Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-2320

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-01 Sep, 2022 | 00:00
Updated At-03 Aug, 2024 | 00:32
Rejected At-
Credits

A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:01 Sep, 2022 | 00:00
Updated At:03 Aug, 2024 | 00:32
Rejected At:
▼CVE Numbering Authority (CNA)

A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.

Affected Products
Vendor
n/a
Product
xorg-x11-server
Versions
Affected
  • xorg-x11-server 21.1
Problem Types
TypeCWE IDDescription
CWECWE-787CWE-787
Type: CWE
CWE ID: CWE-787
Description: CWE-787
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
N/A
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
N/A
https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
N/A
https://www.zerodayinitiative.com/advisories/ZDI-22-963/
N/A
https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
N/A
https://security.gentoo.org/glsa/202210-30
vendor-advisory
https://security.netapp.com/advisory/ntap-20221104-0003/
N/A
Hyperlink: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
Resource: N/A
Hyperlink: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
Resource: N/A
Hyperlink: https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
Resource: N/A
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-22-963/
Resource: N/A
Hyperlink: https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/202210-30
Resource:
vendor-advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20221104-0003/
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
x_transferred
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
x_transferred
https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
x_transferred
https://www.zerodayinitiative.com/advisories/ZDI-22-963/
x_transferred
https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
x_transferred
https://security.gentoo.org/glsa/202210-30
vendor-advisory
x_transferred
https://security.netapp.com/advisory/ntap-20221104-0003/
x_transferred
Hyperlink: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
Resource:
x_transferred
Hyperlink: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
Resource:
x_transferred
Hyperlink: https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
Resource:
x_transferred
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-22-963/
Resource:
x_transferred
Hyperlink: https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
Resource:
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202210-30
Resource:
vendor-advisory
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20221104-0003/
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:01 Sep, 2022 | 21:15
Updated At:29 Aug, 2025 | 13:42

A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

X.Org Foundation
x.org
>>x_server>>21.1.0
cpe:2.3:a:x.org:x_server:21.1.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarysecalert@redhat.com
CWE-787Secondarynvd@nist.gov
CWE ID: CWE-787
Type: Primary
Source: secalert@redhat.com
CWE ID: CWE-787
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dcsecalert@redhat.com
Patch
Third Party Advisory
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938secalert@redhat.com
Patch
Third Party Advisory
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939secalert@redhat.com
Patch
Third Party Advisory
https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.htmlsecalert@redhat.com
Patch
Third Party Advisory
https://security.gentoo.org/glsa/202210-30secalert@redhat.com
Third Party Advisory
https://security.netapp.com/advisory/ntap-20221104-0003/secalert@redhat.com
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-22-963/secalert@redhat.com
Third Party Advisory
VDB Entry
https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dcaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
https://security.gentoo.org/glsa/202210-30af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20221104-0003/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-22-963/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
Hyperlink: https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
Source: secalert@redhat.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202210-30
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20221104-0003/
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-22-963/
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/202210-30
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20221104-0003/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.zerodayinitiative.com/advisories/ZDI-22-963/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

1126Records found

CVE-2023-40141
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.56%
||
7 Day CHG~0.00%
Published-11 Oct, 2023 | 19:26
Updated-18 Sep, 2024 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In temp_residency_name_store of thermal_metrics.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-4501
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 3.82%
||
7 Day CHG~0.00%
Published-10 May, 2025 | 13:00
Updated-28 May, 2025 | 19:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Album Management System Search Albums searchalbum stack-based overflow

A vulnerability, which was classified as critical, was found in code-projects Album Management System 1.0. This affects the function searchalbum of the component Search Albums. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & ProjectsFabian Ros
Product-album_management_systemAlbum Management System
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-40307
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 24.17%
||
7 Day CHG~0.00%
Published-28 Sep, 2023 | 13:55
Updated-23 Sep, 2024 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privileges Memory Corruption (Out-of-bound write)

An attacker with standard privileges on macOS when requesting administrator privileges from the application can submit input which causes a buffer overflow resulting in a crash of the application. This could make the application unavailable and allow reading or modification of data.

Action-Not Available
Vendor-SAP SE
Product-privilegesSAP Privileges
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-27006
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.05%
||
7 Day CHG~0.00%
Published-09 Feb, 2021 | 15:38
Updated-04 Aug, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PCT files. This could result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12182)

Action-Not Available
Vendor-Siemens AG
Product-jt2goteamcenter_visualizationJT2GoTeamcenter Visualization
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-40080
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.75%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 22:40
Updated-02 Aug, 2024 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of btm_ble_gap.cc, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-40091
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.98%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 22:40
Updated-02 Aug, 2024 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In onTransact of IncidentService.cpp, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-39283
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.02%
||
7 Day CHG~0.00%
Published-02 Nov, 2023 | 00:00
Updated-05 Sep, 2024 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An SMM memory corruption vulnerability in the SMM driver (SMRAM write) in CsmInt10HookSmm in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to send arbitrary data to SMM which could lead to privilege escalation.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-insydeh2on/ainsydeh20
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-4471
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 3.82%
||
7 Day CHG~0.00%
Published-09 May, 2025 | 07:31
Updated-16 May, 2025 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Jewelery Store Management system Search Item View stack-based overflow

A vulnerability, which was classified as critical, has been found in code-projects Jewelery Store Management system 1.0. Affected by this issue is some unknown functionality of the component Search Item View. The manipulation of the argument str2 leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & ProjectsFabian Ros
Product-jewellery_store_management_systemJewelery Store Management system
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-5178
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.61%
||
7 Day CHG~0.00%
Published-11 Mar, 2020 | 23:25
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any hostname values that are greater than 1024-len(‘/etc/config-tools/change_hostname hostname=‘) in length. A hostname value of length 0x3fd will cause the service to crash.

Action-Not Available
Vendor-wagoWago
Product-pfc200pfc200_firmwareWAGO PFC200
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-39632
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.32%
||
7 Day CHG~0.00%
Published-14 Jan, 2022 | 19:11
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In inotify_cb of events.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-202159709

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-4480
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 3.82%
||
7 Day CHG~0.00%
Published-09 May, 2025 | 16:31
Updated-16 May, 2025 | 15:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Simple College Management System Add New Student input stack-based overflow

A vulnerability was found in code-projects Simple College Management System 1.0. It has been declared as critical. This vulnerability affects the function input of the component Add New Student. The manipulation of the argument name/branch leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & ProjectsFabian Ros
Product-simple_college_management_systemSimple College Management System
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2012-0951
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.97%
||
7 Day CHG~0.00%
Published-12 Feb, 2020 | 16:56
Updated-06 Aug, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Memory Corruption Vulnerability exists in NVIDIA Graphics Drivers 29549 due to an unknown function in the file proc/driver/nvidia/registry.

Action-Not Available
Vendor-NVIDIA Corporation
Product-display_drivergraphics drivers
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-3812
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.45%
||
7 Day CHG~0.00%
Published-24 Jul, 2023 | 15:19
Updated-01 Aug, 2025 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags

An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-enterprise_linuxlinux_kernelRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 9.0 Extended Update SupportRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 8.1 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.2 Telecommunications Update ServiceRed Hat Virtualization 4 for Red Hat Enterprise Linux 8Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 8.6 Extended Update SupportRed Hat Enterprise Linux 8.2 Update Services for SAP Solutions
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-416
Use After Free
CVE-2025-4499
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 3.82%
||
7 Day CHG~0.00%
Published-10 May, 2025 | 11:31
Updated-28 May, 2025 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Simple Hospital Management System Add Information add stack-based overflow

A vulnerability classified as critical was found in code-projects Simple Hospital Management System 1.0. Affected by this vulnerability is the function Add of the component Add Information. The manipulation of the argument x[i].name/x[i].disease leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & ProjectsFabian Ros
Product-simple_hospital_management_systemSimple Hospital Management System
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-39661
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.59%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In _PMRLogicalOffsetToPhysicalOffset of the PowerVR kernel driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-246824784

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-11185
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.75%
||
7 Day CHG~0.00%
Published-21 Jan, 2021 | 09:41
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of bound issue in WLAN driver while processing vdev responses from firmware due to lack of validation of data received from firmware in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qpm5870wsa8830qcn5550qln5030qdm5579qpa5581ar9380qdm2307qfs2530qpa8802qat3519qcn5124qpm4621qca9992qet6100pmm855ausdr660gipq8078aqdm5670ipq6000qcn5064qpa8821smb1396ipq8072pm8350qdm5671qat3518qpm5641wcn3998qcn7605ipq8076aqat5516qdm5620ipq8074apm8350bhpm3003aqca6428sa8155ipq8071qpm8870qca6595auqpm5679sm7350qpm6670qca6584auipq8065qpm8820qpm4641sdr735gipq8174qca9990qca7500qcn5052smb1398ipq6010qdm4643ipq8068pmx55qcn9074pmr735aqdm3301sa8195pqpm5677qat5515qat3514wcn6851sa6155pqca8081qpa6560ipq8071asdr865wcd9385wcd9341smr545qln5020pmm8155auqdm3302qpm4630qca6390csr8811ipq4019sa8150pqdm2310pmm8195auqdm5621qln4642qca6438pmk7350qcn5121qca9898qca6564asmr546ipq4028sd8885gqet6110qln5040qca8072qpm6585wcn3991qpm5670qcn9000ipq8072aqln4650qpa8801qat5568qet5100qca6595ipq8078pmk8350qca6564auipq8173qcn5164pm8350bqat5522wsa8835qca6574qfs2630pmr735bqpa8842wcd9380qcn5154ipq4018qca6574aqcn5024sdr735qca9889smb1395pm8350cqpa8803smr525smr526ipq8074qca9888qca9985qpm4640wcn6750pmr525pm7350cqpm4650qtm525qca9886wcn6850wcn3910ipq8076qca6175asmb1394qca9984ipq6028ipq8064qcn5021qcn5152qat3555pm8009qca6391sdx55mqpa5461ipq6005pm8008qfs2608qcn5054ipq8070qdm4650qca9994qca6574auqca9980qcn5122qpm5621qca9880qpm6621qdm2308qdm5677wcn6856qdm5679ipq6018qcn5022sa6145ppmm6155ausdr8250wcn6740qca6696qca4024qpm5875qet5100mpmk8002qca8075qpa2625sa8155psdx55pm8350bhsipq8070aqat3516ipq4029qcn7606qpa5580Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-3903
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.3||HIGH
EPSS-0.32% / 54.76%
||
7 Day CHG~0.00%
Published-27 Oct, 2021 | 21:00
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap-based Buffer Overflow in vim/vim

vim is vulnerable to Heap-based Buffer Overflow

Action-Not Available
Vendor-Fedora ProjectVimDebian GNU/Linux
Product-vimdebian_linuxfedoravim/vim
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-3611
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.77%
||
7 Day CHG-0.00%
Published-21 Jul, 2023 | 20:49
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds write in Linux kernel's net/sched: sch_qfq component

An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.

Action-Not Available
Vendor-Debian GNU/LinuxLinux Kernel Organization, Inc
Product-linux_kerneldebian_linuxKernelkernel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-39685
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-1.10% / 77.11%
||
7 Day CHG+0.13%
Published-16 Mar, 2022 | 14:04
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28410
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 17.92%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:16
Updated-18 Mar, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-i915_graphicsIntel(R) i915 Graphics drivers for linux
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-39259
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.00%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 00:00
Updated-04 Aug, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A crafted NTFS image can trigger an out-of-bounds access, caused by an unsanitized attribute length in ntfs_inode_lookup_by_name, in NTFS-3G < 2021.8.22.

Action-Not Available
Vendor-tuxeran/aDebian GNU/Linux
Product-ntfs-3gdebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-39263
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.05%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 00:00
Updated-04 Aug, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A crafted NTFS image can trigger a heap-based buffer overflow, caused by an unsanitized attribute in ntfs_get_attribute_value, in NTFS-3G < 2021.8.22.

Action-Not Available
Vendor-tuxeran/aDebian GNU/Linux
Product-ntfs-3gdebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-39050
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 19.50%
||
7 Day CHG~0.00%
Published-13 Dec, 2021 | 18:35
Updated-17 Sep, 2024 | 02:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214440.

Action-Not Available
Vendor-IBM Corporation
Product-i2_analysts_notebooki2 Analyst's Notebook
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-36036
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.00% / 76.05%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 17:57
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-12-05||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1507windows_11_21h2windows_11_22h2windows_10_1809windows_10_21h2windows_server_2008windows_server_2019windows_11_23h2windows_10_22h2windows_server_2016windows_10_1607windows_server_2022windows_server_2012Windows 10 Version 1809Windows 10 Version 22H2Windows 10 Version 1507Windows 10 Version 1607Windows 11 version 21H2Windows Server 2019Windows 10 Version 21H2Windows Server 2008 Service Pack 2Windows 11 version 22H2Windows Server 2008 Service Pack 2Windows 11 Version 23H2Windows Server 2022Windows Server 2016Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016 (Server Core installation)Windows 11 version 22H3Windows Server 2012Windows Server 2008 R2 Service Pack 1Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-39261
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.05%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 00:00
Updated-04 Aug, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A crafted NTFS image can cause a heap-based buffer overflow in ntfs_compressed_pwrite in NTFS-3G < 2021.8.22.

Action-Not Available
Vendor-tuxeran/aDebian GNU/Linux
Product-ntfs-3gdebian_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-3487
Matching Score-4
Assigner-Silicon Labs
ShareView Details
Matching Score-4
Assigner-Silicon Labs
CVSS Score-7.7||HIGH
EPSS-0.27% / 50.11%
||
7 Day CHG~0.00%
Published-20 Oct, 2023 | 14:12
Updated-25 Sep, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in Silicon Labs Gecko Bootloader leads to unbounded memory access

An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.

