Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-30426

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-22 Sep, 2022 | 23:06
Updated At-27 May, 2025 | 16:05
Rejected At-
Credits

There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version <= P13 (latest) and AP130 F2 firmware version <= P04 (latest) and Aspire 1600X firmware version <= P11.A3L (latest) and Aspire 1602M firmware version <= P11.A3L (latest) and Aspire 7600U firmware version <= P11.A4 (latest) and Aspire MC605 firmware version <= P11.A4L (latest) and Aspire TC-105 firmware version <= P12.B0L (latest) and Aspire TC-120 firmware version <= P11-A4 (latest) and Aspire U5-620 firmware version <= P11.A1 (latest) and Aspire X1935 firmware version <= P11.A3L (latest) and Aspire X3475 firmware version <= P11.A3L (latest) and Aspire X3995 firmware version <= P11.A3L (latest) and Aspire XC100 firmware version <= P11.B3 (latest) and Aspire XC600 firmware version <= P11.A4 (latest) and Aspire Z3-615 firmware version <= P11.A2L (latest) and Veriton E430G firmware version <= P21.A1 (latest) and Veriton B630_49 firmware version <= AAP02SR (latest) and Veriton E430 firmware version <= P11.A4 (latest) and Veriton M2110G firmware version <= P21.A3 (latest) and Veriton M2120G fir.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:22 Sep, 2022 | 23:06
Updated At:27 May, 2025 | 16:05
Rejected At:
▼CVE Numbering Authority (CNA)

There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version <= P13 (latest) and AP130 F2 firmware version <= P04 (latest) and Aspire 1600X firmware version <= P11.A3L (latest) and Aspire 1602M firmware version <= P11.A3L (latest) and Aspire 7600U firmware version <= P11.A4 (latest) and Aspire MC605 firmware version <= P11.A4L (latest) and Aspire TC-105 firmware version <= P12.B0L (latest) and Aspire TC-120 firmware version <= P11-A4 (latest) and Aspire U5-620 firmware version <= P11.A1 (latest) and Aspire X1935 firmware version <= P11.A3L (latest) and Aspire X3475 firmware version <= P11.A3L (latest) and Aspire X3995 firmware version <= P11.A3L (latest) and Aspire XC100 firmware version <= P11.B3 (latest) and Aspire XC600 firmware version <= P11.A4 (latest) and Aspire Z3-615 firmware version <= P11.A2L (latest) and Veriton E430G firmware version <= P21.A1 (latest) and Veriton B630_49 firmware version <= AAP02SR (latest) and Veriton E430 firmware version <= P11.A4 (latest) and Veriton M2110G firmware version <= P21.A3 (latest) and Veriton M2120G fir.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://acer.com
x_refsource_MISC
http://altos.com
x_refsource_MISC
https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
x_refsource_MISC
Hyperlink: http://acer.com
Resource:
x_refsource_MISC
Hyperlink: http://altos.com
Resource:
x_refsource_MISC
Hyperlink: https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://acer.com
x_refsource_MISC
x_transferred
http://altos.com
x_refsource_MISC
x_transferred
https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
x_refsource_MISC
x_transferred
Hyperlink: http://acer.com
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://altos.com
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-787CWE-787 Out-of-bounds Write
Type: CWE
CWE ID: CWE-787
Description: CWE-787 Out-of-bounds Write
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:23 Sep, 2022 | 00:15
Updated At:27 May, 2025 | 16:15

