\+sdx55qca6420_firmwareqca6595au_firmwareqca6390_firmwareqca6335msm8917sd730_firmwaresd_455_firmwarewcd9370qcs605_firmwaresd_675_firmwaresd675_firmwareqcs6125_firmwareqca6584au_firmwaresd632qca9377sa415mwcn3998sd_8cx_firmwarewcd9371_firmwarewhs9410wcn3950sd720gwcn3660bsd450_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3610_firmwareqca6420apq8053_firmwarewcd9360qca6564au_firmwareqca6584auqca6310whs9410_firmwaresd429qcs6125sa8155_firmwaresdm630sa415m_firmwarewcn3988_firmwareqca6430sd429_firmwaresm6250sd712_firmwarewcd9340apq8017_firmwarequalcomm215_firmwareqcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcn3660_firmwareqca6696_firmwarewcd9371qca6390wcd9375sd_8cxaqt1000wcn3910_firmwaresc8180x\+sdx55_firmwaresm6250_firmwaremsm8953_firmwaresda429wmsm8917_firmwaresd855_firmwarewcn3620_firmwaresd712wcn3988wcn6850_firmwarewcn3620wsa8815_firmwareapq8017sd450wcn3610qcm6125_firmwarewcn3991sda429w_firmwarewcd9380_firmwaresd_675sdm429wqca6564ausdx24sdx55m_firmwaremsm8940_firmwaresd670_firmwaresd632_firmwaresdm429w_firmwaresd665_firmwarewcd9380sm6250pqualcomm215qcs410qca6574asdx50m_firmwareqca6174asdx24_firmwareqca6310_firmwareqca6430_firmwareqca6335_firmwareqcs605wcd9340_firmwaresd855wsa8815wcn6850sd665wcn3910sd_8c_firmwarewcn3660b_firmwarewcn3680qca6574a_firmwaresd850_firmwaresd730sdxr1_firmwaresdx55maqt1000_firmwaremsm8920msm8953sd678_firmwareqcm4290csrb31024_firmwaresdx50mwcn3680_firmwareqcs603msm8920_firmwaresd_455qca6574ausa8155p_firmwaresd_636_firmwaresd670qcm6125qcm4290_firmwareqcs610_firmwaresd_8csdxr1qca6696sdm630_firmwaresd845_firmwarewcd9370_firmwaresdx55msm8940apq8053sa8155psd675sd845sd720g_firmwareqcs410_firmwarewcn3660sd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2023-0755
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-5.82% / 90.58%
||
7 Day CHG+0.76%
Published-23 Feb, 2023 | 21:23
Updated-16 Jan, 2025 | 21:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.

Action-Not Available
Vendor-geptcGeneral ElectricPTCRockwell AutomationRockwell Automation, Inc.Microsoft Corporation
Product-thingworx_edge_c-sdkthingworx_.net-sdkthingworx_kepware_edgekepware_serverthingworx_industrial_connectivitykepware_serverexthingworx_edge_microserverdigital_industrial_gateway_serverkepserver_enterpriseDigital Industrial Gateway Server KEPServer Enterprise ThingWorx Industrial ConnectivityThingWorx Kepware EdgeKepware KEPServerEXThingWorx Edge MicroServer (EMS).NET-SDKThingWorx Kepware Server ThingWorx Edge C-SDK
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2020-3633
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 55.93%
||
7 Day CHG~0.00%
Published-02 Jun, 2020 | 15:05
Updated-04 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Array out of bound may occur while playing mp3 file as no check is there on offset if it is greater than the buffer allocated or not in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCS405, QCS605, QM215, Rennell, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-kamorta_firmwaresdm429wmsm8996au_firmwaresdm632_firmwaresdm845sdm450_firmwaresdm632sdm439sdm429sm7150_firmwaresm6150msm8909w_firmwaremsm8996ausdm429w_firmwaresm7150apq8009_firmwaremsm8917sdm670sxr2130qcs605_firmwaremdm9206sdm670_firmwaresdm636apq8098mdm9206_firmwareqcs605sdm429_firmwaremsm8905_firmwaresda660msm8909wapq8009apq8053_firmwaremsm8953sdm450sdm636_firmwareapq8098_firmwaresdx20msm8998_firmwaresdm660sdm630mdm9607_firmwaresm8250_firmwareqcs405sdm710qm215mdm9607sdm710_firmwaremdm9207c_firmwaremsm8905mdm9207csm8150_firmwaresxr2130_firmwareapq8096ausdm439_firmwareqcs405_firmwarerennellsdm630_firmwaresda660_firmwarerennell_firmwareqm215_firmwaremsm8953_firmwareapq8053apq8096au_firmwaresaipan_firmwaresm6150_firmwaremsm8917_firmwaresm8250msm8998sm8150sdx20_firmwarekamortasaipansdm660_firmwaresdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2020-35636
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-10||CRITICAL
EPSS-0.36% / 58.34%
||
7 Day CHG~0.00%
Published-04 Mar, 2021 | 00:00
Updated-23 Apr, 2025 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1 in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume() OOB read. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger this vulnerability.