Action-Not Available
Vendor-silabssilabs.comsilabs
Product-gecko_bootloaderGSDKgecko_bootloader
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-35001
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.21% / 43.19%
||
7 Day CHG~0.00%
Published-05 Jul, 2023 | 18:35
Updated-13 Feb, 2025 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability

Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace

Action-Not Available
Vendor-Linux Kernel Organization, IncNetApp, Inc.Debian GNU/LinuxFedora Project
Product-debian_linuxlinux_kernelh500sfedorah410sh410ch300sh700sLinux Kernel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-4500
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 3.82%
||
7 Day CHG~0.00%
Published-10 May, 2025 | 12:31
Updated-16 May, 2025 | 14:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Hotel Management System Edit Room edit stack-based overflow

A vulnerability, which was classified as critical, has been found in code-projects Hotel Management System 1.0. Affected by this issue is the function Edit of the component Edit Room. The manipulation of the argument roomnumber leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & Projects
Product-hotel_management_systemHotel Management System
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-34853
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.69%
||
7 Day CHG~0.00%
Published-22 Aug, 2023 | 00:00
Updated-03 Oct, 2024 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Supermicro motherboard X12DPG-QR 1.4b allows local attackers to hijack control flow via manipulation of SmcSecurityEraseSetupVar variable.

Action-Not Available
Vendor-supermicron/asupermicro
Product-x11ssqlx11sdd-18c-fx12dpfr-an6x11ssv_firmwarex11spw-ctfx12spt-gc_firmwarex11ssz_firmwarex13dsf-a_firmwarex13sefr-a_firmwarex11dpi-n_firmwarex12dgu_firmwareh12ssl-cx13dei-t_firmwarex13san-c-wohsx13set-gc_firmwarex12stw-tfh11dsu-in_firmwarex11opi-cpuh13ssw_firmwareh12ssff-an6_firmwareh13ssl-n_firmwarex11dpu-x_firmwarex11sca-wx11qph\+_firmwarex13sae_firmwarex12sth-fx11sds-12cx11ssql_firmwarex12dpl-i6x11sse-fx11spm-fx13deg-oadh12ssl-ntx11sph-nctfx11ssn_firmwarex12spg-nf_firmwarex12dgq-rx12sca-5f_firmwarex12stn-c_firmwarex11scm-ln8f_firmwarex11sse-f_firmwarex11ssz-tln4fx13saqx12sdv-8c-sp6f_firmwareh12dsg-o-cpu_firmwarex11dpt-bhx12spw-fx12dpg-u6_firmwarex11ddw-nt_firmwarex13san-l-wohs_firmwarex11dsn-ts_firmwareh12dsi-nt6x11dpi-ntx12scz-tln4f_firmwarex11dpuh12dgo-6x12dpt-b6x12sdv-8c-spt4f_firmwarex13san-lx13seed-f_firmwarex11dpi-nt_firmwarex11ssw-4tf_firmwarex12dpg-arx11sds-16c_firmwarex12sdv-16c-spt8f_firmwarex11sae_firmwareh11dsu-inx13dgu_firmwarex12spo-ntf_firmwarex11dpfr-sx12stn-h_firmwarex12spt-pt_firmwareh13sst-gch12ssw-inlx11ssl-nfx13sem-fx12stl-if_firmwareh13dsg-o-cpu-dx13sedw-f_firmwarex11sph-nctf_firmwareh12dsi-n6_firmwarex12stw-fx11spi-tf_firmwarex12sca-f_firmwareh13ssl-nx12qch\+_firmwareh11dsi-nt_firmwareh12dsg-o-cpux11dsn-tsqx11dpt-psx11ssqx11dpu-xll_firmwarex11sch-ln4f_firmwarex11dph-i_firmwarex12dgo-6_firmwarex11ssmx11dgo-t_firmwarex12dpt-pt46x11dpu-xx13det-b_firmwarex12spg-nfx12dpg-qbt6x12spl-ln4f_firmwareh12ssl-c_firmwarex12dai-n6_firmwarex12sth-ln4fx11sds-8c_firmwarex12stn-e_firmwarex11dai-nx12sdv-10c-sp6f_firmwarex11sri-if_firmwarex11scl-ifx11sdd-8c-fh12ssw-ntx12dpg-oa6-gd2_firmwarex11srm-vf_firmwareh13ssfx12sth-sys_firmwarex13qeh\+_firmwarex13san-h_firmwarex12spi-tf_firmwarex11satx11spg-tf_firmwarex12sca-fh12ssw-in_firmwarex11ssh-ln4f_firmwareh12ssff-an6x11dpu-xllx11sae_m_firmwarex13det-bh12ssw-an6_firmwareh12ssl-ct_firmwarex11ssw-tfh12ssw-inx11dpff-sn_firmwarex12dgux12stn-h-wohs_firmwareh12dgq-nt6_firmwarex13sew-fx12sae_firmwarex11sdd-18c-f_firmwareh13ssl-nt_firmwarex13sei-tfx11dpl-i_firmwarex11opi-cpu_firmwarex13deg-pvcx12dpd-a6m25_firmwarex12dsc-6x12ste-f_firmwarex12spz-ln4f_firmwarex11ssw-4tfx13saz-q_firmwarex12ddw-a6_firmwarex12stl-fx11sch-f_firmwarex13san-cx12spo-fh12ssw-ntlh13dsh_firmwarex11saex11srm-fx11spm-tpfx13sei-f_firmwarex12scv-wx11dsf-e_firmwarex11ssw-fx11sca-f_firmwarex12scv-lvds_firmwarex13dai-tx12stn-c-wohsx13deg-pvc_firmwarex13set-gcx13sew-tf_firmwarex11scw-f_firmwarex13seed-sf_firmwarex12dpl-nt6x12stl-f_firmwarex11sch-ln4fx13sra-tfx11ssh-ctfh12ssl-i_firmwarex11dac_firmwarex11sba_firmwarex12spt-gx12dpg-oa6h12sst-psx11ssh-gf-1585lx11scl-ln4fx11dpt-lx11dpff-snx11ssz-tln4f_firmwareh12dsu-in_firmwarex11ssl-cf_firmwarex11spa-tf_firmwarex11ssl-cfx11dgq_firmwarex11spw-ctf_firmwareh13sae-mfx12stn-hh13sshx13dem_firmwarex11dsf-ex11scl-f_firmwarex13sav-lvdsx12spt-ptx11dph-tqx12qch\+x11ssz-fx12spm-tf_firmwareh13ssl-nth13sst-gx12sdv-4c-spt4fh12dst-b_firmwarex12dpu-6_firmwarex12stn-l-wohsx12spw-f_firmwarex11ssd-fx11ssv-q_firmwarex11spw-tf_firmwarex12spm-ln6tf_firmwarex11dsc\+x13sew-f_firmwarex13san-c_firmwarex12sdv-10c-spt4f_firmwarex12spl-ln4fx11ssv-lvdsx12stn-l_firmwareh11dsi_firmwarex12stn-c-wohs_firmwarex11dpu-vx11dpi-nx12dpi-nt6_firmwarex12dpg-qbt6_firmwarex11ssl-fx11dpfr-s_firmwareh12ssw-ntr_firmwarex11ssm_firmwarex11spa-tfx12dhm-6x13srn-ex11ssq_firmwarex11sszx13srn-hx12dpg-oa6_firmwarex12sdv-4c-spt8fx12scq_firmwarex11scm-ln8fx11sae_mx11ssvx13dgux12std-f_firmwareh12ssw-an6x12std-fx11spw-tfx11ssv-qx11ssw-tf_firmwarex13deix11sri-ifx11srm-f_firmwarex13sei-fx13srn-h_firmwareh11dst-bx12sdv-20c-spt8f_firmwarex11ddw-ntx13sedw-fx11ssh-gf-1585_firmwarex11dpt-bh_firmwarex11dpx-tx13set-gx11dpl-ih11dsix11dpt-l_firmwarex12dpi-n6_firmwarex11ssh-gtf-1585_firmwareh13srd-f_firmwarex12dpg-oa6-gd2x11ssz-f_firmwarex12dpu-6x12stn-h-wohsx13saz-qx11scl-if_firmwarex12sdv-14c-spt8fh12dgo-6_firmwareh12dsi-nt6_firmwarex11dph-t_firmwarex11scm-fx11dpg-ot-cpu_firmwarex12stl-ifx12spw-tfx12scz-f_firmwarex12sae-5_firmwarex11ssh-gtf-1585l_firmwarex12spi-tfx13saex11scd-fx11ssl-nf_firmwarex12spm-ln4fx13dei_firmwarex11scax11scd-f_firmwarex12scqx12sdv-20c-spt8fx11sds-12c_firmwarex11srl-fx11srmx13srn-e_firmwareh12dsu-inr_firmwareh12ssg-an6x11scl-ln4f_firmwarex11dph-tx11dpu-ze\+_firmwarex12sae-5x12spz-ln4fx12spz-spln6f_firmwarex12dpd-a6m25x11ssh-gtf-1585x12spa-tfx12spa-tf_firmwarex11dach12ssl-ix11sra_firmwareh13srd-fx11dpu-z\+h12ssw-ntl_firmwarex12stn-l-wohs_firmwarex12spo-ntfx13seed-sfx12sth-ln4f_firmwarex11ssh-tf_firmwareh11dsi-ntx11srm_firmwarex13seed-fx12dpt-b6_firmwarex13san-e-wohs_firmwareh12ssg-anp6_firmwarex11sds-16cx11dpt-ps_firmwarex12dai-n6h13dsg-o-cpu-d_firmwarex12sdv-14c-spt8f_firmwarex11dai-n_firmwarex11ddw-lh12ssw-ntrx13sae-fx11dgqx11ssi-ln4f_firmwarex12ste-fx13deg-oa_firmwarex11dps-re_firmwarex11dsn-tsq_firmwarex12sdv-8ce-sp4fx11dph-ix11dpt-bx11dpu_firmwarex11sbah13ssh_firmwarex11spg-tfx13ddw-a_firmwarex13sae-f_firmwarex11spm-tfh12ssw-nt_firmwarex13qeh\+x11ssnh13sae-mf_firmwarex12dhm-6_firmwarex11sch-fx12dgo-6x11srax12dpg-u6x11ssh-f_firmwarex12spm-ln4f_firmwarex12spt-gcx12sth-sysh13sst-gc_firmwareh12ssg-anp6x11srm-vfx12dpg-qrx12dsc-6_firmwareh12sst-ps_firmwarex12stn-lx11ssv-lvds_firmwarex12scv-w_firmwarex13san-l-wohsx11ssl_firmwarex11dpg-ot-cpuh13sswx12dpg-qt6_firmwarex12dpg-qt6h12dsu-inrx11srl-f_firmwarex11scm-f_firmwarex13dei-tx12stn-e-wohsx11spa-t_firmwarex11ssm-f_firmwarex12scz-qf_firmwarex12dpl-i6_firmwarex11dpfr-snx13saq_firmwarex11ssh-fx12scz-tln4fx12sped-f_firmwarex12dpg-ar_firmwarex11sds-8cx11sslx12sdv-16c-spt8fh12ssw-inl_firmwarex13san-h-wohs_firmwareh12dsi-n6h12ssl-nt_firmwarex11ssh-tfx12spz-spln6fx11dpu-z\+_firmwarex11dpg-qth12dgq-nt6x11sca_firmwarex11spm-f_firmwarex13san-h-wohsx11scw-fx12spo-f_firmwareh13sst-g_firmwarex11dpu-ze\+x13deg-oad_firmwarex12sdv-10c-spt4fx13san-hx11dph-tq_firmwarex12ddw-a6h12ssl-ctx11qph\+x13sem-f_firmwarex11spa-tx13san-e_firmwarex12scz-fx12sped-fx13sei-tf_firmwarex12scv-lvdsh12ssw-inr_firmwarex11dgo-tx12stw-f_firmwarex12stn-e-wohs_firmwarex11dpx-t_firmwareh13dsg-o-cpu_firmwarex12sdv-8c-spt8f_firmwarex12sca-5fh13ssf_firmwarex13sem-tfx11dsc\+_firmwarex11spm-tpf_firmwarex12sdv-4c-sp6f_firmwarex11sca-w_firmwarex11spl-fx11spm-tf_firmwarex11dpg-qt_firmwarex11ddw-l_firmwarex12sdv-8c-spt8fx12dgq-r_firmwarex11dpfr-sn_firmwarex11sdd-8c-f_firmwarex12stn-cx13ddw-ah12dsg-q-cpu6x12dpt-pt6_firmwareh12dsu-inx12dpt-pt6x11ssm-fx13set-g_firmwarex11spl-f_firmwarex13demx13dsf-ah13dsg-o-cpux13saz-f_firmwarex11dps-rex11scl-fh12dsg-q-cpu6_firmwarex13srn-e-wohs_firmwarex12sdv-4c-spt4f_firmwarex12spt-g_firmwarex12dpg-qr_firmwarex13dai-t_firmwareh12ssw-inrx13sav-psx11ssh-ctf_firmwarex13sra-tf_firmwarex11ssi-ln4fx11dsn-tsx12sdv-8c-sp6fx13deg-qtx12dpl-nt6_firmwarex11ssd-f_firmwareh12ssg-an6_firmwarex11ssl-f_firmwarex12spm-tfx13san-ex12sth-f_firmwarex12sdv-8c-spt4fh13dshh12ssfr-an6x13sefr-ax13san-e-wohsx13deg-qt_firmwarex13deg-oax12sdv-8ce-sp4f_firmwarex12sdv-4c-sp6fx13sav-lvds_firmwarex12stw-tf_firmwarex11dpg-snx11ssh-gf-1585h12dst-bh12ssfr-an6_firmwarex13sew-tfx11ssw-f_firmwarex13sem-tf_firmwarex11sph-nctpf_firmwarex12spl-fx12saex11dpt-b_firmwareh11dst-b_firmwarex12dpt-pt46_firmwarex11ssh-ln4fx13san-c-wohs_firmwarex13saz-fx11sca-fx11spi-tfx12sdv-10c-sp6fx12sdv-4c-spt8f_firmwarex12spm-ln6tfx11dpg-sn_firmwarex13san-l_firmwarex12scz-qfx12dpi-n6x12spl-f_firmwarex11sat_firmwarex11sph-nctpfx11ssh-gtf-1585lx12dpi-nt6x13srn-e-wohsx12spw-tf_firmwarex12dpfr-an6_firmwarex11ssh-gf-1585l_firmwarex11dpu-v_firmwarex12stn-ex13sav-ps_firmwaren/ax12dpg-qr
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-35788
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.56%
||
7 Day CHG~0.00%
Published-16 Jun, 2023 | 00:00
Updated-05 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.