There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version <= P13 (latest) and AP130 F2 firmware version <= P04 (latest) and Aspire 1600X firmware version <= P11.A3L (latest) and Aspire 1602M firmware version <= P11.A3L (latest) and Aspire 7600U firmware version <= P11.A4 (latest) and Aspire MC605 firmware version <= P11.A4L (latest) and Aspire TC-105 firmware version <= P12.B0L (latest) and Aspire TC-120 firmware version <= P11-A4 (latest) and Aspire U5-620 firmware version <= P11.A1 (latest) and Aspire X1935 firmware version <= P11.A3L (latest) and Aspire X3475 firmware version <= P11.A3L (latest) and Aspire X3995 firmware version <= P11.A3L (latest) and Aspire XC100 firmware version <= P11.B3 (latest) and Aspire XC600 firmware version <= P11.A4 (latest) and Aspire Z3-615 firmware version <= P11.A2L (latest) and Veriton E430G firmware version <= P21.A1 (latest) and Veriton B630_49 firmware version <= AAP02SR (latest) and Veriton E430 firmware version <= P11.A4 (latest) and Veriton M2110G firmware version <= P21.A3 (latest) and Veriton M2120G fir.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Acer Inc.
acer
>>altos_t110_f3_firmware>>Versions before p13(exclusive)
cpe:2.3:o:acer:altos_t110_f3_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>altos_t110_f3>>-
cpe:2.3:h:acer:altos_t110_f3:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>ap130_f2_firmware>>Versions before p04(exclusive)
cpe:2.3:o:acer:ap130_f2_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>ap130_f2>>-
cpe:2.3:h:acer:ap130_f2:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_1600x_firmware>>Versions before p11.a3l(exclusive)
cpe:2.3:o:acer:aspire_1600x_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_1600x>>-
cpe:2.3:h:acer:aspire_1600x:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_1602m_firmware>>Versions before p11.a3l(exclusive)
cpe:2.3:o:acer:aspire_1602m_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_1602m>>-
cpe:2.3:h:acer:aspire_1602m:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_7600u_firmware>>Versions before p11.a4(exclusive)
cpe:2.3:o:acer:aspire_7600u_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_7600u>>-
cpe:2.3:h:acer:aspire_7600u:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_mc605_firmware>>Versions before p11.a4l(exclusive)
cpe:2.3:o:acer:aspire_mc605_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_mc605>>-
cpe:2.3:h:acer:aspire_mc605:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_tc-105_firmware>>Versions before p12.b0l(exclusive)
cpe:2.3:o:acer:aspire_tc-105_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_tc-105>>-
cpe:2.3:h:acer:aspire_tc-105:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_tc-120_firmware>>Versions before p11-a4(exclusive)
cpe:2.3:o:acer:aspire_tc-120_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_tc-120>>-
cpe:2.3:h:acer:aspire_tc-120:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_u5-620_firmware>>Versions before p11.a1(exclusive)
cpe:2.3:o:acer:aspire_u5-620_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_u5-620>>-
cpe:2.3:h:acer:aspire_u5-620:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_x1935_firmware>>Versions before p11.a3l(exclusive)
cpe:2.3:o:acer:aspire_x1935_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_x1935>>-
cpe:2.3:h:acer:aspire_x1935:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_x3475_firmware>>Versions before p11.a3l(exclusive)
cpe:2.3:o:acer:aspire_x3475_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_x3475>>-
cpe:2.3:h:acer:aspire_x3475:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_x3995_firmware>>Versions before p11.a3l(exclusive)
cpe:2.3:o:acer:aspire_x3995_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_x3995>>-
cpe:2.3:h:acer:aspire_x3995:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_xc100_firmware>>Versions before p11.b3(exclusive)
cpe:2.3:o:acer:aspire_xc100_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_xc100>>-
cpe:2.3:h:acer:aspire_xc100:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_xc600_firmware>>Versions before p11.a4(exclusive)
cpe:2.3:o:acer:aspire_xc600_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_xc600>>-
cpe:2.3:h:acer:aspire_xc600:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_z3-615_firmware>>Versions before p11.a2l(exclusive)
cpe:2.3:o:acer:aspire_z3-615_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>aspire_z3-615>>-
cpe:2.3:h:acer:aspire_z3-615:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_b630_49_firmware>>Versions before aap02sr(exclusive)
cpe:2.3:o:acer:veriton_b630_49_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_b630_49>>-
cpe:2.3:h:acer:veriton_b630_49:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_e430g_firmware>>Versions before p21.a1(exclusive)
cpe:2.3:o:acer:veriton_e430g_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_e430g>>-
cpe:2.3:h:acer:veriton_e430g:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_e430_firmware>>Versions before p11.a4(exclusive)
cpe:2.3:o:acer:veriton_e430_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_e430>>-
cpe:2.3:h:acer:veriton_e430:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m2110g_firmware>>Versions before p21.a3(exclusive)
cpe:2.3:o:acer:veriton_m2110g_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m2110g>>-
cpe:2.3:h:acer:veriton_m2110g:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m2120g_firmware>>Versions before p11-a3(exclusive)
cpe:2.3:o:acer:veriton_m2120g_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m2120g>>-
cpe:2.3:h:acer:veriton_m2120g:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m2611g_firmware>>Versions before p11-b0l(exclusive)
cpe:2.3:o:acer:veriton_m2611g_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m2611g>>-
cpe:2.3:h:acer:veriton_m2611g:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m2611_firmware>>Versions before p11.b0(exclusive)
cpe:2.3:o:acer:veriton_m2611_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m2611>>-
cpe:2.3:h:acer:veriton_m2611:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m4620_firmware>>Versions before p21.a3(exclusive)
cpe:2.3:o:acer:veriton_m4620_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m4620>>-
cpe:2.3:h:acer:veriton_m4620:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m4620g_firmware>>Versions before p21.a3(exclusive)
cpe:2.3:o:acer:veriton_m4620g_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m4620g>>-
cpe:2.3:h:acer:veriton_m4620g:-:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m6620g_firmware>>Versions before p21.a0(exclusive)
cpe:2.3:o:acer:veriton_m6620g_firmware:*:*:*:*:*:*:*:*
Acer Inc.
acer
>>veriton_m6620g>>-
cpe:2.3:h:acer:veriton_m6620g:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE-787Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-787
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://acer.comcve@mitre.org
Vendor Advisory
http://altos.comcve@mitre.org
Broken Link
https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.mdcve@mitre.org
Exploit
Third Party Advisory
http://acer.comaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://altos.comaf854a3a-2127-422b-91ae-364da2661108
Broken Link
https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.mdaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
Hyperlink: http://acer.com
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://altos.com
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink: http://acer.com
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://altos.com
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1092Records found

CVE-2018-9424
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.90%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 21:23
Updated-22 Nov, 2024 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidadmob
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9409
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.17%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 19:26
Updated-03 Jul, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-34853
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.65%
||
7 Day CHG~0.00%
Published-22 Aug, 2023 | 00:00
Updated-03 Oct, 2024 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Supermicro motherboard X12DPG-QR 1.4b allows local attackers to hijack control flow via manipulation of SmcSecurityEraseSetupVar variable.