Action-Not Available
Vendor-cgaln/aDebian GNU/Linux
Product-computational_geometry_algorithms_librarydebian_linuxCGAL Project
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2020-28601
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-10||CRITICAL
EPSS-0.69% / 71.96%
||
7 Day CHG~0.00%
Published-04 Mar, 2021 | 00:00
Updated-23 Apr, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability.

Action-Not Available
Vendor-cgaln/aFedora ProjectDebian GNU/Linux
Product-computational_geometry_algorithms_librarydebian_linuxfedoraCGAL
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-28636
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-10||CRITICAL
EPSS-0.69% / 71.96%
||
7 Day CHG~0.00%
Published-04 Mar, 2021 | 00:00
Updated-23 Apr, 2025 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability.

Action-Not Available
Vendor-cgaln/aFedora ProjectDebian GNU/Linux
Product-computational_geometry_algorithms_librarydebian_linuxfedoraCGAL
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-5866
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-1.17% / 78.81%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 07:00
Updated-11 Jul, 2025 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RT-Thread lwp_syscall.c sys_sigprocmask array index

A vulnerability classified as critical has been found in RT-Thread 5.1.0. This affects the function sys_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index.

Action-Not Available
Vendor-rt-threadn/a
Product-rt-threadRT-Thread
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-5868
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.6||HIGH
EPSS-0.95% / 76.50%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 08:00
Updated-11 Jul, 2025 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RT-Thread lwp_syscall.c sys_thread_sigprocmask array index

A vulnerability, which was classified as critical, has been found in RT-Thread 5.1.0. This issue affects the function sys_thread_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index.

Action-Not Available
Vendor-rt-threadn/a
Product-rt-threadRT-Thread
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2022-33256
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 49.02%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-05 Mar, 2025 | 21:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper validation of array index in Multi-mode call processor

Memory corruption due to improper validation of array index in Multi-mode call processor.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830qca8337qca6431_firmwaresnapdragon_4_gen_1_firmwarewcd9360_firmwaresdx65sd765g_firmwareqca6595au_firmwareqca6390_firmwaresd690_5gwcd9370qca6426wcn3998wcd9385_firmwaresdxr2_5g_firmwareqcn6024_firmwaresd_8_gen1_5g_firmwaresm7315_firmwarewcn7850qca6574au_firmwaresdx55_firmwareqca6595auqca8081_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcd9360qca6436_firmwaresd778gsa515m_firmwareqcs6490wcn7851sdxr2_5gwcn3988_firmwareqca6421sd778g_firmwarewsa8810_firmwaresd765gsd765_firmwareqca6436wcn6851qca8081wcn7851_firmwarewcd9385wcd9341qca6431qca6696_firmwareqcs6490_firmwaresd750gsd870_firmwaresdx70m_firmwareqca6390ar8035sd750g_firmwarewcd9375wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1qcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwareqcx315sm8475wcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresd780gsd865_5gsdx55m_firmwarewcn6856_firmwaresd888wsa8835qcx315_firmwarewcd9380sd888_5gqca6574asd690_5g_firmwarewcn6855_firmwaresm7325pwcn6750sa515msd855wsa8815sm7325p_firmwarewcn6850sdx57m_firmwaresd765qca6426_firmwareqca6574a_firmwaresd695sd768g_firmwareqcn9024sm7315qca6391sdx55mqca6421_firmwarewcn6740_firmwaresdx65_firmwareqcm6490_firmwaresd480_firmwarewcn6851_firmwareqca6574auqcn9024_firmwaresdx57mwcd9341_firmwaresd480sd870wsa8810wcn6855wcn6856sd695_firmwaresd768gwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwareqcn6024sdx70msm7250par8035_firmwareSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-57052
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 42.33%
||
7 Day CHG~0.00%
Published-03 Sep, 2025 | 00:00
Updated-03 Nov, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.