Action-Not Available
Vendor-n/aCanonical Ltd.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-h410sh410c_firmwareh410s_firmwareh410cdebian_linuxh500s_firmwareh300s_firmwareh500sh700slinux_kernelh700s_firmwareh300subuntu_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-34318
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.26%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 17:16
Updated-27 Jun, 2025 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap-buffer-overflow in src/hcom.c

A heap buffer overflow vulnerability was found in sox, in the startread function at sox/src/hcom.c:160:41. This flaw can lead to a denial of service, code execution, or information disclosure.

Action-Not Available
Vendor-n/aFedora ProjectRed Hat, Inc.SoX - Sound eXchange
Product-fedorasound_exchangeenterprise_linuxextra_packages_for_enterprise_linuxExtra Packages for Enterprise LinuxsoxRed Hat Enterprise Linux 6Red Hat Enterprise Linux 7Fedora
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-4077
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 5.83%
||
7 Day CHG+0.01%
Published-29 Apr, 2025 | 18:00
Updated-14 May, 2025 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects School Billing System searchrec stack-based overflow

A vulnerability classified as critical was found in code-projects School Billing System 1.0. This vulnerability affects the function searchrec. The manipulation of the argument Name leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & ProjectsFabian Ros
Product-school_billing_systemSchool Billing System
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-34319
Matching Score-4
Assigner-Xen Project
ShareView Details
Matching Score-4
Assigner-Xen Project
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.02%
||
7 Day CHG~0.00%
Published-22 Sep, 2023 | 13:34
Updated-18 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux: buffer overrun in netback due to unusual packet

The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of the entire packet being split into as many pieces as permitted by the protocol, yet still being smaller than the area that's specially dealt with to keep all (possible) headers together. Such an unusual packet would therefore trigger a buffer overrun in the driver.

Action-Not Available
Vendor-Linux Kernel Organization, IncXen ProjectDebian GNU/Linux
Product-linux_kernelxendebian_linuxLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33877
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.06% / 16.99%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-03 Oct, 2024 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_450_fa_firmwarerealsense_450_faIntel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-23560
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.51%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 02:51
Updated-04 Aug, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000001bcab.

Action-Not Available
Vendor-n/aIrfanView
Product-irfanviewn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33066
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.75%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Audio

Memory corruption in Audio while processing RT proxy port register driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwaresnapdragon_x20_lte_modemsd865_5gmdm9215_firmwaresnapdragon_632_mobileqca6595qca8081_firmwaresnapdragon_670_mobilesnapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilefastconnect_6700wcn3610mpq8064sa4150psnapdragon_427_mobile_firmwaresnapdragon_782g_mobile_firmwaresnapdragon_wear_4100\+_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395snapdragon_665_mobile_firmwaresc8180xp-aaabqca6574au_firmwareqca6564_firmware9207_lte_modem_firmwareqam8295pwcd9341sd626_firmwaresnapdragon_820_automotive205_mobilesnapdragon_888\+_5g_mobile_firmwaresnapdragon_x12_lte_modemwsa8810_firmwaresd730_firmwarewsa8845h_firmwaresnapdragon_212_mobilesc8180xp-acafwcn3660_firmwaresnapdragon_850_mobile_computesnapdragon_820_automotive_firmwarefastconnect_6800_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_678_mobile_firmwaremdm9625msnapdragon_425_mobilesnapdragon_632_mobile_firmwaremsm8108qsm8250_firmwarevideo_collaboration_vc1_platformwcn3660asnapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200qca6310wcd9360snapdragon_680_4g_mobilesa6155psnapdragon_212_mobile_firmwareqca6564au_firmwaresd820snapdragon_429_mobile_firmwaremdm8207video_collaboration_vc5_platform_firmwaresnapdragon_888_5g_mobile_firmwaresnapdragon_wear_2500snapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwaremdm9640_firmwaresd835snapdragon_x55_5g_modem-rfsnapdragon_4_gen_2_mobile_firmwareqca6436_firmwaresnapdragon_695_5g_mobile_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqts110sm4125_firmwaremsm8227_firmwareqca6420qca6174_firmwarewcn3910apq8064au_firmwaremdm9205s_firmwarecsrb31024qca9367mdm9250_firmwaresnapdragon_712_mobilewcn3660bqca6574awcn3620_firmwareqca6174aqca6584_firmwarewcd9340qcs8250_firmwaremdm9235mqcm2290snapdragon_auto_5g_modem-rf_gen_2snapdragon_835_mobile_pc_firmwaresm8550p_firmwareqcm8550snapdragon_x20_lte_modem_firmwaresnapdragon_765_5g_mobile_firmwarewcn3988apq8076qcn9024vision_intelligence_300_firmwaremdm8615mqca6574215_mobileqcs410apq8064_firmwareqcm2290_firmwarevision_intelligence_100mdm8215m_firmwarehome_hub_100sa8155psnapdragon_765g_5g_mobile_firmwaresmart_display_200_firmwaresnapdragon_wear_2100_firmwaresm8550pwsa8830sa6145psnapdragon_625_mobile_firmwaremdm8215mmdm8215msm8996ausnapdragon_4_gen_2_mobilesnapdragon_7c_compute_firmwareqrb5165m_firmwaresnapdragon_820_mobile_firmwarewcn3620snapdragon_208_processor_firmwaresnapdragon_865\+_5g_mobile_firmwaresnapdragon_x5_lte_modemsnapdragon_429_mobileapq8064auwcn3950_firmwareqrb5165nmdm9205sfastconnect_6200sm7325p_firmwaresd460wcd9360_firmwaresc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_660_mobile_firmwaremdm9615msnapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarerobotics_rb3_firmwaresd670_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobilesc8180xp-acaf_firmwareqcn6224_firmwarevision_intelligence_100_firmwareqca6431sd660_firmwaremdm9625snapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwareqca9379_firmwaresxr2130_firmwaremdm9225m_firmwaresnapdragon_860_mobile_firmwarear8035_firmwaresnapdragon_778g\+_5g_mobileqrb5165mqca6320sd888_firmwaremdm9215wcd9306qcs6125_firmwaresnapdragon_wear_1300_firmwareqcn9074wsa8815_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresnapdragon_665_mobilemsm8230sm7250p_firmwarewcn3680_firmwarewcn3999wcn3950snapdragon_730g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaremsm8227apq8037snapdragon_778g\+_5g_mobile_firmwaresa8295p_firmwaresmart_audio_400_firmwaresd_675_firmwaresnapdragon_855\+_firmwaresa4155p_firmwareqca9984snapdragon_720g_mobilesm7250pcsrb31024_firmwaresa8155sd_8cx_firmwaresc8180x-acafsd888sd460_firmwaresnapdragon_850_mobile_compute_firmwaresnapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobilear9374wcn3660a_firmwareqca6310_firmwaresd626fastconnect_6800qcs7230pm8937snapdragon_865_5g_mobile_firmwarewcd9371fastconnect_6900_firmwarerobotics_rb5_firmwaresmart_audio_200wcn2243snapdragon_1200_wearablesc8180x-aaab_firmwarevideo_collaboration_vc3_platform215_mobile_firmwareqca6431_firmware9205_lte_modem_firmwareqca6698aq_firmwareqcs2290qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615qca9367_firmwarewcn3999_firmwaremdm9615m_firmwarewcn3680qcs7230_firmwarewcd9390_firmwareqca6430mdm9650snapdragon_765_5g_mobilesnapdragon_860_mobilesc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_208_processorflight_rb5_5g_firmware9206_lte_modem_firmwaremsm8108_firmwaresnapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwaremsm8960sg_firmwarevideo_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresd855_firmwaremdm9225mdm9640qca6436qrb5165n_firmwaresnapdragon_x70_modem-rfsnapdragon_x24_lte_modem_firmwarewcd9335_firmwareqca6391_firmwarewcn3980_firmwarewsa8835wsa8840_firmwaremdm9310_firmwaremsm8930_firmwareqcs4290_firmwaresnapdragon_430_mobile_firmwarecsra6620qca8081apq8084mdm9628sd660wsa8815qca9377snapdragon_439_mobile_firmwareqcm4290_firmwarempq8064_firmwaresnapdragon_720g_mobile_firmwarewcn2243_firmwaremdm9635mmdm9635m_firmwaresnapdragon_710_mobilemdm9615_firmwaresg4150p_firmwarecsra6620_firmwareqcs8550mdm8215_firmwaresnapdragon_626_mobilesd865_5g_firmwaresnapdragon_xr1wcd9375apq8076_firmwaresnapdragon_636_mobilesa8145psd_675snapdragon_8\+_gen_1_mobile_firmwaresmart_display_200ar6003_firmwarewcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwaresnapdragon_wear_3100_firmwareqcm8550_firmwareapq8017qcs410_firmwarerobotics_rb3sa6150p_firmwaresxr1120qcs610_firmwarewcd9335wcd9370snapdragon_7c_gen_2_compute_firmwaremsm8230_firmwareqca4004qca6696wcd9341_firmwarewcn6740_firmwaresnapdragon_780g_5g_mobilesnapdragon_750g_5g_mobileqca9984_firmwaresnapdragon_685_4g_mobilevision_intelligence_200_firmwaresnapdragon_x50_5g_modem-rf_firmwaremsm8930snapdragon_auto_4g_modem9205_lte_modemsnapdragon_690_5g_mobile_firmwareqsc1215snapdragon_wear_1300qca6574auwcd9390pm8937_firmwarecsra6640msm8209_firmwaresnapdragon_778g_5g_mobile_firmwarewcn3660b_firmwaresd730snapdragon_690_5g_mobile9207_lte_modemqcn6024_firmwaremsm8627_firmwaresnapdragon_636_mobile_firmwaresnapdragon_712_mobile_firmwaresnapdragon_625_mobilesnapdragon_210_processor_firmwareqcm6125_firmwarec-v2x_9150qcc710snapdragon_1100_wearable_firmwaresnapdragon_xr2_5g_firmwaremdm9615snapdragon_xr1_firmwaresxr1120_firmwaresnapdragon_x5_lte_modem_firmwaresnapdragon_wear_4100\+315_5g_iot_modem_firmwarefastconnect_6900qfw7114315_5g_iot_modemmsm8960_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_730_mobilesnapdragon_wear_3100mdm9250wsa8845msm8630snapdragon_626_mobile_firmwareqca6421_firmwareqcm6125mdm9230sc8180x-adwsa8810qsm8250qca6595ausnapdragon_888_5g_mobilesm7315_firmwarewcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840mdm9230_firmwareqcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwareqcn9012qsc1215_firmwaremdm9650_firmwarewcd9371_firmwareqcs4490_firmwarewcn3910_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobilewcd9370_firmwaresnapdragon_8\+_gen_2_mobilesa8195pmdm9310snapdragon_1200_wearable_firmwareqca6335_firmwareqcm6490snapdragon_662_mobilemsm8627qca9379msm8960sgsd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaremsm8130_firmwareqcn9011smart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326sa8155p_firmwaresnapdragon_630_mobileqca6564asnapdragon_855\+snapdragon_wear_2100qcn9074_firmwaresnapdragon_768g_5g_mobile_firmwaresnapdragon_7c_gen_2_computesc8180x\+sdx55_firmwarear8035qca6564sa6155qcn6224snapdragon_435_mobile_firmwaresc8180x\+sdx55qca6698aqsm6250apq8064snapdragon_480\+_5g_mobilesd670wcn3680bapq8030sa8145p_firmwaresa8150p_firmwarefastconnect_6700_firmwarewcn3990snapdragon_x75_5g_modem-rf_firmwareqcs6490qcs8250snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarehome_hub_100_firmwaresnapdragon_460_mobile_firmwarewsa8830_firmwarewsa8845_firmwarewsa8832mdm9330_firmwaresnapdragon_auto_4g_modem_firmwaremsm8960sc8180xp-aaab_firmwaremdm9630205_mobile_firmwaresa4150p_firmwaremsm8608_firmwaremsm8209qca6564ausnapdragon_1100_wearablesnapdragon_820_mobilesnapdragon_425_mobile_firmwaresm6250p_firmwaresc8180xp-adar6003sa8195p_firmwareqcm4290sd_455_firmwaremsm8608ar8031mdm9225_firmwareqca9377_firmwareqcm6490_firmwaresg8275p_firmwaresnapdragon_xr2\+_gen_1sm4125mdm9235m_firmwareqcm4490_firmwarevision_intelligence_400_firmwareqcs6125flight_rb5_5gsnapdragon_870_5g_mobile_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobileqca4004_firmwaresnapdragon_870_5g_mobilesmart_audio_200_firmwaresnapdragon_678_mobilesd_455sm6250_firmwaresc8180x-ad_firmwaresnapdragon_7c_computeqca6584auqca6320_firmwareqcn6274_firmwaresnapdragon_435_mobileqcn9011_firmwaresnapdragon_wear_2500_firmwarewcn6740snapdragon_780g_5g_mobile_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwareqfw7114_firmwaremdm9625m_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilemdm9630_firmwareapq8017_firmwarewcd9380sa6145p_firmwaresa6155_firmwaresnapdragon_450_mobile_firmwaresnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresc8180x-aaabsd662_firmwarewcn3660aqt1000wcd9306_firmwaresnapdragon_4_gen_1_mobile_firmwarec-v2x_9150_firmwareqam8295p_firmwaresd855wcd9330_firmwareqca6174wcn3990_firmwaresm7315snapdragon_660_mobileqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobilemsm8909w_firmwaresnapdragon_8_gen_1_mobilesnapdragon_630_mobile_firmwarewcd9330mdm8207_firmwaresd662snapdragon_680_4g_mobile_firmwarewcn3610_firmwareqcs4290snapdragon_865\+_5g_mobilesd820_firmwaresg8275psm6250psdx55_firmwareapq8030_firmwarewcn3615_firmwaresnapdragon_210_processorsxr2130qcm4490snapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfapq8037_firmwaresnapdragon_670_mobile_firmwareaqt1000_firmwaresdm429wqca6584au_firmwareqcn6274qfw7124qca6595au_firmwareqca6696_firmwaremsm8130wcd9380_firmwaremdm9625_firmwareapq8084_firmwareqca6574_firmwaresg4150pmdm9628_firmwaresnapdragon_x75_5g_modem-rfsnapdragon_427_mobile9206_lte_modemqca6574a_firmwaremsm8630_firmwaresdx55mdm9225msnapdragon_4_gen_1_mobilesnapdragon_450_mobilesnapdragon_865_5g_mobilesnapdragon_835_mobile_pcsd675wcd9375_firmwareqca6391ar9374_firmwareqts110_firmwareqcn9012_firmwaresnapdragon_439_mobileqca6584sa8295pfastconnect_7800snapdragon_8\+_gen_2_mobile_firmwarevision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmwaresnapdragon_430_mobilemdm8615m_firmwaresd_8cxvision_intelligence_400wsa8835_firmwarewcn3980mdm9330msm8909wqcs610Snapdragonqca6574a_firmwarequalcomm_video_collaboration_vc1_platform_firmwaremdm9628_firmwareqcs4490_firmwaresd_455_firmwareqca6431_firmwareflight_rb5_5g_platform_firmwaremsm8960_firmwaresa8150p_firmwareqcn9024_firmwareqcs7230_firmwarear6003_firmwarequalcomm_video_collaboration_vc5_platform_firmwarefastconnect_6700_firmwareqcm6490_firmwaremdm9250_firmwaresa8155p_firmwarefastconnect_6200_firmwaremsm8909w_firmwaresa4155p_firmwareapq8030_firmwareqcn6224_firmwareqca6420_firmwarecsrb31024_firmwaresa6155_firmware9206_lte_modem_firmwarempq8064_firmwareqca9377_firmwaremdm9625_firmwaremsm8230_firmwareqca6698aq_firmwareqsc1215_firmwareqca8081_firmwareqca9367_firmwaremsm8627_firmwarefastconnect_7800_firmwarecsra6640_firmwaremdm8215_firmwareqcm8550_firmwareqca6174_firmwarecsra6620_firmwaresa8155_firmwareqcn6024_firmwareqca6436_firmwareqca6595_firmwareqcn6274_firmwareqcn9011_firmwaremdm9650_firmwarec-v2x_9150_firmware9207_lte_modem_firmwareqsm8250_firmwaremdm9615_firmwareqca6564a_firmwaremsm8960sg_firmwaremdm8615m_firmwareqca6335_firmwareqrb5165n_firmwaremsm8108_firmwaresa8195p_firmwareqcn9012_firmwaresd_8cx_firmwarear8035_firmware315_5g_iot_modem_firmwarefastconnect_6800_firmwaremsm8608_firmwareqcs6125_firmwaremdm9640_firmwaremsm8209_firmwaremdm9310_firmwareqcc710_firmwaremdm9615m_firmwareqca6574au_firmwareapq8017_firmwaresa6155p_firmwareqcn9074_firmwareqcs8550_firmwaremdm9635m_firmwaremdm9230_firmwareqca6564au_firmwareqca6564_firmwaremsm8227_firmwareqcm6125_firmwareqca6696_firmwareapq8064au_firmwareqca8337_firmwareqca6584_firmwareqca6595au_firmwareaqt1000_firmwaremsm8630_firmwareqcs6490_firmwaremsm8930_firmwarepm8937_firmwaresa6145p_firmwaresa8295p_firmwaresa4150p_firmwarequalcomm_205_mobile_platform_firmwaresa6150p_firmwaremdm9225m_firmwareqca6174a_firmwareqfw7124_firmwaremsm8130_firmwareqca6391_firmwaremdm9205s_firmwarefastconnect_6900_firmwaremdm9235m_firmwareqca6584au_firmwarerobotics_rb3_platform_firmwareqfw7114_firmwaremdm9330_firmwaremsm8996au_firmwareqam8295p_firmwareqca6320_firmwareqca6574_firmwaremdm9215_firmwareqca9984_firmwaresd_675_firmwareapq8084_firmwareapq8064_firmwaresa8145p_firmwaresd460_firmwarear8031_firmwaremdm8207_firmwaremdm9630_firmwareqcm4490_firmwarequalcomm_215_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc3_platform_firmwarerobotics_rb5_platform_firmwareqcs4290_firmwareqcs610_firmwarehome_hub_100_platform_firmwareqcs2290_firmwaremdm9625m_firmwareapq8037_firmwaremdm9225_firmwareqca9379_firmwareqrb5165m_firmwareqca6430_firmware9205_lte_modem_firmwarear9374_firmwareapq8076_firmwaremdm8215m_firmwareqca6426_firmwareqca6421_firmwareqcs410_firmwareqts110_firmwareqca6310_firmwareqcm4290_firmwareqca4004_firmwareqcs8250_firmware
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2023-33038
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 11.92%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-14 Nov, 2024 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Radio Interface Layer