Action-Not Available
Vendor-supermicron/asupermicro
Product-x11ssqlx11sdd-18c-fx12dpfr-an6x11ssv_firmwarex11spw-ctfx12spt-gc_firmwarex11ssz_firmwarex13dsf-a_firmwarex13sefr-a_firmwarex11dpi-n_firmwarex12dgu_firmwareh12ssl-cx13dei-t_firmwarex13san-c-wohsx13set-gc_firmwarex12stw-tfh11dsu-in_firmwarex11opi-cpuh13ssw_firmwareh12ssff-an6_firmwareh13ssl-n_firmwarex11dpu-x_firmwarex11sca-wx11qph\+_firmwarex13sae_firmwarex12sth-fx11sds-12cx11ssql_firmwarex12dpl-i6x11sse-fx11spm-fx13deg-oadh12ssl-ntx11sph-nctfx11ssn_firmwarex12spg-nf_firmwarex12dgq-rx12sca-5f_firmwarex12stn-c_firmwarex11scm-ln8f_firmwarex11sse-f_firmwarex11ssz-tln4fx13saqx12sdv-8c-sp6f_firmwareh12dsg-o-cpu_firmwarex11dpt-bhx12spw-fx12dpg-u6_firmwarex11ddw-nt_firmwarex13san-l-wohs_firmwarex11dsn-ts_firmwareh12dsi-nt6x11dpi-ntx12scz-tln4f_firmwarex11dpuh12dgo-6x12dpt-b6x12sdv-8c-spt4f_firmwarex13san-lx13seed-f_firmwarex11dpi-nt_firmwarex11ssw-4tf_firmwarex12dpg-arx11sds-16c_firmwarex12sdv-16c-spt8f_firmwarex11sae_firmwareh11dsu-inx13dgu_firmwarex12spo-ntf_firmwarex11dpfr-sx12stn-h_firmwarex12spt-pt_firmwareh13sst-gch12ssw-inlx11ssl-nfx13sem-fx12stl-if_firmwareh13dsg-o-cpu-dx13sedw-f_firmwarex11sph-nctf_firmwareh12dsi-n6_firmwarex12stw-fx11spi-tf_firmwarex12sca-f_firmwareh13ssl-nx12qch\+_firmwareh11dsi-nt_firmwareh12dsg-o-cpux11dsn-tsqx11dpt-psx11ssqx11dpu-xll_firmwarex11sch-ln4f_firmwarex11dph-i_firmwarex12dgo-6_firmwarex11ssmx11dgo-t_firmwarex12dpt-pt46x11dpu-xx13det-b_firmwarex12spg-nfx12dpg-qbt6x12spl-ln4f_firmwareh12ssl-c_firmwarex12dai-n6_firmwarex12sth-ln4fx11sds-8c_firmwarex12stn-e_firmwarex11dai-nx12sdv-10c-sp6f_firmwarex11sri-if_firmwarex11scl-ifx11sdd-8c-fh12ssw-ntx12dpg-oa6-gd2_firmwarex11srm-vf_firmwareh13ssfx12sth-sys_firmwarex13qeh\+_firmwarex13san-h_firmwarex12spi-tf_firmwarex11satx11spg-tf_firmwarex12sca-fh12ssw-in_firmwarex11ssh-ln4f_firmwareh12ssff-an6x11dpu-xllx11sae_m_firmwarex13det-bh12ssw-an6_firmwareh12ssl-ct_firmwarex11ssw-tfh12ssw-inx11dpff-sn_firmwarex12dgux12stn-h-wohs_firmwareh12dgq-nt6_firmwarex13sew-fx12sae_firmwarex11sdd-18c-f_firmwareh13ssl-nt_firmwarex13sei-tfx11dpl-i_firmwarex11opi-cpu_firmwarex13deg-pvcx12dpd-a6m25_firmwarex12dsc-6x12ste-f_firmwarex12spz-ln4f_firmwarex11ssw-4tfx13saz-q_firmwarex12ddw-a6_firmwarex12stl-fx11sch-f_firmwarex13san-cx12spo-fh12ssw-ntlh13dsh_firmwarex11saex11srm-fx11spm-tpfx13sei-f_firmwarex12scv-wx11dsf-e_firmwarex11ssw-fx11sca-f_firmwarex12scv-lvds_firmwarex13dai-tx12stn-c-wohsx13deg-pvc_firmwarex13set-gcx13sew-tf_firmwarex11scw-f_firmwarex13seed-sf_firmwarex12dpl-nt6x12stl-f_firmwarex11sch-ln4fx13sra-tfx11ssh-ctfh12ssl-i_firmwarex11dac_firmwarex11sba_firmwarex12spt-gx12dpg-oa6h12sst-psx11ssh-gf-1585lx11scl-ln4fx11dpt-lx11dpff-snx11ssz-tln4f_firmwareh12dsu-in_firmwarex11ssl-cf_firmwarex11spa-tf_firmwarex11ssl-cfx11dgq_firmwarex11spw-ctf_firmwareh13sae-mfx12stn-hh13sshx13dem_firmwarex11dsf-ex11scl-f_firmwarex13sav-lvdsx12spt-ptx11dph-tqx12qch\+x11ssz-fx12spm-tf_firmwareh13ssl-nth13sst-gx12sdv-4c-spt4fh12dst-b_firmwarex12dpu-6_firmwarex12stn-l-wohsx12spw-f_firmwarex11ssd-fx11ssv-q_firmwarex11spw-tf_firmwarex12spm-ln6tf_firmwarex11dsc\+x13sew-f_firmwarex13san-c_firmwarex12sdv-10c-spt4f_firmwarex12spl-ln4fx11ssv-lvdsx12stn-l_firmwareh11dsi_firmwarex12stn-c-wohs_firmwarex11dpu-vx11dpi-nx12dpi-nt6_firmwarex12dpg-qbt6_firmwarex11ssl-fx11dpfr-s_firmwareh12ssw-ntr_firmwarex11ssm_firmwarex11spa-tfx12dhm-6x13srn-ex11ssq_firmwarex11sszx13srn-hx12dpg-oa6_firmwarex12sdv-4c-spt8fx12scq_firmwarex11scm-ln8fx11sae_mx11ssvx13dgux12std-f_firmwareh12ssw-an6x12std-fx11spw-tfx11ssv-qx11ssw-tf_firmwarex13deix11sri-ifx11srm-f_firmwarex13sei-fx13srn-h_firmwareh11dst-bx12sdv-20c-spt8f_firmwarex11ddw-ntx13sedw-fx11ssh-gf-1585_firmwarex11dpt-bh_firmwarex11dpx-tx13set-gx11dpl-ih11dsix11dpt-l_firmwarex12dpi-n6_firmwarex11ssh-gtf-1585_firmwareh13srd-f_firmwarex12dpg-oa6-gd2x11ssz-f_firmwarex12dpu-6x12stn-h-wohsx13saz-qx11scl-if_firmwarex12sdv-14c-spt8fh12dgo-6_firmwareh12dsi-nt6_firmwarex11dph-t_firmwarex11scm-fx11dpg-ot-cpu_firmwarex12stl-ifx12spw-tfx12scz-f_firmwarex12sae-5_firmwarex11ssh-gtf-1585l_firmwarex12spi-tfx13saex11scd-fx11ssl-nf_firmwarex12spm-ln4fx13dei_firmwarex11scax11scd-f_firmwarex12scqx12sdv-20c-spt8fx11sds-12c_firmwarex11srl-fx11srmx13srn-e_firmwareh12dsu-inr_firmwareh12ssg-an6x11scl-ln4f_firmwarex11dph-tx11dpu-ze\+_firmwarex12sae-5x12spz-ln4fx12spz-spln6f_firmwarex12dpd-a6m25x11ssh-gtf-1585x12spa-tfx12spa-tf_firmwarex11dach12ssl-ix11sra_firmwareh13srd-fx11dpu-z\+h12ssw-ntl_firmwarex12stn-l-wohs_firmwarex12spo-ntfx13seed-sfx12sth-ln4f_firmwarex11ssh-tf_firmwareh11dsi-ntx11srm_firmwarex13seed-fx12dpt-b6_firmwarex13san-e-wohs_firmwareh12ssg-anp6_firmwarex11sds-16cx11dpt-ps_firmwarex12dai-n6h13dsg-o-cpu-d_firmwarex12sdv-14c-spt8f_firmwarex11dai-n_firmwarex11ddw-lh12ssw-ntrx13sae-fx11dgqx11ssi-ln4f_firmwarex12ste-fx13deg-oa_firmwarex11dps-re_firmwarex11dsn-tsq_firmwarex12sdv-8ce-sp4fx11dph-ix11dpt-bx11dpu_firmwarex11sbah13ssh_firmwarex11spg-tfx13ddw-a_firmwarex13sae-f_firmwarex11spm-tfh12ssw-nt_firmwarex13qeh\+x11ssnh13sae-mf_firmwarex12dhm-6_firmwarex11sch-fx12dgo-6x11srax12dpg-u6x11ssh-f_firmwarex12spm-ln4f_firmwarex12spt-gcx12sth-sysh13sst-gc_firmwareh12ssg-anp6x11srm-vfx12dpg-qrx12dsc-6_firmwareh12sst-ps_firmwarex12stn-lx11ssv-lvds_firmwarex12scv-w_firmwarex13san-l-wohsx11ssl_firmwarex11dpg-ot-cpuh13sswx12dpg-qt6_firmwarex12dpg-qt6h12dsu-inrx11srl-f_firmwarex11scm-f_firmwarex13dei-tx12stn-e-wohsx11spa-t_firmwarex11ssm-f_firmwarex12scz-qf_firmwarex12dpl-i6_firmwarex11dpfr-snx13saq_firmwarex11ssh-fx12scz-tln4fx12sped-f_firmwarex12dpg-ar_firmwarex11sds-8cx11sslx12sdv-16c-spt8fh12ssw-inl_firmwarex13san-h-wohs_firmwareh12dsi-n6h12ssl-nt_firmwarex11ssh-tfx12spz-spln6fx11dpu-z\+_firmwarex11dpg-qth12dgq-nt6x11sca_firmwarex11spm-f_firmwarex13san-h-wohsx11scw-fx12spo-f_firmwareh13sst-g_firmwarex11dpu-ze\+x13deg-oad_firmwarex12sdv-10c-spt4fx13san-hx11dph-tq_firmwarex12ddw-a6h12ssl-ctx11qph\+x13sem-f_firmwarex11spa-tx13san-e_firmwarex12scz-fx12sped-fx13sei-tf_firmwarex12scv-lvdsh12ssw-inr_firmwarex11dgo-tx12stw-f_firmwarex12stn-e-wohs_firmwarex11dpx-t_firmwareh13dsg-o-cpu_firmwarex12sdv-8c-spt8f_firmwarex12sca-5fh13ssf_firmwarex13sem-tfx11dsc\+_firmwarex11spm-tpf_firmwarex12sdv-4c-sp6f_firmwarex11sca-w_firmwarex11spl-fx11spm-tf_firmwarex11dpg-qt_firmwarex11ddw-l_firmwarex12sdv-8c-spt8fx12dgq-r_firmwarex11dpfr-sn_firmwarex11sdd-8c-f_firmwarex12stn-cx13ddw-ah12dsg-q-cpu6x12dpt-pt6_firmwareh12dsu-inx12dpt-pt6x11ssm-fx13set-g_firmwarex11spl-f_firmwarex13demx13dsf-ah13dsg-o-cpux13saz-f_firmwarex11dps-rex11scl-fh12dsg-q-cpu6_firmwarex13srn-e-wohs_firmwarex12sdv-4c-spt4f_firmwarex12spt-g_firmwarex12dpg-qr_firmwarex13dai-t_firmwareh12ssw-inrx13sav-psx11ssh-ctf_firmwarex13sra-tf_firmwarex11ssi-ln4fx11dsn-tsx12sdv-8c-sp6fx13deg-qtx12dpl-nt6_firmwarex11ssd-f_firmwareh12ssg-an6_firmwarex11ssl-f_firmwarex12spm-tfx13san-ex12sth-f_firmwarex12sdv-8c-spt4fh13dshh12ssfr-an6x13sefr-ax13san-e-wohsx13deg-qt_firmwarex13deg-oax12sdv-8ce-sp4f_firmwarex12sdv-4c-sp6fx13sav-lvds_firmwarex12stw-tf_firmwarex11dpg-snx11ssh-gf-1585h12dst-bh12ssfr-an6_firmwarex13sew-tfx11ssw-f_firmwarex13sem-tf_firmwarex11sph-nctpf_firmwarex12spl-fx12saex11dpt-b_firmwareh11dst-b_firmwarex12dpt-pt46_firmwarex11ssh-ln4fx13san-c-wohs_firmwarex13saz-fx11sca-fx11spi-tfx12sdv-10c-sp6fx12sdv-4c-spt8f_firmwarex12spm-ln6tfx11dpg-sn_firmwarex13san-l_firmwarex12scz-qfx12dpi-n6x12spl-f_firmwarex11sat_firmwarex11sph-nctpfx11ssh-gtf-1585lx12dpi-nt6x13srn-e-wohsx12spw-tf_firmwarex12dpfr-an6_firmwarex11ssh-gf-1585l_firmwarex11dpu-v_firmwarex12stn-ex13sav-ps_firmwaren/ax12dpg-qr
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-35001
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-0.21% / 43.17%
||
7 Day CHG~0.00%
Published-05 Jul, 2023 | 18:35
Updated-13 Feb, 2025 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability

Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace

Action-Not Available
Vendor-Linux Kernel Organization, IncNetApp, Inc.Debian GNU/LinuxFedora Project
Product-debian_linuxlinux_kernelh500sfedorah410sh410ch300sh700sLinux Kernel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-3611
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.78%
||
7 Day CHG-0.00%
Published-21 Jul, 2023 | 20:49
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds write in Linux kernel's net/sched: sch_qfq component

An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.

Action-Not Available
Vendor-Debian GNU/LinuxLinux Kernel Organization, Inc
Product-linux_kerneldebian_linuxKernelkernel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-36036
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.00% / 76.06%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 17:57
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-12-05||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1507windows_11_21h2windows_11_22h2windows_10_1809windows_10_21h2windows_server_2008windows_server_2019windows_11_23h2windows_10_22h2windows_server_2016windows_10_1607windows_server_2022windows_server_2012Windows 10 Version 1809Windows 10 Version 22H2Windows 10 Version 1507Windows 10 Version 1607Windows 11 version 21H2Windows Server 2019Windows 10 Version 21H2Windows Server 2008 Service Pack 2Windows 11 version 22H2Windows Server 2008 Service Pack 2Windows 11 Version 23H2Windows Server 2022Windows Server 2016Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016 (Server Core installation)Windows 11 version 22H3Windows Server 2012Windows Server 2008 R2 Service Pack 1Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-35788
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.55%
||
7 Day CHG~0.00%
Published-16 Jun, 2023 | 00:00
Updated-05 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.

Action-Not Available
Vendor-n/aCanonical Ltd.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-h410sh410c_firmwareh410s_firmwareh410cdebian_linuxh500s_firmwareh300s_firmwareh500sh700slinux_kernelh700s_firmwareh300subuntu_linuxn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-3487
Matching Score-4
Assigner-Silicon Labs
ShareView Details
Matching Score-4
Assigner-Silicon Labs
CVSS Score-7.7||HIGH
EPSS-0.27% / 50.10%
||
7 Day CHG~0.00%
Published-20 Oct, 2023 | 14:12
Updated-25 Sep, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer overflow in Silicon Labs Gecko Bootloader leads to unbounded memory access

An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.