Action-Not Available
Vendor-davegamblen/a
Product-cjsonn/a
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2024-45569
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 63.56%
||
7 Day CHG-0.14%
Published-03 Feb, 2025 | 16:51
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in WLAN Host Communication

Memory corruption while parsing the ML IE due to invalid frame content.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwareipq6000_firmwareqcm6490_firmwareqcn6224_firmwareipq8076acsr8811_firmwaresa7775p_firmwaresa8775pqca6574au_firmwareqcn6132_firmwareqam8775psa8195pqcs615qca6584ausnapdragon_x65_5g_modem-rf_firmwareqca9889_firmwareqcn5152sa8255psxr2230pipq6028qcn5022_firmwareqcc710_firmwaresa8540p_firmwaresnapdragon_8\+_gen_2_mobilesxr2230p_firmwaresm7635_firmwareipq9574_firmwareqca6574ipq9048qcn5164_firmwareipq8070aqxm8083qcm8550sa8650psa8770p_firmwareqca6698aq_firmwareqcn5024_firmwareqcf8000_firmwaresa8775p_firmwareqamsrv1m_firmwareqca9888qca8075immersive_home_216qca6688aqqcn5122_firmwareqcn6412qcn9100sa8530p_firmwareipq8173ipq8071aqcn6402qcf8001ipq8174_firmwareqcn5164qca8082_firmwaresnapdragon_8_gen_3_mobile_firmwareqam8255p_firmwarewcd9375ipq9570_firmwaresm6650qca8085sa6155pvideo_collaboration_vc3_platformqcn5052ipq5010_firmwareqamsrv1h_firmwareipq5028qcn5052_firmwarewsa8830_firmwareqca8081qcn9022immersive_home_316_firmwaresdx65m_firmwarewcd9385wsa8840_firmwareqfw7124_firmwareipq6028_firmwaresxr2250p_firmwarewsa8840qcn6402_firmwareipq8078a_firmwareqfw7124ipq6000qca6696immersive_home_3210_firmwaresa8155p_firmwareqca4024ipq9048_firmwareqca6595qca8337ipq8071a_firmwareqca8337_firmwareqcn9012qam8650pipq9570qcs8300sxr2330pqcf8000sfp_firmwaresrv1mqcn9012_firmwareqcs5430_firmwareqcn9070_firmwareqcf8000qam8775p_firmwaresm8635p_firmwareqcn5154_firmwareipq8074aqcm5430qcs9100wcd9378sm7675_firmwaresa8295p_firmwareqca8085_firmwaresm8750psa9000pwsa8835sm8750p_firmwareqcn9024qca8081_firmwareqcn9074qca6797aq_firmwareqca0000_firmwarefastconnect_7800wcd9340snapdragon_8_gen_2_mobileipq8174qcn6112_firmwarewcd9378_firmwareqca6574auqca8084_firmwareqcn9024_firmwaresm6650_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6584au_firmwareqca6777aqfastconnect_6700immersive_home_326qca6696_firmwaresnapdragon_x72_5g_modem-rf_firmwareqcs9100_firmwaresrv1m_firmwarewsa8832fastconnect_6700_firmwareipq5302wcd9390_firmwareqcn6274qcs615_firmwaresm8635immersive_home_216_firmwareipq5028_firmwareqca6554a_firmwareipq5332qca8082sm8635_firmwareqca6787aqipq6018_firmwareipq8072a_firmwareqcn9000_firmwareipq5300_firmwareqcf8000sfpsdx55_firmwareqca6574a_firmwaresa8620pqca9888_firmwareqca8075_firmwareqcn6023sm8750_firmwareqxm8083_firmwareipq5332_firmwareipq6010srv1lipq8078_firmwareqca6554asa8530psrv1h_firmwareqca9889qcn5124ipq8070a_firmwareipq9554_firmwareqcs8300_firmwareqcs6490sa8540psa9000p_firmwaresm8550psa7775pqcn6432_firmwaresxr2330p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8835_firmwareqca