Memory corruption while receiving a message in Bus Socket Transport Server.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwaresm6250p_firmwareqcs610315_5g_iot_modem_firmwareqca8337qca6431_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwarewcd9360_firmwaresnapdragon_888_5g_mobile_platformwcn3950_firmwaresc8180x\+sdx55sa8150p_firmwaresm4450_firmwareqcs2290qca6595au_firmwaresa6155snapdragon_480_5g_mobile_platformsnapdragon_x70_modem-rf_systemcsra6620_firmwaresd_675_firmwarecsra6640_firmwaresnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcd9371_firmwarewcn3950qcn6024_firmwaresnapdragon_460_mobile_platformsd460_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca8081_firmwaresa6155_firmwarewcd9375_firmwareqca6420wcd9360snapdragon_782g_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_firmwaresmart_audio_400_platform_firmwareqca6698aqqcs6125sa8155_firmwaresd662_firmwaresnapdragon_765g_5g_mobile_platformqca6430snapdragon_678_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platformsnapdragon_720g_mobile_platformsnapdragon_8cx_compute_platformwcd9340snapdragon_780g_5g_mobile_platformsw5100qca6436sa6155psnapdragon_765_5g_mobile_platform_firmwareqca6698aq_firmwaresnapdragon_690_5g_mobile_platformwcd9341qca6431qca6696_firmwarewcd9371wcn3910_firmwaresnapdragon_855_mobile_platform_firmwaresa8150pwsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresnapdragon_7c_gen_2_compute_platform_firmwaresnapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresw5100psnapdragon_8cx_gen_2_5g_compute_platformsnapdragon_w5\+_gen_1_wearable_platformqca6564ausnapdragon_7c\+_gen_3_computewcd9380snapdragon_782g_mobile_platformfastconnect_6700qcs410qca6430_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815wcn3910snapdragon_865\+_5g_mobile_platformsnapdragon_4_gen_1_mobile_platformqca6426_firmwaresm4450qcn9024wcn3980_firmwaresd730snapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwarewcn6740_firmwaresnapdragon_8cx_compute_platform_firmwareqcs4490_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_systemfastconnect_6900fastconnect_6900_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresnapdragon_x24_lte_modemwsa8832sw5100p_firmwareqcs610_firmwaresa6145psnapdragon_730_mobile_platformqcs4490sa8145psnapdragon_750g_5g_mobile_platformsnapdragon_888\+_5g_mobile_platform_firmwareqca6391_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675snapdragon_695_5g_mobile_platformsnapdragon_720g_mobile_platform_firmwaresnapdragon_855_mobile_platformar8035_firmwareqcm2290snapdragon_480\+_5g_mobile_platformsnapdragon_662_mobile_platform_firmwarewsa8830sa8145p_firmwareqcs2290_firmwaresnapdragon_x24_lte_modem_firmwarecsrb31024snapdragon_865_5g_mobile_platformcsra6620qcs4290snapdragon_888_5g_mobile_platform_firmwareqca6420_firmwaresd730_firmwaresnapdragon_auto_4g_modem_firmwarewcd9370sd675_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6426wcn3990_firmwareqca9377wcd9385_firmwarewcd9326_firmwarefastconnect_6200snapdragon_7c_gen_2_compute_platformsd662sa8155snapdragon_x55_5g_modem-rf_systemsdx55_firmwaresnapdragon_778g_5g_mobile_platformqca6595ausm7250p_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_x70_modem-rf_system_firmwareqcs6490qcs8550_firmwarewcn3988_firmware315_5g_iot_modemsa6145p_firmwareqca6421sm6250fastconnect_6700_firmwaresa8195pwsa8810_firmwarewcd9326wcd9335sg4150pqca8081qcm4490snapdragon_888\+_5g_mobile_platformqca6174a_firmwareqcs4290_firmwarewcd9385sxr2130_firmwareqcs6490_firmwaresnapdragon_665_mobile_platform_firmwarear8035wcd9375aqt1000sc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_768g_5g_mobile_platform_firmwareqcm6490wsa8815_firmwarewsa8835_firmwaresg4150p_firmwareqcm6125_firmwareqcm4325qcm2290_firmwaresnapdragon_855\+\/860_mobile_platform_firmwarewcn3990sd_675sd865_5gfastconnect_6800snapdragon_8c_compute_platformsd888wsa8835snapdragon_auto_5g_modem-rfsm6250psnapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresxr2130qca6574asmart_audio_400_platformqca6174asm7325psd855sm7325p_firmwaresdx57m_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwarefastconnect_6200_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformsm7315sd460qca6391snapdragon_x55_5g_modem-rf_system_firmwarefastconnect_7800aqt1000_firmwaresnapdragon_7c_compute_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_auto_4g_modemqcm4290csrb31024_firmwareqcm6490_firmwarewsa8832_firmwareqca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_765g_5g_mobile_platform_firmwaresnapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_8c_compute_platform_firmwaresnapdragon_675_mobile_platformwcn6740qca6696snapdragon_732g_mobile_platformqcs8550sa6150psnapdragon_x50_5g_modem-rf_systemsnapdragon_768g_5g_mobile_platformqcn6024snapdragon_765_5g_mobile_platformsm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresw5100_firmwareqcs410_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_7c_compute_platformSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-32380
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.03%
||
7 Day CHG~0.00%
Published-23 Jun, 2023 | 00:00
Updated-05 Dec, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. Processing a 3D model may lead to arbitrary code execution.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33055
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.42%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Audio

Memory Corruption in Audio while invoking callback function in driver from ADSP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsw5100pqca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwareqca6696sm7250-absnapdragon_x50_5g_modem-rf_systemwcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcc710_firmwareqca6426wcn6740_firmwaresa4150psm7325-ae_firmwareqca8337qca6426_firmwarewcd9395qca6574au_firmwarewcn785x-5qam8295psm8150_firmwarewcd9341qca6574auwcd9390snapdragon_x12_lte_modemwsa8810_firmwarewsa8845h_firmwarecsra6640wcn3660b_firmwaresm8150-acsm6375_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psm8350qcm6125_firmwareqcc710sm6375sm7250-aa_firmwaresdm439_firmwarevideo_collaboration_vc1_platformqfw7114wcd9385_firmwareqca6421snapdragon_x55_5g_modem-rf_systemqam8255p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155pqca6421_firmwareqcm6125wsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresnapdragon_8\+_gen_2_mobile_platformsm8350-acqca6595ausm7315_firmwaresm7325_firmwarewcd9326_firmwaresa6155p_firmwarewsa8840qcs8550_firmwareqfw7124_firmwareqca6436_firmwareqcn9012snapdragon_8_gen_2_mobile_platformwcn3910_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwaresm8250-ac_firmwareqca6420wcn3910wcd9370_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_660_mobile_platformwcn3660bqca6574asm7325-aeqca6174asa8195pwcd9340qcs8250_firmwareqcm2290sm6225qcm6490sm8150-ac_firmwaresm8550p_firmwarewcn3998_firmwareqcm8550wcn3988qca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemqca6430_firmwareqcn9011wsa8845hwcd9326sa6150psm7250-aaqcs410qcm2290_firmwaresa8155p_firmwarewcn685x-1_firmwaresa8155pwsa8830snapdragon_662_mobile_platformsm8550psa6145psa8255p_firmwarewcn785x-1_firmwarear8035qrb5165m_firmwareqcm4325qcn6224qca6698aqwcn3950_firmwareqrb5165nsm7250-acwcn685x-1sa8145p_firmwaresm7325p_firmwarewcn3680bsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformvideo_collaboration_vc3_platform_firmwarewcn3990qcs6490qcs8250wsa8830_firmwareqcn6224_firmwareqca6431wsa8845_firmwaresd660_firmwaresm6350sxr2130_firmwarear8035_firmwareqrb5165msm8250-ab_firmwaresa4150p_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresd888_firmwaresnapdragon_662_mobile_platform_firmwareqcs6125_firmwaresm6225_firmwaresm7325-af_firmwarewsa8815_firmwaresa8195p_firmwaresm8250-abqca8337_firmwareqcm4290snapdragon_x12_lte_modem_firmwaresm7325sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresm8350-ac_firmwaresm7250p_firmwaresm4125wcn785x-5_firmwarewcn3950snapdragon_xr2_5g_platformsm4250-aaqcs6125apq5053-aa_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwaresm7350-ab_firmwarewcn3991sa8295p_firmwareapq5053-aasa4155p_firmwaresm7250pqcn6274_firmwaresd888qcn9011_firmwaresw5100_firmwarewcn685x-5wcn6740sm6225-ad_firmwareqfw7114_firmwareqca6595_firmwareqcs7230sm8250-acsm8250_firmwaresm7225wcd9380sa6145p_firmwareqam8255psnapdragon_xr2_5g_platform_firmwaresa8150psm7350-absnapdragon_auto_5g_modem-rf_firmwareqrb5165_firmwaresm8350_firmwaresm6225-adsm4350-acsw5100video_collaboration_vc3_platformaqt1000sm8150wcn3991_firmwareqam8295p_firmwaresd855qca6431_firmwaresm7225_firmwarewcn3990_firmwaresm7315qca6698aq_firmwareqcs2290wcd9385qcs2290_firmwarewcn3615sa8255pqcs7230_firmwareqcs4290wcd9390_firmwarewcn6750qca6430sg8275pwcn6750_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rfwcn3615_firmwaresm7250-ab_firmwaresxr2130csra6640_firmwaresnapdragon_xr2\+_gen_1_platformqca6174a_firmwaresm7325pqam8650p_firmwarewcn3998video_collaboration_vc5_platformqca6420_firmwareaqt1000_firmwareqcs6490_firmwarewcn3980_firmwaresd855_firmwarewcd9335_firmwareqcn6274qca6436qfw7124qrb5165n_firmwareqca6595au_firmwareqca6391_firmwarewsa8835wsa8840_firmwaresw5100p_firmwaresm4250-aa_firmwaresm8250qca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarewsa8815csra6620qca8081sd660sg4150psm4375qam8775pqca6797aqqca9377sm4375_firmwareqcm4325_firmwareqca6574a_firmwaresdx55sdm439qcm4290_firmwaresm6350_firmwarewcd9375_firmwareqca6391qrb5165wcn785x-1qualcomm_215_mobile_platformqcn9012_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarecsra6620_firmwaresa8295psnapdragon_x50_5g_modem-rf_system_firmwareqcs8550qam8775p_firmwaresd865_5g_firmwarequalcomm_215_mobile_platform_firmwarewcd9375wcn685x-5_firmwarewcn3988_firmwaresa8145psm4350-ac_firmwarewsa8835_firmwaresnapdragon_660_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwaresm7250-ac_firmwarewcn3980wcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33074
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 6.81%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-05 Feb, 2025 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Audio