Action-Not Available
Vendor-silabssilabs.comsilabs
Product-gecko_bootloaderGSDKgecko_bootloader
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-9402
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.8||HIGH
EPSS-0.03% / 5.91%
||
7 Day CHG-0.00%
Published-04 Dec, 2024 | 23:27
Updated-19 Dec, 2024 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of gl_proc.c, there is a buffer overwrite due to a missing bounds check. This could lead to escalation of privileges in the kernel.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-0033
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.06% / 19.80%
||
7 Day CHG~0.00%
Published-16 Feb, 2024 | 00:08
Updated-16 Dec, 2024 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of ashmem-dev.cpp, there is a possible missing seal due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0233
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.93%
||
7 Day CHG~0.00%
Published-11 Jun, 2020 | 14:43
Updated-04 Aug, 2024 | 05:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In main of main.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150225255

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9400
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.17%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:14
Updated-19 Dec, 2024 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gt1x_debug_write_proc and gt1x_tool_write of drivers/input/touchscreen/mediatek/GT1151/gt1x_generic.c and gt1x_tools.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0241
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.32%
||
7 Day CHG~0.00%
Published-11 Aug, 2020 | 19:27
Updated-04 Aug, 2024 | 05:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NuPlayerStreamListener of NuPlayerStreamListener.cpp, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151456667

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-415
Double Free
CVE-2018-8834
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.42%
||
7 Day CHG~0.00%
Published-17 Apr, 2018 | 19:00
Updated-16 Sep, 2024 | 19:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.

Action-Not Available
Vendor-omronICS-CERT
Product-cx-flnetnetwork_configuratorcx-protocolcx-oneswitch_box_utilitycx-programmercx-serverOmron CX-One
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-34325
Matching Score-4
Assigner-Xen Project
ShareView Details
Matching Score-4
Assigner-Xen Project
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.71%
||
7 Day CHG~0.00%
Published-05 Jan, 2024 | 16:31
Updated-18 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple vulnerabilities in libfsimage disk handling

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] libfsimage contains parsing code for several filesystems, most of them based on grub-legacy code. libfsimage is used by pygrub to inspect guest disks. Pygrub runs as the same user as the toolstack (root in a priviledged domain). At least one issue has been reported to the Xen Security Team that allows an attacker to trigger a stack buffer overflow in libfsimage. After further analisys the Xen Security Team is no longer confident in the suitability of libfsimage when run against guest controlled input with super user priviledges. In order to not affect current deployments that rely on pygrub patches are provided in the resolution section of the advisory that allow running pygrub in deprivileged mode. CVE-2023-4949 refers to the original issue in the upstream grub project ("An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub’s XFS file system implementation.") CVE-2023-34325 refers specifically to the vulnerabilities in Xen's copy of libfsimage, which is decended from a very old version of grub.

Action-Not Available
Vendor-Xen Project
Product-xenXen
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9372
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.17%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 19:23
Updated-03 Jul, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In cmd_flash_mmc_sparse_img of dl_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to a local escalation of privilege in the bootloader with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-0053
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.61%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 19:40
Updated-16 Sep, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow

Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.

Action-Not Available
Vendor-Debian GNU/LinuxJuniper Networks, Inc.
Product-junosdebian_linuxJunos OS
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9396
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.17%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 21:59
Updated-18 Dec, 2024 | 20:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0046
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.67%
||
7 Day CHG~0.00%
Published-10 Mar, 2020 | 20:03
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DrmPlugin::releaseSecureStops of DrmPlugin.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-137284652

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9471
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 15.18%
||
7 Day CHG~0.00%
Published-20 Nov, 2024 | 17:16
Updated-18 Dec, 2024 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2025-27061
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.90%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:49
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Video

Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareimmersive_home_214sd865_5gqcs8155_firmwareqca6595sm8735qca8081_firmwareqcn5224qcn9001qam8620p_firmwarewcn7880_firmwarewcd9340_firmwaresa8530pwcd9395_firmwareqcn6024wcn7750qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilesnapdragon_auto_4gfastconnect_6700qcn6422_firmwaresa4150pqcn5124_firmwaresnapdragon_782g_mobile_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395ipq9048qca6574au_firmwareipq8078a_firmwareqca6564_firmwaresm6370qam8295psnapdragon_x12_lte_firmwarewcd9341ipq5312snapdragon_888\+_5g_mobile_firmware315_5g_iot_firmwaresd730_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwareqcs9100fastconnect_6800_firmwareqcs5430wcn7860fsm10055snapdragon_x32_5g-rf_firmwareqcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770pqcn9000snapdragon_678_mobile_firmwaresnapdragon_x62_5g-rfsa8540pqsm8250_firmwareqsm8350_firmwareqcn6432video_collaboration_vc1_platformsa7255psm8635qep8111snapdragon_x65_5g-rf_firmwaresnapdragon_730_mobile_firmwarewcd9385_firmwareipq8074a_firmwareipq8076awcd9360snapdragon_680_4g_mobilesa6155psnapdragon_x75_5g-rf_firmwareqca6564au_firmwareqca8075qam8650pvideo_collaboration_vc5_platform_firmwaresa9000psnapdragon_888_5g_mobile_firmwaresxr2250p_firmwaresnapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwaresnapdragon_ar1_gen_1qca6698ausnapdragon_4_gen_2_mobile_firmwareqca6436_firmwareipq8070a_firmwaresnapdragon_695_5g_mobile_firmwareqcn9070snapdragon_7c\+_gen_3_compute_firmwareqca8384qca8084sm4125_firmwareqca6420wcn3910qca9367wcn3660bqca6574asm7635p_firmwareqca6174awcd9340qcs8250_firmwareqcm2290qdu1210talynplusqcn6122_firmwareqcn5154_firmwareipq9048_firmwaresm8550p_firmwaresxr2250pwcn3988qcm8550snapdragon_765_5g_mobile_firmwareqcn5122_firmwareqcn9024qca8384_firmwareqca6574qca6698au_firmwaresnapdragon_auto_5g-rf_firmwareqamsrv1hqcn6412_firmwareqca8082sm8650qqcm2290_firmwareqcs410sa8155pqca8072_firmwarewsa8830snapdragon_765g_5g_mobile_firmwaresnapdragon_x75_5g-rfipq5312_firmwaresm8550pqcf8000_firmwaresa6145pimmersive_home_318_firmwaresa8255p_firmwareqcn6122sm7635_firmwaresnapdragon_4_gen_2_mobilewcn7750_firmwaresa8650p_firmwareqrb5165m_firmwaresm7635pimmersive_home_216_firmwarewcn6450_firmwareimmersive_home_316srv1l_firmwareqcs9100_firmwaresnapdragon_865\+_5g_mobile_firmwareipq8071aqcn6112wcn3950_firmwareqrb5165nfastconnect_6200sm7325p_firmwarewcd9360_firmwarewcd9378snapdragon_480_5g_mobile_firmwaresnapdragon_660_mobile_firmwaresm8635p_firmwaresm6650p_firmwareqdx1011video_collaboration_vc3_platform_firmwaresnapdragon_x72_5g-rfsnapdragon_auto_5g-rf_gen_2_firmwareqcn6023_firmwareqcn5164_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobileqcn9072qcn6224_firmwaresd660_firmwaresdx61_firmwareqca8082_firmwaresnapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwaresrv1limmersive_home_216sm7675psrv1msnapdragon_860_mobile_firmwaresxr2130_firmwarear8035_firmwaresnapdragon_778g\+_5g_mobileqrb5165mqca4024_firmwareqca0000_firmwarefsm20056sd888_firmwaresnapdragon_x65_5g-rfqcs6125_firmwareipq9008_firmwareqcn9074wsa8815_firmwaresnapdragon_x50_5g-rfqca8337_firmwaresnapdragon_auto_4g_firmwareipq8173sm7250p_firmwaresm4635_firmwarewcn3680_firmwaresa2150p_firmwarewcn3950snapdragon_730g_mobile_firmwaresm8750qca8385qca6797aq_firmwaretalynplus_firmwareqcf8001_firmwareqcn9070_firmwaresnapdragon_778g\+_5g_mobile_firmwaresmart_audio_400_firmwaresa8295p_firmwaresd_675_firmwaresa4155p_firmwaresnapdragon_720g_mobileipq5010_firmwaresm7250pqca8101_firmwareipq6018sa8155sd888snapdragon_x35_5g-rfwcn6755_firmwarefsm10055_firmwareqru1062_firmwarefsm10056snapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobilefsm20056_firmwareqru1062ipq5424fastconnect_6800qcs7230snapdragon_865_5g_mobile_firmwareipq5302_firmwareqcn9001_firmwarewcd9371fastconnect_6900_firmwarerobotics_rb5_firmwarequalcomm_215_mobile_firmwareqmp1000_firmwarewcn7880wcn6755qca8075_firmwaresxr2330pqcf8000wcn7881sdx65m_firmwarevideo_collaboration_vc3_platformqcm2150_firmwareqca8385_firmwareqcn6402_firmwareqca6698aq_firmwareqcs2290qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615qca9367_firmwareqca8084_firmwareipq5424_firmwarewcn3680sa8255pqcs7230_firmwarewcd9390_firmwareqcn5024qep8111_firmwareqcs615_firmwareqca6430snapdragon_855\+_mobilesnapdragon_765_5g_mobileimmersive_home_326snapdragon_860_mobileqdx1011_firmwaresm8750_firmwareflight_rb5_5g_firmwaressg2125pqca8080_firmwareqru1052csra6640_firmwareqamsrv1mwcn7861qam8650p_firmwarevideo_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresm6650_firmwareipq8076_firmwareqam8620psd855_firmwareqrb5165n_firmwareqca6436wcd9335_firmwarewcn3980_firmwarewsa8835wsa8840_firmwareqca6391_firmwareqdu1010_firmwareqcs4290_firmwareqcs8300qca8081csra6620sd660mdm9628wsa8815qam8775pqca9377snapdragon_ar2_gen_1_firmwaresnapdragon_auto_5g-rf_gen_2qcm4325_firmwaresnapdragon_439_mobile_firmwareqcn6412qcm4290_firmwaresnapdragon_720g_mobile_firmwareqca9888_firmwareqca9889qcn5024_firmwareqcn9002_firmwaresnapdragon_ar1_gen_1_firmwareimmersive_home_318ipq5010qcn9274_firmwareqcs5430_firmwaresg4150p_firmwareqru1052_firmwarecsra6620_firmwareqcs8550sa8650pqam8775p_firmwaresd865_5g_firmwaresm8750p_firmwarewcd9375qca9889_firmwaresnapdragon_ar2_gen_1sa8145psd_675snapdragon_8\+_gen_1_mobile_firmwarecsr8811sm7675p_firmwaresnapdragon_x50_5g-rf_firmwareqdx1010wcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwareqcm8550_firmwaresa6150p_firmwarewcn6650qcs410_firmwaresw5100pipq9574qcn9000_firmwareqcn6102_firmwareqcs610_firmwarewcd9335wcd9370qca8072qca6696wcd9341_firmwaresxr2330p_firmwarewcn7881_firmwareqcn9003_firmwarewcn6450ipq8076wcn6740_firmwareipq6018_firmwaresnapdragon_750g_5g_mobilesnapdragon_780g_5g_mobileqcn6023snapdragon_685_4g_mobileqdu1110ipq8078asnapdragon_690_5g_mobile_firmwareqca6574auwcd9390sa8620p_firmwarecsra6640snapdragon_778g_5g_mobile_firmwaresrv1hsm8650q_firmwarewcn3660b_firmwareqcn5122sd730fsm20055snapdragon_690_5g_mobileqcn6024_firmwareqcm5430qualcomm_215_mobilesnapdragon_x72_5g-rf_firmwareqcm6125_firmwarec-v2x_9150ssg2115pqcc710qcn6132_firmwaresnapdragon_xr2_5g_firmwareqca8101qcn5054fastconnect_6900robotics_rb2qcn6402snapdragon_w5\+_gen_1_wearable_firmwareimmersive_home_326_firmwareqru1032_firmwareipq5332_firmwareqcn5052fsm10056_firmwareqfw7114ipq9574_firmwareqam8255p_firmwaresa8155_firmwareqcn5164sdx61qcs4490snapdragon_730_mobilesnapdragon_x55_5g-rf_firmwarewsa8845qcn6100_firmwareqcm6125csr8811_firmwarewsa8810qdu1000_firmwareqca8085qsm8250srv1h_firmwareqcn6100qca6595ausnapdragon_888_5g_mobilesm7315_firmwareqdu1010wcd9326_firmwarewsa8840srv1m_firmwareqcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobileqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwaresm8750pqcn9012wcd9371_firmwareqcs4490_firmwareqcf8001wcn3910_firmwaresm8635psnapdragon_460_mobilesnapdragon_8_gen_2_mobileqmp1000sdx65mwcd9370_firmwarerobotics_rb2_firmwareqdu1110_firmwaresnapdragon_x55_5g-rfqdu1000sa7255p_firmwareipq9570snapdragon_8\+_gen_2_mobilesa8195psa8540p_firmwareipq5302qcm6490sm6370_firmwarefsm20055_firmwaresnapdragon_662_mobileqcn9274ipq8076a_firmwaresa8775pipq9570_firmwaresxr2230p_firmwaresd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwareqcn9011sa8775p_firmwaresmart_audio_400wsa8845hqcn9024_firmwaresa6150pwcd9326sa8155p_firmwareqca6564asnapdragon_768g_5g_mobile_firmwareqcn9074_firmwareipq8174sm7675_firmwareipq8174_firmwarear8035ipq8072aqamsrv1m_firmwareqca6564sa6155qcm4325qcf8000sfp_firmwareqcn6224qcs615qca6698aqsa7775p_firmwaresm6250sm7635sa8530p_firmwaressg2125p_firmwaresnapdragon_480\+_5g_mobilewcn3680bsa8145p_firmwareqcs8155sa8150p_firmwarefastconnect_6700_firmwarewcn3990qcn9002ipq8078qcs6490snapdragon_695_5g_mobileqcs8250ipq9554_firmwaresnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarewsa8830_firmwaresnapdragon_460_mobile_firmwareqca6678aq_firmwarewsa8845_firmwareqca8386_firmwarewsa8832wcd9378_firmwareqca6678aqqcn6432_firmwareqcn5022_firmwarewcn7860_firmwaresa4150p_firmwareipq9008ipq9554snapdragon_x35_5g-rf_firmwareqca6564ausm4635sa8195p_firmwareqcm4290qcn5054_firmwareqca9888ipq5332snapdragon_x12_ltear8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwareipq8072a_firmwaresnapdragon_xr2\+_gen_1sm4125qcm4490_firmwareqru1032vision_intelligence_400_firmwareqcn6112_firmwareqcs6125flight_rb5_5gsnapdragon_870_5g_mobile_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobileqca8085_firmwaresnapdragon_870_5g_mobilesnapdragon_678_mobileqcn6132sm6250_firmwareqcn6102qca6584auqcn6274_firmwareqcn9011_firmwaresa2150psw5100_firmwarewcn6740wcn6650_firmwaresnapdragon_780g_5g_mobile_firmwaresnapdragon_8_gen_3_mobile_firmwareqcn5224_firmwareqfw7114_firmwareqca4024qca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobileqcn6422immersive_home_214_firmwaresnapdragon_auto_5g-rfsm8635_firmwareipq8070awcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230pqca8080snapdragon_xr2_5gsa8150pqcn9003immersive_home_3210qcn5052_firmwaresxr1230psm6650sw5100aqt1000snapdragon_4_gen_1_mobile_firmwarec-v2x_9150_firmwaresm6650pqca6688aqqam8295p_firmwaresd855wcn3990_firmwaresm7315snapdragon_660_mobileqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqsm8350snapdragon_8_gen_1_mobilesnapdragon_680_4g_mobile_firmwareqcs4290sxr1230p_firmwaresnapdragon_865\+_5g_mobilesg8275psdx55_firmwareipq8071a_firmwarewcn3615_firmwaresxr2130qcm4490snapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325pwcn7861_firmwaresnapdragon_732g_mobile_firmwareaqt1000_firmwareqca6584au_firmwareqcn5152_firmwareqcn6274snapdragon_w5\+_gen_1_wearableqfw7124qca6595au_firmwareqca0000qcs8300_firmwaresw5100p_firmwareqca6696_firmwarewcd9380_firmwareqca6574_firmwaresg4150psd_8_gen1_5gqcn5124qca6797aqmdm9628_firmwareqcn5152sa8620pqca6574a_firmwaresdx55snapdragon_4_gen_1_mobileqcn9072_firmwaresnapdragon_865_5g_mobileipq8074aimmersive_home_3210_firmwaresd675snapdragon_855\+_mobile_firmwaresd_8_gen1_5g_firmwarewcd9375_firmwaresa7775pqca6391qca8386ipq8173_firmwareqcn9012_firmwaresnapdragon_439_mobilesa8770p_firmwaresa8295psm8735_firmwarefastconnect_7800snapdragon_8\+_gen_2_mobile_firmwareqca6688aq_firmwareipq8078_firmwaresnapdragon_765g_5g_mobilesnapdragon_x32_5g-rfwcn3988_firmware315_5g_iotqamsrv1h_firmwaresm7675immersive_home_316_firmwareqcn5154snapdragon_x62_5g-rf_firmwarewsa8835_firmwarevision_intelligence_400ssg2115p_firmwareqcn5022wcn3980qcm2150qcf8000sfpqcs610Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-8748
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.13% / 33.33%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 17:33
Updated-04 Aug, 2024 | 21:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15. An application may be able to execute arbitrary code with kernel privileges.