8386_firmwaresa7255pwcn7860qamsrv1mqcs5430qam8295p_firmwareqca6787aq_firmwarewcn7881_firmwareqcn9074_firmwareqcn9100_firmwareqcs8550_firmwaresdx65mqcm6490ipq5312wcn7881qcn5154ipq9554sa8650p_firmwareqcn6274_firmwaresm8750snapdragon_x65_5g_modem-rfqca8084qcn9274_firmwarecsr8811qca6688aq_firmwareqcn9000wcn6650ipq8173_firmwarewsa8845_firmwareqcn6412_firmwarevideo_collaboration_vc3_platform_firmwareqca6574_firmwareqcm8550_firmwarewcn6755_firmwarear8035srv1l_firmwarewsa8845hipq9008_firmwarewcn6450_firmwaresa6155p_firmwareqcn6122_firmwareqcn6112wcn7880_firmwareipq9008wcd9395_firmwareqcn5122sm7635fastconnect_6900ipq9574qcn9160qca6574aqcn6432wcd9375_firmwarewcd9385_firmwareqam8650p_firmwareqcn9274qcn6422immersive_home_318_firmwareipq8078asa8295psa8620p_firmwareqcn5152_firmwaresa7255p_firmwareqca6595_firmwareqamsrv1hsdx55immersive_home_214snapdragon_x75_5g_modem-rf_firmwarewcd9380ipq5302_firmwareimmersive_home_326_firmwaresa8155pwcn7861_firmwarewsa8832_firmwareimmersive_home_214_firmwarewcn6755qca6564auimmersive_home_318snapdragon_8_gen_2_mobile_firmwareqcs6490_firmwareqca6595au_firmwareipq8072aqca0000qcn6224sa8255p_firmwareqca6595auqam8255psrv1hipq5010qam8620psm8550p_firmwarear8035_firmwaresa8195p_firmwaresm7675wsa8845h_firmwareimmersive_home_3210wsa8845wcn6650_firmwarewcd9380_firmwarewcn6450qcn5124_firmwaresm8635pipq8076wcd9370wcd9340_firmwareimmersive_home_316qca8386qca6678aqsnapdragon_x75_5g_modem-rfqca6564au_firmwareqam8295pqcn6122qcn6132wcn7880qam8620p_firmwareqcn6024qca6797aqqca4024_firmwaresm7675pqcn5022qcs8550sxr2250pqcm5430_firmwareqcn5024sm7675p_firmwareipq6010_firmwareqcn6422_firmwareqcn6024_firmwareipq6018ipq8078ipq5300ipq8076_firmwareqcc710ipq5312_firmwareqcf8001_firmwaresnapdragon_8_gen_3_mobilesnapdragon_x72_5g_modem-rfqcn9160_firmwarewcn7861ipq8074a_firmwarewsa8830qcn6023_firmwaresnapdragon_8\+_gen_2_mobile_firmwarewcn7860_firmwaresa8770pqca6777aq_firmwareqcn9070qca6678aq_firmwareqca6698aqfastconnect_6900_firmwareqcn9022_firmwareqcn9072_firmwareipq8076a_firmwareqfw7114wcd9390wcd9395qfw7114_firmwareqcn9072wcd9370_firmwareSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2026-21413
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 16.44%
||
7 Day CHG~0.00%
Published-07 Apr, 2026 | 13:49
Updated-10 Apr, 2026 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Action-Not Available
Vendor-librawLibRaw
Product-librawLibRaw
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-27034
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 15.98%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Multi-Mode Call Processor