Memory corruption in Audio when SSR event is triggered after music playback is stopped.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830wcd9380_firmwaresa6150p_firmwaressg2125psa8145p_firmwaresxr2230p_firmwaresw5100pqam8650psd865_5gsg8275p_firmwaresnapdragon_w5\+_gen_1_wearable_platformwcn785x-5qca6595qam8775pwsa8840wsa8835qca6574sxr1230p_firmwarewcn3950_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewcd9380sa8150p_firmwareqca6595au_firmwaressg2125p_firmwareqca6574assg2115pwcn685x-5_firmwaresxr1230pwcn685x-1sg8275psnapdragon_8_gen_2_mobile_platformwcn6750wcn3980wcd9385_firmwareqam8295pwcn3950wsa8845qcm4325_firmwareqca6574_firmwarewsa8815sxr2230pwsa8845_firmwareqam8295p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwareqca6574au_firmwareqca6595ausm6225-adwsa8845h_firmwarewcn785x-5_firmwarewcn3980_firmwaresa8295psnapdragon_w5\+_gen_1_wearable_platform_firmwaresm8475_firmwaresa6155p_firmwaresm6225snapdragon_xr2_5g_platformsm6225-ad_firmwarewsa8840_firmwareqca6698aqsa4155p_firmwarewsa8832_firmwarewcn685x-5sm6225_firmwarewcn3988_firmwareqca6797aq_firmwarewcn785x-1_firmwareqca6574ausa6145p_firmwaresa8155p_firmwaresa8195pwsa8810_firmwaresnapdragon_8\+_gen_2_mobile_platformsw5100wsa8810wsa8845hwsa8832wcd9395_firmwaresa8255p_firmwaresa6155psw5100p_firmwaresm8550pqca6698aq_firmwaresa6145pwcn685x-1_firmwarewcd9385qam8650p_firmwareqam8775p_firmwaresa8255pqca6696_firmwareqca6595_firmwaresa8145pwcd9395qca6696qca6797aqsa4150p_firmwarewcn6750_firmwaresa8150psm8550p_firmwaresa6150pwcd9390wcd9390_firmwaresa8155pwsa8830_firmwaresd865_5g_firmwarewcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwaresw5100_firmwaresm8475sa8295p_firmwareqam8255psa4155psa4150psnapdragon_8_gen_2_mobile_platform_firmwarewcn785x-1qcm4325Snapdragon
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-32837
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.49%
||
7 Day CHG~0.00%
Published-06 Nov, 2023 | 03:50
Updated-25 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In video, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08235273; Issue ID: ALPS08250357.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6889mt6893mt8797mt8798mt6885androidmt6883MT6883, MT6885, MT6889, MT6893, MT8797, MT8798
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33059
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.42%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Audio

Memory corruption in Audio while processing the VOC packet data from ADSP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwaresnapdragon_x20_lte_modemsd865_5gqca6595snapdragon_xr1_platformqca8081_firmwaresnapdragon_653_mobile_platformsm7250-absnapdragon_x50_5g_modem-rf_systemwcd9340_firmwareapq8056wcd9395_firmwaresdm845qcc710_firmwareqca6426wcn3610sa4150psm7325-ae_firmwareqca8337qca6426_firmwarewcd9395qca6574au_firmwarewcn785x-5qca6564_firmwareqam8295pwcd9341sd626_firmwaresnapdragon_x12_lte_modemwsa8810_firmwaresd730_firmwarewsa8845h_firmwareapq8052sdm670sm8150-acsm6375_firmwaresd835_firmwaresm7150-acvideo_collaboration_vc1_platform_firmwaresa4155psd821sm6375msm8108sm7250-aa_firmwareqsm8250_firmwarevideo_collaboration_vc1_platformwcd9385_firmwareqca6421qca6310snapdragon_630_mobile_platformqcs603_firmwarewcd9360apq8053-aa_firmwaresd821_firmwaresa6155psm7150-ac_firmwareqca6564au_firmwaresd820qam8650pvideo_collaboration_vc5_platform_firmwareapq8052_firmwaresm7325_firmwaresa6155p_firmwaremdm9640_firmwaresdm429_firmwareqca6390_firmwaresd835snapdragon_632_mobile_platform_firmwaresdm429qca6436_firmwaresnapdragon_wear_4100\+_platform_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwaresm8250-ac_firmwareqca6420qca6174_firmwarewcn3910apq8064au_firmwarecsrb31024qca9367snapdragon_wear_3100_platform_firmwaresnapdragon_845_mobile_platformmdm9250_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asm7325-aewcn3620_firmwareqca6174aqca6584_firmwarewcd9340qcs8250_firmwareqcm2290snapdragon_630_mobile_platform_firmwaresm6150-acsm6225sm8150-ac_firmwaresm8550p_firmwarewcn3998_firmwareqcm8550snapdragon_x20_lte_modem_firmwarewcn3988apq8076qca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemsdm710_firmwareqcs410qcm2290_firmwaresa8155pwsa8830sm8550psa6145papq8056_firmwaresa8255p_firmwarewcn785x-1_firmwaremsm8996auqrb5165m_firmwarewcn3620snapdragon_208_processor_firmwaresnapdragon_x5_lte_modemapq8064auqm215_firmwarewcn3950_firmwaresnapdragon_632_mobile_platformqrb5165nsm7325p_firmwarewcd9360_firmwaresmart_audio_400_platforms820a_firmwarevideo_collaboration_vc3_platform_firmwaresd670_firmwaresm7150-aaqcn6224_firmwareqca6431sd660_firmwareqca4020_firmwareqca9379_firmwaresm6350sxr2130_firmwarear8035_firmwareapq8009_firmwaresnapdragon_653_mobile_platform_firmwareqrb5165msnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320qca4024_firmwaresd888_firmwaresnapdragon_662_mobile_platform_firmwareqcs6125_firmwareqcn9074wsa8815_firmwaresm8250-abqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresm7325sm8350-ac_firmwaresm7250p_firmwarewcn3680_firmwarewcn785x-5_firmwarewcn3950sm4250-aaqca6797aq_firmwaresm4350_firmwaresm7350-ab_firmwaresnapdragon_617_processorwcn3991sa8295p_firmwaresd_675_firmwaresa4155p_firmwaresm7250pcsrb31024_firmwaresa8155sm7150-aa_firmwaresnapdragon_845_mobile_platform_firmwaresd888wcn685x-5qca6310_firmwaresd626qcs7230sm8250-acs820awcd9371snapdragon_xr2_5g_platform_firmwaresm7350-abqrb5165_firmwaresm8350_firmwarevideo_collaboration_vc3_platformsnapdragon_212_mobile_platformqca6431_firmwaresm7225_firmwaresm6125qca6698aq_firmwareqcs22908998_firmwareqcs2290_firmwarewcn3615qca9367_firmwarewcn3680sa8255pqcs7230_firmwarewcd9390_firmwarewcn6750qca6430wcn6750_firmwaremdm9650snapdragon_auto_5g_modem-rfsnapdragon_208_processorsm7250-ab_firmware9206_lte_modem_firmwaremsm8108_firmwarecsra6640_firmwaresm4350qam8650p_firmwarewcn3998video_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresd855_firmwarewcd9335_firmwaremdm9640qca6436qrb5165n_firmwaresnapdragon_1200_wearable_platformsnapdragon_x24_lte_modem_firmwarewcn3980_firmwareqca6391_firmwarewsa8835wsa8840_firmwaresm4250-aa_firmwaremsm8905_firmwareqcs4290_firmwarecsra6620qca8081sd660mdm9628sm4375sdm670_firmwareqam8775pqca9377wsa8815qcm4325_firmwaresm7125_firmwareqcm4290_firmwaresnapdragon_425_mobile_platform_firmwareqrb5165smart_audio_400_platform_firmwaresg4150p_firmwarecsra6620_firmwaresnapdragon_820_mobile_platform_firmwareqcs8550qam8775p_firmwaresd865_5g_firmwarewcd9375apq8076_firmwaresnapdragon_wear_2100_platformsa8145psd_675sm4350-ac_firmwareapq8053-aasm7250-ac_firmwarewcn685x-1_firmwarewcn3680b_firmwareqcm8550_firmwareapq8017qcs410_firmwaresa6150p_firmwaresw5100pmsm8905sxr1120qcs610_firmwarewcd9335wcd9370qca6696wcd9341_firmware8998qca6390wcn6740_firmwaresnapdragon_650_mobile_platformsnapdragon_auto_4g_modemsm8150_firmwareqca6574auwcd9390csra6640msm8209_firmwarewcn3660b_firmwaresd730sdx20msm8350snapdragon_210_processor_firmwareqcm6125_firmwarec-v2x_9150snapdragon_wear_3100_platformqcc710snapdragon_625_mobile_platform_firmwaresxr1120_firmwaresnapdragon_x5_lte_modem_firmware315_5g_iot_modem_firmwaresdm439_firmwaresda845snapdragon_wear_2100_platform_firmwareqfw7114315_5g_iot_modemsnapdragon_x55_5g_modem-rf_systemqam8255p_firmwaresnapdragon_821_mobile_platform_firmwaresa8155_firmwaresm7150-abqca6335mdm9250snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qca6421_firmwareqcm6125mdm9230sm7125wsa8810qsm8250snapdragon_8\+_gen_2_mobile_platformsm8350-acqca6595ausm7315_firmwarewcd9326_firmwarewsa8840mdm9230_firmwareqcs8550_firmwareqfw7124_firmwareqcn9012mdm9650_firmwaresnapdragon_821_mobile_platformwcd9371_firmwarewcn3910_firmwareapq8009snapdragon_212_mobile_platform_firmwarewcd9370_firmwaresa8195pqca6335_firmwareqcm64908953pro_firmwaresnapdragon_wear_2500_platformqca9379sd675_firmwareqca6430_firmwareqcn9011qcs605wsa8845hsa6150psm7250-aawcd9326sa8155p_firmwareqca6564asnapdragon_675_mobile_platformsnapdragon_617_processor_firmwaresnapdragon_662_mobile_platformqcn9074_firmwarear8035qca6564sa6155qcm4325qcn6224qca6698aqsm6250sm7250-acsd670wcn685x-1sa8145p_firmwarewcn3680bsnapdragon_820_mobile_platformsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_636_mobile_platform_firmwarewcn3990qcs6490qcs8250ar8031_firmwaresnapdragon_652_mobile_platform_firmwarewsa8830_firmwarewsa8845_firmwaremdm9330_firmwaresnapdragon_auto_4g_modem_firmwareqcs603snapdragon_675_mobile_platform_firmwaremdm9630sm8250-ab_firmwaresa4150p_firmwaremsm8608_firmwaremsm8209qca6564ausm6225_firmwaresm7325-af_firmwaresa8195p_firmwareapq8053-ac_firmwareqcm4290sm6125_firmwaremsm8608ar8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_1200_wearable_platform_firmware8953prosm4125snapdragon_xr2_5g_platformqcs6125sda845_firmwareapq5053-aa_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwareapq5053-aasdm710sm6250_firmwareqca6584auqca6320_firmwareqcn6274_firmwareqcn9011_firmwaresw5100_firmwarewcn6740snapdragon_425_mobile_platformsm6225-ad_firmwareqfw7114_firmwareqcs605_firmwareqca4024qca6595_firmwaresm8250_firmwaremdm9630_firmwaresm7225apq8017_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresm6225-adsm4350-acsdm660_firmwaresw5100aqt1000c-v2x_9150_firmwaresm8150wcn3991_firmwareqam8295p_firmwaresd855sdm660wcd9330_firmwareqca6174wcn3990_firmwaresm7315qca6564a_firmwaresdx20m_firmwarewcd9385msm8909w_firmwarewcd9330wcn3610_firmwareqcs4290sd820_firmwaresg8275psdx55_firmwarewcn3615_firmwaresnapdragon_210_processorsxr2130snapdragon_wear_2500_platform_firmware8098_firmwaresnapdragon_636_mobile_platformsm7150-ab_firmwareqca4020snapdragon_xr2\+_gen_1_platformqca6174a_firmwaresm7325paqt1000_firmwaresm6150-ac_firmwaresdm429wqca6584au_firmwareqcn6274qfw7124qca6595au_firmwaresw5100p_firmwaresm8250qca6696_firmwareapq8053-acwcd9380_firmwareqca6574_firmwaresg4150pqca6797aqmdm9628_firmwaresm4375_firmware9206_lte_modemqca6574a_firmwaresdx55sdm439sdm845_firmwaresm6350_firmwaresd675wcd9375_firmwareqca6391wcn785x-1qcn9012_firmwareqca6584snapdragon_8_gen_2_mobile_platform_firmwaresa8295p8098snapdragon_xr1_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_625_mobile_platformqm215snapdragon_652_mobile_platformsnapdragon_650_mobile_platform_firmwarewcn685x-5_firmwarewcn3988_firmwaresnapdragon_wear_4100\+_platformwsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980mdm9330msm8909wqcs610Snapdragon
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33113
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.11% / 30.06%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Kernel