Action-Not Available
Vendor-Apple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-8697
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.91%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 17:33
Updated-04 Aug, 2024 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6. An application may be able to execute arbitrary code with system privileges.

Action-Not Available
Vendor-Apple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-26598
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.77%
||
7 Day CHG~0.00%
Published-25 Feb, 2025 | 15:54
Updated-29 Jul, 2025 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Xorg: xwayland: out-of-bounds write in createpointerbarrierclient()

An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.

Action-Not Available
Vendor-tigervncRed Hat, Inc.X.Org Foundation
Product-enterprise_linuxtigervncxwaylandx_serverRed Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 10Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 7 Extended Lifecycle SupportRed Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 8Red Hat Enterprise Linux 6
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9398
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.17%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:11
Updated-19 Dec, 2024 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In fm_set_stat of mediatek FM radio driver, there is a possible OOB write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-9258
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.03%
||
7 Day CHG~0.00%
Published-27 Sep, 2019 | 18:05
Updated-04 Aug, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wifilogd, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113655028

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9392
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.17%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 17:15
Updated-19 Dec, 2024 | 17:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In get_binary of vendor/mediatek/proprietary/hardware/connectivity/gps/gps_hal/src/data_coder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-27132
Matching Score-4
Assigner-OpenHarmony
ShareView Details
Matching Score-4
Assigner-OpenHarmony
CVSS Score-3.8||LOW
EPSS-0.02% / 3.61%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 09:03
Updated-09 May, 2025 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
arkcompiler_ets_runtime has an out-of-bounds write vulnerability

in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmony
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9463
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.17%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:40
Updated-19 Dec, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In sw49408_irq_runtime_engine_debug of touch_sw49408.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-26596
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.86%
||
7 Day CHG~0.00%
Published-25 Feb, 2025 | 15:54
Updated-29 Jul, 2025 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Xorg: xwayland: heap overflow in xkbwritekeysyms()

A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.