Memory corruption while selecting the PLMN from SOR failed list.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9360wcd9380315_5g_iot_modem_firmwareqcs6490_firmwarewsa8840sdx80msdx55snapdragon_778g_5g_mobile_platformsnapdragon_888_5g_mobile_platform_firmwarewcd9340_firmwarewcn7861_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_x72_5g_modem-rf_systemwsa8840_firmwarefastconnect_6700_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresnapdragon_7c\+_gen_3_compute_firmwarefastconnect_6700snapdragon_8\+_gen_2_mobile_platformqca6696sm7250p_firmwarewcn3950_firmwareqcm5430_firmwareqcs8550qfw7124_firmwareqcs8550_firmwaresdx61wsa8845hqep8111_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresm7325p_firmwaresnapdragon_auto_5g_modem-rf_firmwaresdx61_firmwareqcm8550_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresm4635_firmwaresdx57mwcd9341_firmwaresnapdragon_8\+_gen_1_mobile_platformsnapdragon_auto_5g_modem-rf_gen_2sd_8_gen1_5gwcd9360_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresnapdragon_865_5g_mobile_platformsm7675wcd9385_firmwareqcm6490_firmwaresm7635_firmwareqep8111snapdragon_x62_5g_modem-rf_systemqca6391sm7325pqca6584au_firmwareqcn6024_firmwareqfw7114qcs6490snapdragon_480_5g_mobile_platformsnapdragon_690_5g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_systemsnapdragon_x72_5g_modem-rf_system_firmwaresm8635p_firmwaresm8650q_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwareqcm8550wcd9370_firmwareqcn9024wsa8810wsa8815qcm4490_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_8_gen_1_mobile_platformar8035_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewsa8845sdx80m_firmwaresnapdragon_865_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresm8550p_firmwarewcn7860_firmwarevideo_collaboration_vc3_platform_firmwaresd_8_gen1_5g_firmwarewcd9378sdx71m_firmwaresm8750snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwarewcn6740_firmwareqca6595au_firmwaresm8750p_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_4_gen_1_mobile_platform_firmwaresg8275pqca6584ausdx71msnapdragon_8\+_gen_1_mobile_platform_firmwarewcn7880_firmwareqcn6274snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)fastconnect_7800_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)snapdragon_x70_modem-rf_system_firmwareqcn6224_firmwaresm8750_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwarewsa8810_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)wcd9385wcd9380_firmwarewcd9375qcn6024snapdragon_8_gen_1_mobile_platform_firmwaresm8750pwcn6450qcs4490wcn6450_firmwareqca6574asnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_auto_5g_modem-rfwcd9340snapdragon_x75_5g_modem-rf_system_firmwarewcn7880wsa8845_firmwarewcd9341qca6391_firmwarewcn6755fastconnect_6200snapdragon_x65_5g_modem-rf_systemsg8275p_firmwareqca8337_firmwaresnapdragon_x35_5g_modem-rf_systemwcn6740wcn3988_firmwareqca8081sm7635snapdragon_8_gen_3_mobile_platformsnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwareqca6698aqsm8635wsa8832snapdragon_x70_modem-rf_systemqcn6224snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)snapdragon_7c\+_gen_3_computesnapdragon_x75_5g_modem-rf_systemwcn7861sdx57m_firmwarewcd9370wsa8815_firmwarewcn6650_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)wcd9390_firmwaresm7675pqca8081