Memory corruption when resource manager sends the host kernel a reply message with multiple fragments.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwareqcs410_firmwaresa6150p_firmwaresw5100pwsa8832wsa8845_firmwareqca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwaressg2125p_firmwarear8035_firmwareqca6696wsa8830_firmwareqrb5165msnapdragon_888_5g_mobile_platformwcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcd9395_firmwareqcn6024sd888_firmwarewcn6740_firmwarefastconnect_6700qca6564ausa4150pwsa8815_firmwarewsa8832_firmwaresa8195p_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwareqca8337qdu1110wcd9395snapdragon_680_4g_mobile_platformsg8275p_firmwareqca9377_firmwareqcm6490_firmwareqca6574au_firmwareqam8295pwcd9341qcm4490_firmwareqca6574auqru1032snapdragon_x12_lte_modemflight_rb5_5g_platformwcd9390wcn3950wsa8810_firmwarewsa8845h_firmwarecsra6640snapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computeqca6554asnapdragon_780g_5g_mobile_platformsa8295p_firmwareqcn6024_firmwaresa4155p_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_778g\+_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwareqca6584ausd888ssg2115pqcn9011_firmwareqru1062_firmwaresnapdragon_4_gen_2_mobile_platformsw5100_firmwarewcn6740snapdragon_480\+_5g_mobile_platform_firmwareqru1062snapdragon_695_5g_mobile_platform_firmwareqca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900snapdragon_685_4g_mobile_platform_firmwarevideo_collaboration_vc1_platformqru1032_firmwaresnapdragon_782g_mobile_platform_firmwarewcd9385_firmwarefastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psxr2230psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_4_gen_1_mobile_platformsa8150psnapdragon_ar2_gen_1_platform_firmwareqcs4490snapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155psnapdragon_auto_5g_modem-rf_firmwareqca6564au_firmwaresxr1230pwsa8810qam8650pqdu1000_firmwarevideo_collaboration_vc5_platform_firmwaresnapdragon_8\+_gen_2_mobile_platformwcn3950_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsm7315_firmwareqdu1010sa6155p_firmwarewsa8840qam8295p_firmwareqcs8550_firmwareqdu1210_firmwaresm7315qca6698aq_firmwarewcd9385qcn9012snapdragon_8\+_gen_1_mobile_platformmdm9650_firmwareqcs4490_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresa8255pqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresg8275pwcd9370_firmwaremdm9650qdx1011_firmwaresnapdragon_auto_5g_modem-rfqdu1110_firmwareqdu1000qca6554a_firmwaressg2125pqca6574aqru1052qcm4490qca6174asa8195pcsra6640_firmwareqcs8250_firmwareqdu1210snapdragon_820_automotive_platform_firmwareqca6174a_firmwareqcm6490sm7325pqam8650p_firmwarevideo_collaboration_vc5_platformsm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024qca6584au_firmwarewcd9335_firmwareqrb5165n_firmwareqca6574snapdragon_480_5g_mobile_platform_firmwarewcn3980_firmwarewsa8835qca6595au_firmwareqca6391_firmwaresxr2230p_firmwarewsa8840_firmwareqdu1010_firmwaresw5100p_firmwareqcn9011snapdragon_ar2_gen_1_platformsnapdragon_782g_mobile_platformqca6696_firmwareqcn9024_firmwarewsa8845hwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwarecsra6620qca8081wsa8815sa8155psd_8_gen1_5gwsa8830qam8775pqca6797aqqca9377sm8550psa6145psnapdragon_8\+_gen_1_mobile_platform_firmwareqcm4325_firmwaresa8255p_firmwareflight_rb5_5g_platform_firmwarear8035qca6574a_firmwaresnapdragon_480\+_5g_mobile_platformqrb5165m_firmwareqcm4325sd_8_gen1_5g_firmwarerobotics_rb5_platformwcd9375_firmwareqca6391qcn9012_firmwaresmart_audio_400_platform_firmwareqca6698aqsnapdragon_778g_5g_mobile_platform_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwareqrb5165ncsra6620_firmwaresa8295psnapdragon_8_gen_1_mobile_platformrobotics_rb5_platform_firmwareqcs8550snapdragon_8_gen_2_mobile_platform_firmwarefastconnect_6200fastconnect_7800sa8145p_firmwaresm7325p_firmwareqam8775p_firmwaresnapdragon_888\+_5g_mobile_platformqdx1011wcd9375sa8150p_firmwaresmart_audio_400_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaressg2115p_firmwaresnapdragon_680_4g_mobile_platform_firmwareqcs6490qcs8250snapdragon_820_automotive_platformwcn3980fastconnect_6200_firmwareqdx1010qcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33030
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.91%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-03 Jun, 2025 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input in HLOS

Memory corruption in HLOS while running playready use-case.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaremdm9640_firmwaresm6250p_firmwareqca8337qam8775psnapdragon_888_5g_mobile_platformwcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155snapdragon_427_mobile_platformsnapdragon_480_5g_mobile_platformsd_455_firmwarehome_hub_100_platformsnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwaremsm8108wcd9371_firmwaremsm8108_firmwarewcn3950qcn6024_firmwaresm4125qsw8573_firmwarewcn3660bqsm8350_firmwaresnapdragon_460_mobile_platformqsm8350sd460_firmwaresnapdragon_660_mobile_platform_firmwaresm7315_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_636_mobile_platformqca8081_firmwareqca6420snapdragon_auto_5g_modem-rf_firmwareqca9367_firmwaremdm8207sa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqca6430snapdragon_630_mobile_platformsnapdragon_678_mobile_platform_firmwareqts110wcd9306_firmwarewcd9340snapdragon_8cx_compute_platformvision_intelligence_200_platform_firmwaresnapdragon_765_5g_mobile_platform_firmwareqca6698aq_firmwaremsm8209_firmwaresnapdragon_690_5g_mobile_platformmdm9250_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_wear_2500_platformqca6696_firmwarewcd9371sd_8cxsa8150psnapdragon_430_mobile_platformqca4004sd660sd865_5g_firmwaresd660_firmwareqcn5121snapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn5022_firmwareqcn7606_firmwaresnapdragon_7c_gen_2_compute_platform_firmwaresnapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwaressg2125psdm429w9205_lte_modemsnapdragon_670_mobile_platform_firmwaresd670_firmwareqca6574csr8811_firmwaresnapdragon_7c\+_gen_3_computewcd9380qcs410snapdragon_210_processorsnapdragon_430_mobile_platform_firmwareqca9379_firmwaresxr1230pc-v2x_9150_firmwareqcn9012_firmwaresd626ipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815snapdragon_865\+_5g_mobile_platformqca6584_firmwaresnapdragon_630_mobile_platform_firmwareqcs8250ipq6028sd835snapdragon_821_mobile_platformwcn3980_firmwaresd730sa8295p9205_lte_modem_firmwarewcn6740_firmwaresnapdragon_8cx_compute_platform_firmwareqcs4490_firmwaresnapdragon_x65_5g_modem-rf_systemapq8064au_firmwarefastconnect_6900qca6234fastconnect_6900_firmwaresnapdragon_660_mobile_platformsd670smart_audio_200_platform_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqualcomm_215_mobile_platform_firmwarear8031mdm8207_firmwaresnapdragon_750g_5g_mobile_platformsd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640snapdragon_695_5g_mobile_platformssg2115p_firmwaresnapdragon_1200_wearable_platformwcn3660qca9379qam8255psa4155pqca6234_firmwareqsm8250_firmwareqcn7606snapdragon_480\+_5g_mobile_platformwsa8830sxr2230p_firmware9207_lte_modemsnapdragon_850_mobile_compute_platformsnapdragon_x24_lte_modem_firmwareqam8650pcsrb31024mdm9628_firmwareflight_rb5_5g_platformmdm9650snapdragon_865_5g_mobile_platformflight_rb5_5g_platform_firmwareqcs4290mdm9250qca6420_firmwaresnapdragon_450_mobile_platform_firmwaresnapdragon_auto_4g_modem_firmwaresd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377wcd9385_firmwarewcd9326_firmwarefastconnect_6200wcn3615_firmwaresnapdragon_7c_gen_2_compute_platformqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6584snapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwaresnapdragon_208_processor_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nwcd9306qca6584ausnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_208_processorsnapdragon_439_mobile_platformqcn50529206_lte_modemqca9367snapdragon_wear_3100_platformwcn3988_firmware315_5g_iot_modemqcn9074qca6421fastconnect_6700_firmwaresa8195psxr1120snapdragon_626_mobile_platform_firmwarewcd9326wcd9335qcm4490qcn6023snapdragon_888\+_5g_mobile_platformqcs4290_firmwaresxr2130_firmwareqcs6490_firmwarewcd9375aqt1000snapdragon_210_processor_firmwaresc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformwsa8815_firmwaresnapdragon_636_mobile_platform_firmwareapq8017sxr1120_firmwareqcm6125_firmwaresnapdragon_x5_lte_modemsnapdragon_855\+\/860_mobile_platform_firmwarerobotics_rb5_platform_firmwaresnapdragon_1100_wearable_platformsd865_5gqca6595qualcomm_205_mobile_platformsxr1230p_firmwaresa8540p_firmwareqca8075_firmwaresxr2130snapdragon_wear_4100\+_platformsmart_audio_400_platformipq6005_firmwareqca6310_firmwaresa9000pqca6574_firmwaresm7325p_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwareqca6574a_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformqrb5165msm7315snapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwaresnapdragon_7c_compute_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_auto_4g_modemsnapdragon_632_mobile_platform_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwareipq6028_firmwareqcn5122qcs8250_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_712_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwareqcn5022snapdragon_8c_compute_platform_firmwareqca6564_firmwarewcn6740snapdragon_732g_mobile_platformqcs8550snapdragon_x50_5g_modem-rf_systemqca8075qcn6024qcn9022ipq6000_firmwareqcs410_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_wear_1300_platformsnapdragon_7c_compute_platformqts110_firmwareqam8255p_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwareqcs610315_5g_iot_modem_firmwareqca6431_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwarewcd9360_firmwarevision_intelligence_100_platform_firmwareqca4024_firmwaresnapdragon_wear_2100_platform_firmwaresnapdragon_212_mobile_platformsa8150p_firmwareqcs2290snapdragon_x70_modem-rf_systemqca6335csra6620_firmwaresd_675_firmwarecsra6640_firmwareqam8295pmdm9628sd_8_gen1_5g_firmwareqca6574au_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresa6155_firmwarewcd9375_firmwaremsm8909wwcd9360snapdragon_xr2\+_gen_1_platformsnapdragon_782g_mobile_platform_firmwaresnapdragon_427_mobile_platform_firmwaresmart_audio_400_platform_firmwarewcn3999qrb5165m_firmwareqca6698aqqcs6125sa4155p_firmwareipq6010sd662_firmwaresnapdragon_765g_5g_mobile_platformrobotics_rb3_platformsnapdragon_8\+_gen_1_mobile_platformsnapdragon_720g_mobile_platformsd626_firmwaresnapdragon_820_mobile_platformsnapdragon_780g_5g_mobile_platformhome_hub_100_platform_firmwarefsm10056_firmwareqca6436sw5100sa6155pwcn3660_firmwarewcd9341qam8775p_firmwaresa8255ppm8937_firmwareqca6431snapdragon_x12_lte_modemqca6797aqwcn3910_firmwaresnapdragon_855_mobile_platform_firmwarerobotics_rb5_platformwsa8830_firmwaresd855_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresa8295p_firmwarewcn3610msm8608mdm9640qca8337_firmwarewcd9380_firmwaresw5100pmsm8996au_firmwaresnapdragon_8cx_gen_2_5g_compute_platformwcd9330snapdragon_w5\+_gen_1_wearable_platformqca6564auqualcomm_215_mobile_platformqet4101_firmwaresnapdragon_782g_mobile_platformsnapdragon_wear_4100\+_platform_firmwarefastconnect_6700qca8072_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwareqsw8573wcn3910qca6320mdm9650_firmwaresnapdragon_4_gen_1_mobile_platformqca6426_firmwaresm4450snapdragon_435_mobile_platformwcn3660b_firmwareqca9984snapdragon_670_mobile_platformwcn3680qcn9024snapdragon_xr2\+_gen_1_platform_firmwarewcd9330_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_820_automotive_platformqca6421_firmwaresmart_audio_200_platformsd821_firmwarevision_intelligence_100_platformsnapdragon_xr2_5g_platformar8031_firmwarewcn3680_firmware9206_lte_modem_firmwareqca6797aq_firmwareqca6564a_firmwaresnapdragon_x24_lte_modemqcn5121_firmwarewsa8832sa8540psnapdragon_8cx_gen_3_compute_platformqsm8250smart_display_200_platform_firmwareipq6018snapdragon_730_mobile_platform9207_lte_modem_firmwareqcs4490qca6595_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwaresnapdragon_710_mobile_platform_firmwaresd888_firmwaresa8155psd675qet4101qcs8155_firmwaresnapdragon_720g_mobile_platform_firmwarear8035_firmwareqcm2290snapdragon_632_mobile_platformsnapdragon_625_mobile_platform_firmwaresnapdragon_855_mobile_platformsnapdragon_wear_2100_platformsnapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwareqcs2290_firmwarefsm10056csra6620qcn9072smart_display_200_platformsnapdragon_888_5g_mobile_platform_firmwaresnapdragon_450_mobile_platformipq6000sd730_firmwarewcd9370ssg2115pqcn5152_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6584au_firmwareqcn9000_firmwaresd_8cx_firmwaresnapdragon_1200_wearable_platform_firmwaresd662qam8295p_firmwareapq8037snapdragon_435_mobile_platform_firmwarevision_intelligence_200_platformsa9000p_firmwareqca6320_firmwarewcn3680b_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_212_mobile_platform_firmwareqca6595auwcn3999_firmwaresnapdragon_425_mobile_platformsnapdragon_429_mobile_platformqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310snapdragon_821_mobile_platform_firmwareqcs8155pm8937snapdragon_x70_modem-rf_system_firmwareqcs6490snapdragon_x5_lte_modem_firmwaresnapdragon_625_mobile_platformqcs8550_firmwaresd821vision_intelligence_300_platform_firmwaresa6145p_firmwaresm6250c-v2x_9150apq8017_firmwarewsa8810_firmwarevision_intelligence_400_platformsnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresg4150pqca8081qca6174a_firmwaresnapdragon_wear_1300_platform_firmwarewcd9385snapdragon_x12_lte_modem_firmwaresnapdragon_665_mobile_platform_firmwarear8035csr8811apq8064auvision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewcn3620_firmwaresd820qcm6490wsa8835_firmwarewcn3620qca6564asa4150psg4150p_firmwareqcm4325qca8072qcm2290_firmwaresnapdragon_626_mobile_platformsnapdragon_845_mobile_platformwcn3990qcn9000sd_675fastconnect_6800snapdragon_835_mobile_pc_platformqcn9012snapdragon_8c_compute_platformsd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresnapdragon_auto_5g_modem-rfsd_8_gen1_5gsm6250psnapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaressg2125p_firmwaresnapdragon_425_mobile_platform_firmwareqca6574aqca6174asm7325psd855sm4125_firmwaresdx57m_firmwaresnapdragon_439_mobile_platform_firmwarefastconnect_6200_firmwareqcn5021qcn5152msm8209vision_intelligence_300_platformsd460qca6391snapdragon_710_mobile_platformfastconnect_7800aqt1000_firmwareipq6005qcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290qcn9011sd_455qca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_ar2_gen_1_platformwcn3680bsd835_firmwareqam8650p_firmwaresnapdragon_675_mobile_platformipq6010_firmwaresnapdragon_wear_2500_platform_firmwareqca6696msm8608_firmwaresa6150psnapdragon_1100_wearable_platform_firmwareqcn9022_firmwaresnapdragon_768g_5g_mobile_platformapq8037_firmwaresnapdragon_765_5g_mobile_platformqcn9072_firmwaresnapdragon_820_mobile_platform_firmwaresm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_wear_3100_platform_firmwaresw5100_firmwareqcn9074_firmwaresnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33067
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.41%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Audio

Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwareqcs610_firmwarewcd9335sxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwaresnapdragon_888_5g_mobile_platformwcd9341_firmwareqca6320sd888_firmwareqcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwaresnapdragon_1200_wearable_platform_firmwareqca9377_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsa9000p_firmwaresrv1hsnapdragon_835_mobile_pc_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770psnapdragon_780g_5g_mobile_platform_firmwarec-v2x_9150qca6584auqca6320_firmwareqcn6274_firmwaresd888qcc710wcn6740qca6310_firmwarefastconnect_6800qfw7114_firmwaresnapdragon_x5_lte_modem_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_782g_mobile_platform_firmwarewcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150psnapdragon_778g_5g_mobile_platformmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810qam8650psnapdragon_865\+_5g_mobile_platformsa9000psrv1h_firmwarevideo_collaboration_vc3_platformaqt1000sm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwaresa6155p_firmwarewcd9326_firmwareqam8295p_firmwaresrv1m_firmwaresd855sd835wcd9330_firmwarewcn3990_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmwaresnapdragon_wear_4100\+_platform_firmwarewcd9385mdm9650_firmwareqca9367_firmwarewcd9330snapdragon_7c\+_gen_3_compute_firmwarewcn3610_firmwaresa8255psnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaremdm9650qca9367snapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asxr2130wcn3620_firmware9206_lte_modem_firmwaresa8195pwcd9340qamsrv1msnapdragon_820_automotive_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm7325pqam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwaresdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_1200_wearable_platformsnapdragon_x75_5g_modem-rf_systemqca6391_firmwarewcd9335_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformsa8775p_firmwaresnapdragon_782g_mobile_platformqamsrv1hqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pwcd9326qcs410sa8155p_firmwareqca8081qca6564awsa8815mdm9628sa8155pwcn3980_firmwareqam8775pqca9377mdm9628_firmwarewsa8830sa6145pqcn9074_firmwaresa8255p_firmware9206_lte_modemsmart_audio_200_platform_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaremsm8996ausa8650p_firmwarewcn3620wcd9375_firmwareqca6391qcn6224snapdragon_x5_lte_modemsnapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295psmart_audio_200_platformfastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwaresm7325p_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformwcd9375sa8150p_firmwaresnapdragon_855\+\/860_mobile_platformfastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformsnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragonqam8255p_firmwareqca9377_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresa8145p_firmwaremsm8996au_firmwaremdm9628_firmwaresnapdragon_820_automotive_platform_firmwareqcn6224_firmwaresdm429w_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6584au_firmwarewcn3990_firmwarec-v2x_9150_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcd9326_firmwareqamsrv1h_firmwaresnapdragon_1200_wearable_platform_firmwarewcd9340_firmwaresm7325p_firmwareqam8295p_firmwaremdm9650_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn3680b_firmwarewcd9375_firmwareqca8081_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwarewcd9330_firmwareqca6436_firmwareaqt1000_firmwareqca6564au_firmwarewcn6740_firmwaresa6155p_firmwareqca9367_firmwareqcn6274_firmwaresa8775p_firmwaresnapdragon_x5_lte_modem_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmware9206_lte_modem_firmwaresa6145p_firmwaresa8155p_firmwaresmart_audio_200_platform_firmwarefastconnect_6700_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwareqcs610_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresd888_firmwareqcc710_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2023-28538
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.03% / 6.81%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WIN Product

Memory corruption in WIN Product while invoking WinAcpi update driver in the UEFI region.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_850_mobile_compute_platform_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca6431_firmwarewcn3950_firmwaresc8180x\+sdx55sa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwarewcd9371_firmwaresd_8cx_gen2_firmwaresm4125sd720gwcn3950sd_8_gen1_5g_firmwaresd710_firmwaresd460_firmwarequalcomm_robotics_rb3_platform_firmwareqca6574au_firmwarewcd9375_firmwaresa6155_firmwareqca6420snapdragon_xr2\+_gen_1_platformsd680_firmwaresd_8cx_gen2qrb5165m_firmwaresa4155p_firmwareqcs6125sa8155_firmwaresd662_firmwareqca6430wcd9340sd765gsw5100fsm10056_firmwareqca6436sd680sa6155pwcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarewcn3910_firmwaresd_8cxsa8150pwsa8830_firmwaresd855_firmwaresd865_5g_firmwaresnapdragon_4_gen_1sd712wcn3988sa8195p_firmwarefastconnect_6800_firmwareqcn7606_firmwarewcd9380_firmwaressg2125psw5100psnapdragon_w5\+_gen_1_wearable_platformqca6564ausd670_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresxr1230pqca6430_firmwareqcn9012_firmwarewcd9335_firmwarewcn3980qca6335_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815sd7cwcn3910qca6426_firmwaresd695wcn3980_firmwaresd730snapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwaresmart_audio_200_platformsnapdragon_xr2_5g_platformsd678_firmwarefastconnect_6900fastconnect_6900_firmwaresd670smart_audio_200_platform_firmwareqca6564a_firmwarequalcomm_robotics_rb5_platform_firmwareqcm4290_firmwaresd480sd870wsa8832sw5100p_firmwareqcs610_firmwareqsm8250sa6145psd695_firmwareqca6595_firmwaresa8145pqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresdx55sa8155pcsra6640sd675ssg2115p_firmwareqcs8155_firmwaresa4155pqcm2290qsm8250_firmwareqcn7606wsa8830sd678sa8145p_firmwaresxr2230p_firmwaresnapdragon_850_mobile_compute_platformqcs2290_firmwarefsm10056sd7c_firmwaresnapdragon_4_gen_1_firmwareflight_rb5_5g_platformcsra6620flight_rb5_5g_platform_firmwareqcs4290sd765g_firmwareqca6420_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwaressg2115pqca6564qca6426wcn3990_firmwareqrb5165n_firmwarequalcomm_robotics_rb3_platformsd_8cx_firmwarewcd9385_firmwarewcd9326_firmwarefastconnect_6200sd662qcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemsdx55_firmwareqca6595ausm7250p_firmwareqca6436_firmwareqrb5165nsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310qcs8155vision_intelligence_300_platform_firmwarewcn3988_firmwaresa6145p_firmwareqca6421sd712_firmwaresm6250sa8195psxr1120wsa8810_firmwarevision_intelligence_400_platformsd765_firmwaresnapdragon_ar2_gen_1_platform_firmwarewcd9326sg4150pwcd9335qca6174a_firmwareqcs4290_firmwarewcd9385sxr2130_firmwarewcd9375sd750g_firmwareaqt1000sc8180x\+sdx55_firmwaresm6250_firmwarevision_intelligence_400_platform_firmwarewsa8815_firmwarewsa8835_firmwaresxr1120_firmwareqca6564asa4150psg4150p_firmwareqcm6125_firmwareqcm4325qcm2290_firmwarewcn3990sd_675sd865_5gfastconnect_6800qca6595qcn9012wsa8835sxr1230p_firmwaresd665_firmwaresd_8_gen1_5gsm6250pssg2125p_firmwaresxr2130qca6574aqca6174aqca6310_firmwareqca6574_firmwaresd855sm4125_firmwaresd665sxr2230psnapdragon_xr2_5g_platform_firmwaresd765qca6574a_firmwarefastconnect_6200_firmwaresd768g_firmwareqrb5165mvision_intelligence_300_platformsnapdragon_x55_5g_modem-rf_system_firmwaresd460qca6391fastconnect_7800aqt1000_firmwareqcm4290wsa8832_firmwaresnapdragon_xr1_platformsd480_firmwareqcn9011qca6574ausa8155p_firmwaresd710wcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_ar2_gen_1_platformqca6564_firmwaresd768gqca6696sd845_firmwaresa6150psnapdragon_x50_5g_modem-rf_systemsd845qualcomm_robotics_rb5_platformsm7250psd720g_firmwaresw5100_firmwareqcs410_firmwaresnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-38166
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.31%
||
7 Day CHG~0.00%
Published-07 Aug, 2021 | 17:50
Updated-04 Aug, 2024 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2023-33076
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 7.19%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Configuration Issue in Core

Memory corruption in Core when updating rollback version for TA and OTA feature is enabled.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwareqca9377_firmwaresnapdragon_8_gen_1_mobile_platformsnapdragon_850_mobile_compute_platform_firmwareqca8337qfw7124sg8275p_firmwareqca6431_firmwareqam8775psnapdragon_870_5g_mobile_platform_firmwareqamsrv1mqru1052snapdragon_888_5g_mobile_platformwsa8840wcn3950_firmwaresa8150p_firmwareqca6595au_firmwaresa6155snapdragon_x70_modem-rf_systemqca6335sd_675_firmwareqep8111_firmwareqam8295pwcn3950qcn6024_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwareqsm8350qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwareqca6420wsa8840_firmwareqca6698aqsa8155_firmwarerobotics_rb3_platform_firmwaresc8380xp_firmwaresnapdragon_765g_5g_mobile_platformqca6430qru1062_firmwarerobotics_rb3_platformsnapdragon_678_mobile_platform_firmwaresnapdragon_8\+_gen_1_mobile_platformwcd9340snapdragon_8cx_compute_platformqca6436sa6155pqdu1000_firmwaresnapdragon_765_5g_mobile_platform_firmwareqca6698aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewcd9341qam8775p_firmwaresa8255pqca6431qca6696_firmwareqca6797aqqru1052_firmwaresd_8cxsnapdragon_855_mobile_platform_firmwaresa8150pqcc710_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988snapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresa8295p_firmwaresa8770psnapdragon_675_mobile_platform_firmwareqca8337_firmwarewcd9380_firmwaressg2125psnapdragon_8cx_gen_2_5g_compute_platformqca6564auqcm8550snapdragon_670_mobile_platform_firmwaresd670_firmwareqca6574qdu1110_firmwarewcd9380fastconnect_6700sxr1230psg8275pqca6430_firmwarewcn3980qfw7114_firmwareqca6335_firmwarewsa8845wcd9340_firmwarewsa8815snapdragon_865\+_5g_mobile_platformqca6426_firmwaresc8380xpsnapdragon_670_mobile_platformqcn9024wcn3980_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresa8295pqca6421_firmwaresnapdragon_8cx_compute_platform_firmwareqcs4490_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_systemsa8650p_firmwarefastconnect_6900snapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwareqca6797aq_firmwareqdu1010sd670qdx1011_firmwareqca6564a_firmwareqcn9024_firmwaresdx57msnapdragon_8\+_gen_2_mobile_platformsnapdragon_x24_lte_modemwsa8832qdx1010_firmwaresa8540psnapdragon_8cx_gen_3_compute_platformqamsrv1m_firmwaresa6145pqcc710qcs4490qca6595_firmwarewcd9395snapdragon_888\+_5g_mobile_platform_firmwareqca6391_firmwarewcd9370_firmwaresm8550p_firmwareqdx1010sdx55sa8155psd675srv1mssg2115p_firmwareqfw7124_firmwareqam8255pqep8111qdu1210_firmwaresnapdragon_855_mobile_platformar8035_firmwarewsa8830sxr2230p_firmwaresnapdragon_850_mobile_compute_platformsnapdragon_x24_lte_modem_firmwareqam8650psnapdragon_865_5g_mobile_platformqcn6224_firmwaresnapdragon_888_5g_mobile_platform_firmwareqca6420_firmwarewcd9370sd675_firmwaressg2115pqca6426qca6584au_firmwareqdu1110wcn3990_firmwaresnapdragon_8_gen_2_mobile_platformqca9377qamsrv1hsd_8cx_firmwarewcd9385_firmwarewcd9326_firmwarefastconnect_6200qamsrv1h_firmwareqam8295p_firmwaresa8155sa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemsdx55_firmwaresnapdragon_4_gen_2_mobile_platformqca6595ausnapdragon_8_gen_3_mobile_platformwsa8845h_firmwareqfw7114sm7250p_firmwareqca6436_firmwareqca6564au_firmwareqca6584ausa6155p_firmwareqca6310snapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_x70_modem-rf_system_firmwaresa8775p_firmwareqcs8550_firmwarevision_intelligence_300_platform_firmwarewcn3988_firmwaresa6145p_firmwaresrv1hqca6421fastconnect_6700_firmwarewsa8810_firmwareqcn6224vision_intelligence_400_platformwsa8845hsnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresnapdragon_x75_5g_modem-rf_systemwcd9326wcd9395_firmwareqca8081snapdragon_x35_5g_modem-rf_systemsnapdragon_auto_5g_modem-rf_gen_2qcm4490snapdragon_888\+_5g_mobile_platformqca6174a_firmwaresa8770p_firmwaresxr2130_firmwarewcd9385ar8035wcd9375aqt1000wcd9390vision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewsa8815_firmwarewsa8835_firmwareqca6564asnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_845_mobile_platformwcn3990sd_675sd865_5gfastconnect_6800qca6595qru1032qdu1010_firmwaresnapdragon_8c_compute_platformqdx1011qdu1000wsa8835sxr1230p_firmwaresa8540p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresd_8_gen1_5gqcn6274snapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqca6574asxr2130qca6174aqca6310_firmwareqru1062sa8650psa9000pqca6574_firmwaresd855sxr2230psdx57m_firmwareqru1032_firmwaresnapdragon_xr2_5g_platform_firmwarewsa8845_firmwareqca6574a_firmwarefastconnect_6200_firmwaresa8775pvision_intelligence_300_platformsnapdragon_x55_5g_modem-rf_system_firmwareqca6391snapdragon_8cx_gen_3_compute_platform_firmwarefastconnect_7800aqt1000_firmwaresnapdragon_865\+_5g_mobile_platform_firmwareqcm4490_firmwaresnapdragon_845_mobile_platform_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareqcn6274_firmwarewsa8832_firmwaresrv1h_firmwareqca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810snapdragon_765g_5g_mobile_platform_firmwaresm8550psnapdragon_8_gen_1_mobile_platform_firmwaresrv1m_firmwaresnapdragon_ar2_gen_1_platformsnapdragon_8c_compute_platform_firmwareqam8650p_firmwaresnapdragon_675_mobile_platformqca6696qcs8550snapdragon_x50_5g_modem-rf_systemsnapdragon_8_gen_3_mobile_platform_firmwaresnapdragon_768g_5g_mobile_platformwcd9390_firmwareqcn6024qdu1210snapdragon_765_5g_mobile_platformsm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-16
Not Available
CVE-2021-37651
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.07%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 21:00
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in `FractionalAvgPoolGrad` in TensorFlow

TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area. We have patched the issue in GitHub commit 0f931751fb20f565c4e94aa6df58d54a003cdb30. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33033
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.91%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-21 May, 2025 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Audio

Memory corruption in Audio during playback with speaker protection.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaremdm9640_firmwaresm6250p_firmwareqca8337snapdragon_888_5g_mobile_platformwcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155snapdragon_427_mobile_platformsnapdragon_480_5g_mobile_platformsd_455_firmwarehome_hub_100_platformapq8076snapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwaremsm8108wcd9371_firmwaremsm8108_firmwarewcn3950qcn6024_firmwaresm4125wcn3660bsnapdragon_460_mobile_platformsnapdragon_660_mobile_platform_firmwaresd460_firmwaremdm9230_firmwaresm7315_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_636_mobile_platformqca8081_firmwareqca6420snapdragon_auto_5g_modem-rf_firmwareqca9367_firmwaremdm8207sa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqca6430snapdragon_630_mobile_platformsnapdragon_678_mobile_platform_firmwareqts110wcd9306_firmwarewcd9340snapdragon_8cx_compute_platformmdm9625_firmwarevision_intelligence_200_platform_firmwaresnapdragon_765_5g_mobile_platform_firmwareqca6698aq_firmwaremsm8209_firmwaresnapdragon_690_5g_mobile_platformmdm9250_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_wear_2500_platformqca6696_firmwarewcd9371sd_8cxsa8150psnapdragon_430_mobile_platformqca4004mdm9330_firmwaresd660sd865_5g_firmwaresd660_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresnapdragon_7c_gen_2_compute_platform_firmwaresnapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresdm429w9205_lte_modemsnapdragon_670_mobile_platform_firmwaresd670_firmwareqca6574snapdragon_7c\+_gen_3_computewcd9380qcs410snapdragon_210_processorsnapdragon_430_mobile_platform_firmwareqca9379_firmwarec-v2x_9150_firmwareqcn9012_firmwaresd626wcd9340_firmwarewsa8815snapdragon_865\+_5g_mobile_platformqca6584_firmwaresnapdragon_630_mobile_platform_firmwareqcs8250sd835wcn3980_firmwaresd730sa8295p9205_lte_modem_firmwarewcn6740_firmwaresnapdragon_8cx_compute_platform_firmwaremdm9225qcs4490_firmwaresnapdragon_x65_5g_modem-rf_systemapq8064au_firmwaremdm9225mfastconnect_6900fastconnect_6900_firmwaresnapdragon_660_mobile_platformsd670smart_audio_200_platform_firmwareqcn9024_firmwaresdx57mqcm4290_firmwareqcs610_firmwareapq8084_firmwaresa6145pqualcomm_215_mobile_platform_firmwarear8031mdm8207_firmwaresnapdragon_750g_5g_mobile_platformsd820_firmwareqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresdx55csra6640snapdragon_695_5g_mobile_platformsnapdragon_x20_lte_modemsnapdragon_1200_wearable_platformwcn3660qca9379sa4155pqsm8250_firmwaresnapdragon_480\+_5g_mobile_platformwsa88309207_lte_modemsnapdragon_850_mobile_compute_platformsnapdragon_x24_lte_modem_firmwarecsrb31024mdm9628_firmwareflight_rb5_5g_platformmdm9650snapdragon_865_5g_mobile_platformflight_rb5_5g_platform_firmwareqcs4290snapdragon_x20_lte_modem_firmwaremdm9250qca6420_firmwaresnapdragon_450_mobile_platform_firmwaresnapdragon_auto_4g_modem_firmwaresd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377wcd9385_firmwarewcd9326_firmwarefastconnect_6200wcn3615_firmwaresnapdragon_7c_gen_2_compute_platformqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6584snapdragon_835_mobile_pc_platform_firmwaresdx55_firmwaresnapdragon_208_processor_firmwarewcn3615sm7250p_firmwarewcn3610_firmwareqrb5165nwcd9306qca6584ausnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_208_processorsnapdragon_439_mobile_platform9206_lte_modemqca9367mdm9235m_firmwaresnapdragon_wear_3100_platformwcn3988_firmware315_5g_iot_modemqcn9074qca6421fastconnect_6700_firmwaresa8195psxr1120snapdragon_626_mobile_platform_firmwarewcd9326wcd9335qcm4490snapdragon_888\+_5g_mobile_platformqcs4290_firmwaresxr2130_firmwareqcs6490_firmwaremdm9625wcd9375aqt1000snapdragon_210_processor_firmwaresc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformwsa8815_firmwaremdm9625msnapdragon_636_mobile_platform_firmwareapq8017sxr1120_firmwaremdm9235mmdm9630_firmwareqcm6125_firmwaresnapdragon_x5_lte_modemsnapdragon_855\+\/860_mobile_platform_firmwarerobotics_rb5_platform_firmwaresnapdragon_1100_wearable_platformsd865_5gqca6595qualcomm_205_mobile_platformsxr2130snapdragon_wear_4100\+_platformsmart_audio_400_platformqca6310_firmwareqca6574_firmwaresm7325p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformqrb5165msm7315snapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_7c_compute_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_auto_4g_modemsnapdragon_632_mobile_platform_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcs8250_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_712_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_8c_compute_platform_firmwareqca6564_firmwarewcn6740snapdragon_732g_mobile_platformqcs8550snapdragon_x50_5g_modem-rf_systemqcn6024qcs410_firmwaremdm9330snapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_wear_1300_platformsnapdragon_7c_compute_platformqts110_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwareqcs610315_5g_iot_modem_firmwareqca6431_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwarewcd9360_firmwarevision_intelligence_100_platform_firmwaresnapdragon_wear_2100_platform_firmwaresnapdragon_212_mobile_platformsa8150p_firmwareqcs2290snapdragon_x70_modem-rf_systemqca6335csra6620_firmwaresd_675_firmwarecsra6640_firmwareqam8295pmdm9628qca6574au_firmwaremdm9630snapdragon_778g\+_5g_mobile_platform_firmwaresa6155_firmwarewcd9375_firmwaremsm8909wwcd9360snapdragon_xr2\+_gen_1_platformsnapdragon_782g_mobile_platform_firmwaresnapdragon_427_mobile_platform_firmwaresmart_audio_400_platform_firmwarewcn3999qrb5165m_firmwareqca6698aqqcs6125sa4155p_firmwaresd662_firmwaresnapdragon_765g_5g_mobile_platformrobotics_rb3_platformsnapdragon_8\+_gen_1_mobile_platformsnapdragon_720g_mobile_platformsd626_firmwaresnapdragon_820_mobile_platformsnapdragon_780g_5g_mobile_platformhome_hub_100_platform_firmwareqca6436sa6155pwcn3660_firmwarewcd9341pm8937_firmwareqca6431snapdragon_x12_lte_modemwcn3910_firmwaresnapdragon_855_mobile_platform_firmwarerobotics_rb5_platformwsa8830_firmwaresd855_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresa8295p_firmwarewcn3610mdm9640msm8608qca8337_firmwarewcd9380_firmwarewcd9330msm8996au_firmwaresnapdragon_8cx_gen_2_5g_compute_platformmdm9225m_firmwareqca6564auqualcomm_215_mobile_platformsnapdragon_782g_mobile_platformsnapdragon_wear_4100\+_platform_firmwarefastconnect_6700mdm9230qca6174qca6430_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwaremdm9225_firmwareqca6320wcn3910mdm9650_firmwaresnapdragon_4_gen_1_mobile_platformqca6426_firmwaresm4450snapdragon_435_mobile_platformwcn3660b_firmwareqca9984snapdragon_670_mobile_platformwcn3680qcn9024snapdragon_xr2\+_gen_1_platform_firmwarewcd9330_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_820_automotive_platformqca6421_firmwaresmart_audio_200_platformvision_intelligence_100_platformsnapdragon_xr2_5g_platformar8031_firmwarewcn3680_firmware9206_lte_modem_firmwareqca6564a_firmwaresnapdragon_x24_lte_modemwsa8832qsm8250smart_display_200_platform_firmwaresnapdragon_730_mobile_platform9207_lte_modem_firmwareqcs4490qca6595_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwaresnapdragon_710_mobile_platform_firmwaresd888_firmwaresa8155psd675snapdragon_720g_mobile_platform_firmwarear8035_firmwareqcm2290snapdragon_632_mobile_platformsnapdragon_625_mobile_platform_firmwaresnapdragon_855_mobile_platformsnapdragon_wear_2100_platformsnapdragon_662_mobile_platform_firmwaresa8145p_firmwareqcs2290_firmwarecsra6620smart_display_200_platformsnapdragon_888_5g_mobile_platform_firmwaresnapdragon_450_mobile_platformqca6174_firmwaresd730_firmwarewcd9370snapdragon_480\+_5g_mobile_platform_firmwareqca6584au_firmwareapq8076_firmwaresd_8cx_firmwaresnapdragon_1200_wearable_platform_firmwaresd662qam8295p_firmwareapq8037snapdragon_435_mobile_platform_firmwarevision_intelligence_200_platformqca6320_firmwarewcn3680b_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_212_mobile_platform_firmwareqca6595auwcn3999_firmwaresnapdragon_425_mobile_platformsnapdragon_429_mobile_platformqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310pm8937snapdragon_x70_modem-rf_system_firmwareqcs6490snapdragon_x5_lte_modem_firmwareapq8084qcs8550_firmwaresnapdragon_625_mobile_platformvision_intelligence_300_platform_firmwaresa6145p_firmwaresm6250c-v2x_9150apq8017_firmwarewsa8810_firmwarevision_intelligence_400_platformsg4150pqca8081qca6174a_firmwaresnapdragon_wear_1300_platform_firmwarewcd9385snapdragon_x12_lte_modem_firmwaresnapdragon_665_mobile_platform_firmwarear8035apq8064auvision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewcn3620_firmwaresd820qcm6490wsa8835_firmwarewcn3620qca6564asa4150psg4150p_firmwareqcm2290_firmwaresnapdragon_626_mobile_platformsnapdragon_845_mobile_platformmdm9635m_firmwarewcn3990sd_675fastconnect_6800mdm9625m_firmwaresnapdragon_835_mobile_pc_platformqcn9012snapdragon_8c_compute_platformsd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresnapdragon_auto_5g_modem-rfsm6250psnapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_425_mobile_platform_firmwareqca6574aqca6174asm7325pmdm9635msd855sm4125_firmwaresdx57m_firmwaresnapdragon_439_mobile_platform_firmwarefastconnect_6200_firmwaremsm8209vision_intelligence_300_platformsd460qca6391snapdragon_710_mobile_platformfastconnect_7800aqt1000_firmwareqcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290qcn9011sd_455qca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformwcn3680bsd835_firmwaresnapdragon_675_mobile_platformsnapdragon_wear_2500_platform_firmwareqca6696msm8608_firmwaresa6150psnapdragon_1100_wearable_platform_firmwaresnapdragon_768g_5g_mobile_platformapq8037_firmwaresnapdragon_765_5g_mobile_platformsnapdragon_820_mobile_platform_firmwaresm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_wear_3100_platform_firmwareqcn9074_firmwaresnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • ...
  • 7
  • 8
  • 9
  • ...
  • 22
  • 23
  • Next
Details not found