_firmwarefastconnect_6900qcc710_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qca6698aq_firmwarevideo_collaboration_vc3_platformqcn6274_firmwarefastconnect_6200_firmwarefastconnect_6800wsa8835qca6574a_firmwarefastconnect_6800_firmwarewcd9375_firmwarewsa8832_firmwareqca6595ausnapdragon_690_5g_mobile_platform_firmwarewcn7860sm7250psm8550pqcc710snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwarewcd9378_firmwareqcn9024_firmwarewcn7881_firmwaresm6650qcs5430wcn3950sm6650_firmwarefastconnect_7800qfw7124wsa8845h_firmwarewcd9395_firmwaresnapdragon_x35_5g_modem-rf_system_firmwarefastconnect_6900_firmwarewsa8835_firmwareqcm5430qfw7114_firmwaresnapdragon_4_gen_1_mobile_platformsnapdragon_888_5g_mobile_platformwcd9390ar8035sm8635psm8650qsdx55_firmwaresm4635qca6174a_firmwaresm7675p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcn3988qca6174aqca8337qca6696_firmware315_5g_iot_modemwsa8830snapdragon_x55_5g_modem-rf_system_firmwarewsa8830_firmwareqcs5430_firmwareqcs4490_firmwaresm7675_firmwarewcn7881qcm6490snapdragon_780g_5g_mobile_platformwcd9395qcm4490wcn6755_firmwaresnapdragon_x65_5g_modem-rf_system_firmwarewcn6650sm8635_firmwareSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2022-25720
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.32% / 55.00%
||
7 Day CHG~0.00%
Published-19 Oct, 2022 | 00:00
Updated-09 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption in WLAN due to out of bound array access during connect/roaming in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3660wcd9340_firmwaresd210_firmwaremdm9250qcs6125_firmwaresw5100pqcn6024sd439wcd9385_firmwarewcn3988_firmwaremdm9615qca6431_firmwaremdm9215qcs610mdm9230_firmwareqam8295p_firmwareqca6174qcs6125sd210msm8976sg_firmwaremdm8615mmdm9206_firmwareapq8096au_firmwaresd460sd_8_gen1_5g_firmwareapq8052wcd9385wcn7850_firmwaresdx55m_firmwaremdm8215mqrb5165n_firmwaresd845wcd9340mdm9615mqcn7606_firmwaremdm9630_firmwaresd730_firmwaremdm9150_firmwareapq8056wcn7850sdx12_firmwaremdm9250_firmwaresw5100p_firmwaresdx55msdx65_firmwareapq8009w_firmwarewcn6851_firmwaresa415mwcd9326sdm429wmdm9628sa8155qca6574_firmwaresd678_firmwareqca6595aumdm8215m_firmwarewcn3680bsa8150pwcn3680_firmwarewcn3660bqca8337_firmwarewcd9330_firmwarewcn7851_firmwaremsm8208_firmwarewsa8835wcn3990_firmwarear8035_firmwareapq8076csra6640sdm429w_firmwareqca6175aqca6320_firmwaresa8195psa6150pqca9367sm4125sd865_5gqca6421_firmwareqca6574asd429_firmwareqca6310_firmwaresd_675wcn3990sdxr2_5gwsa8810_firmwaresd670msm8952wcd9335_firmwarewcn3998_firmwarewsa8815qca6436_firmwaresa6155psa8155psdx55qca6335sdx12mdm9640qca6554a_firmwareqca6564asdx65msm8608qcn7605qca6564a_firmwarewcd9306wcn3660b_firmwarewcd9360qca6391_firmwaresa4155pqca6696_firmwarewcn6855sd710mdm8215_firmwareqca6554aqca4020_firmwarecsrb31024_firmwaremsm8956sa4150psd662_firmwarecsra6640_firmwaresd820sd845_firmwaresdx24sd660qca6174asd450sdxr1_firmwaremsm8976sgqet4101qsw8573sd205sm8475mdm9615m_firmwaremsm8909w_firmwareqca8081aqt1000_firmwaremsm8208wcd9371_firmwaremsm8108_firmwareqcs605apq8009wqca9377wcn3620wcn7851qcn6024_firmwaresa8155_firmwaremdm8215qca9379_firmwarewcn6740qca6431sd730msm8909wsa8145p_firmwaresdx24_firmwareqca6174_firmwarewcn3910_firmwarewcn3910wcd9380_firmwarewcn6740_firmwaremsm8996au_firmwareapq8017_firmwarewcd9370apq8096ausd678qca6574ausa6145pqcc5100_firmwarewsa8815_firmwarewcn3950_firmwaresdxr2_5g_firmwaresd870sw5100qca9377_firmwareqca8081_firmwaremdm9310_firmwaremsm8953_firmwareqca6426_firmwaresa8150p_firmwaresd870_firmwareqcs405_firmwarewcn3950mdm9607wcd9380mdm9150qcs610_firmwareqca9379qcn9024_firmwarewcd9326_firmwareqcm6125_firmwareqcn7606sm4125_firmwareapq8053_firmwareqrb5165_firmwarewcn3615sd662sd675qca6420_firmwareqrb5165sa515m_firmwareqcm6125sd820_firmwarewcd9341msm8917_firmwarewcd9306_firmwaremdm9650_firmwareqca6426qca6335_firmwarewsa8835_firmwaresd821_firmwareapq8056_firmwareqca6390sdw2500sd205_firmwarear6003wcn3980qca6696wcn6856_firmwareqcx315_firmwarewcd9360_firmwaremdm9650qcx315sdx20msa6150p_firmwareqcs605_firmwarewcn3620_firmwarecsrb31024qcc5100sa8295psdxr1mdm9615_firmwaresa4155p_firmwareqca6420qca6174a_firmwareqca8337wcn3999apq8017sdw2500_firmwaresd_675_firmwareqca6430qualcomm215_firmwareqet4101_firmwarewsa8810sd675_firmwaresd865_5g_firmwarewcd9341_firmwarewcn6850ar8031wcn3660_firmwaremdm9628_firmwaremsm8976_firmwaremdm9630qrb5165m_firmwareqca6574a_firmwarewcn3999_firmwaresdx20_firmwareqca6595au_firmwaresd460_firmwaresd439_firmwaresda429wqca6175a_firmwareapq8064ausa8295p_firmwaresw5100_firmwarewcn3610msm8953sd632qca6390_firmwareqca6564au_firmwareqca6574wcn3610_firmwarewcn3998wcd9335mdm8615m_firmwareqca6430_firmwarewcd9330sa415m_firmwareqcs405qca6436aqt1000qca6421qcn7605_firmwaremsm8209apq8076_firmwaresa515msd855_firmwaresdx50msd855wcn6856qcn9024qcs410_firmwareqam8295pmdm9206qca6584wcn6855_firmwaremsm8108qrb5165nsd429mdm9607_firmwaremsm8956_firmwaresa4150p_firmwareapq8009sd835_firmwarewcd9371msm8917mdm9215_firmwareqcs410qca4020qrb5165mapq8009_firmwaresd632_firmwareqca6391qca6595csra6620sd835sd710_firmwarewcn3615_firmwaresd670_firmwaresa6155p_firmwareqca6584auqca6584au_firmwaremsm8209_firmwaresa8195p_firmwareqca6574au_firmwarewcd9370_firmwaresa8155p_firmwaremdm9330wcn3680wcd9375qca6310sdx20m_firmwarear6003_firmwareapq8064au_firmwareapq8053apq8052_firmwareqsw8573_firmwarear8035sda429w_firmwaresd821wsa8830mdm9310msm8952_firmwareqca6564msm8996auwcd9375_firmwarewcn3980_firmwaremsm8608_firmwareqca6320qca6595_firmwarewcn6850_firmwaresd660_firmwaresdx20wcn6851qca6564_firmwaremsm8976mdm9330_firmwareqca9367_firmwarear8031_firmwaremdm9230wcn3988wsa8830_firmwareqca6564auwcn3680b_firmwaresdx55_firmwarecsra6620_firmwarequalcomm215sa8145pqca6584_firmwaresd450_firmwaresdx50m_firmwaresa6145p_firmwaremdm9640_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-129
Improper Validation of Array Index
  • Previous
  • 1
  • 2
  • Next
Details not found