Action-Not Available
Vendor-tigervncRed Hat, Inc.X.Org Foundation
Product-enterprise_linuxtigervncxwaylandx_serverRed Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 10Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 7 Extended Lifecycle SupportRed Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 8Red Hat Enterprise Linux 6
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-34678
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 10.68%
||
7 Day CHG~0.00%
Published-06 Nov, 2024 | 02:17
Updated-12 Nov, 2024 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in libsapeextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-34623
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.96%
||
7 Day CHG~0.00%
Published-07 Aug, 2024 | 01:30
Updated-09 Aug, 2024 | 20:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in applying connected information in Samsung Notes prior to version 4.4.21.62 allows local attackers to potentially execute arbitrary code with Samsung Notes privilege.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notessamsung_notes
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33877
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.06% / 17.00%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-03 Oct, 2024 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_450_fa_firmwarerealsense_450_faIntel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-1569
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-2.39% / 84.41%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:13
Updated-04 Aug, 2024 | 06:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Edge Memory Corruption Vulnerability

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by way of enticement in an email or Instant Messenger message, or by getting them to open an attachment sent through email. The security update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.

Action-Not Available
Vendor-Microsoft Corporation
Product-edgewindows_server_2019windows_10Microsoft Edge (EdgeHTML-based)
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-12186
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 11.92%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:31
Updated-10 Dec, 2024 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Hotel Management System Available Room hotelnew.c stack-based overflow

A vulnerability was found in code-projects Hotel Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file hotelnew.c of the component Available Room Handler. The manipulation of the argument admin_entry leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & Projects
Product-hotel_management_systemHotel Management Systemhotel_management_system
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-12354
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 10.29%
||
7 Day CHG~0.00%
Published-09 Dec, 2024 | 01:31
Updated-10 Dec, 2024 | 23:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Phone Contact Manager System User Menu MenuDisplayStart buffer overflow

A vulnerability, which was classified as critical, was found in SourceCodester Phone Contact Manager System 1.0. Affected is the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation leads to buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-razormistSourceCodester
Product-phone_contact_manager_systemPhone Contact Manager Systemphone_shop_sales_managements_system_using_php_with_source_code
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-34318
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.29%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 17:16
Updated-27 Jun, 2025 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap-buffer-overflow in src/hcom.c

A heap buffer overflow vulnerability was found in sox, in the startread function at sox/src/hcom.c:160:41. This flaw can lead to a denial of service, code execution, or information disclosure.

Action-Not Available
Vendor-n/aFedora ProjectRed Hat, Inc.SoX - Sound eXchange
Product-fedorasound_exchangeenterprise_linuxextra_packages_for_enterprise_linuxExtra Packages for Enterprise LinuxsoxRed Hat Enterprise Linux 6Red Hat Enterprise Linux 7Fedora
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-12185
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 11.92%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:31
Updated-10 Dec, 2024 | 15:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Hotel Management System Administrator Login Password stack-based overflow

A vulnerability has been found in code-projects Hotel Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Administrator Login Password Handler. The manipulation of the argument Str2 leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & Projects
Product-hotel_management_systemHotel Management Systemhotel_management_system
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2017-1000111
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.02%
||
7 Day CHG~0.00%
Published-04 Oct, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.

Action-Not Available
Vendor-n/aDebian GNU/LinuxLinux Kernel Organization, IncRed Hat, Inc.
Product-enterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationlinux_kernelenterprise_linuxenterprise_linux_server_eusenterprise_linux_serverdebian_linuxenterprise_linux_server_ausn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9393
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.17%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 17:17
Updated-18 Dec, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In procfile_write of drivers/misc/mediatek/connectivity/wlan/gen2/os/linux/gl_proc.c, there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33067
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.41%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Audio

Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwareqcs610_firmwarewcd9335sxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwaresnapdragon_888_5g_mobile_platformwcd9341_firmwareqca6320sd888_firmwareqcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwaresnapdragon_1200_wearable_platform_firmwareqca9377_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsa9000p_firmwaresrv1hsnapdragon_835_mobile_pc_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770psnapdragon_780g_5g_mobile_platform_firmwarec-v2x_9150qca6584auqca6320_firmwareqcn6274_firmwaresd888qcc710wcn6740qca6310_firmwarefastconnect_6800qfw7114_firmwaresnapdragon_x5_lte_modem_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_782g_mobile_platform_firmwarewcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150psnapdragon_778g_5g_mobile_platformmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810qam8650psnapdragon_865\+_5g_mobile_platformsa9000psrv1h_firmwarevideo_collaboration_vc3_platformaqt1000sm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwaresa6155p_firmwarewcd9326_firmwareqam8295p_firmwaresrv1m_firmwaresd855sd835wcd9330_firmwarewcn3990_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmwaresnapdragon_wear_4100\+_platform_firmwarewcd9385mdm9650_firmwareqca9367_firmwarewcd9330snapdragon_7c\+_gen_3_compute_firmwarewcn3610_firmwaresa8255psnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaremdm9650qca9367snapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asxr2130wcn3620_firmware9206_lte_modem_firmwaresa8195pwcd9340qamsrv1msnapdragon_820_automotive_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm7325pqam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwaresdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_1200_wearable_platformsnapdragon_x75_5g_modem-rf_systemqca6391_firmwarewcd9335_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformsa8775p_firmwaresnapdragon_782g_mobile_platformqamsrv1hqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pwcd9326qcs410sa8155p_firmwareqca8081qca6564awsa8815mdm9628sa8155pwcn3980_firmwareqam8775pqca9377mdm9628_firmwarewsa8830sa6145pqcn9074_firmwaresa8255p_firmware9206_lte_modemsmart_audio_200_platform_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaremsm8996ausa8650p_firmwarewcn3620wcd9375_firmwareqca6391qcn6224snapdragon_x5_lte_modemsnapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295psmart_audio_200_platformfastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwaresm7325p_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformwcd9375sa8150p_firmwaresnapdragon_855\+\/860_mobile_platformfastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformsnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragonqam8255p_firmwareqca9377_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresa8145p_firmwaremsm8996au_firmwaremdm9628_firmwaresnapdragon_820_automotive_platform_firmwareqcn6224_firmwaresdm429w_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6584au_firmwarewcn3990_firmwarec-v2x_9150_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcd9326_firmwareqamsrv1h_firmwaresnapdragon_1200_wearable_platform_firmwarewcd9340_firmwaresm7325p_firmwareqam8295p_firmwaremdm9650_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn3680b_firmwarewcd9375_firmwareqca8081_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwarewcd9330_firmwareqca6436_firmwareaqt1000_firmwareqca6564au_firmwarewcn6740_firmwaresa6155p_firmwareqca9367_firmwareqcn6274_firmwaresa8775p_firmwaresnapdragon_x5_lte_modem_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmware9206_lte_modem_firmwaresa6145p_firmwaresa8155p_firmwaresmart_audio_200_platform_firmwarefastconnect_6700_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwareqcs610_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresd888_firmwareqcc710_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2023-32380
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.05%
||
7 Day CHG~0.00%
Published-23 Jun, 2023 | 00:00
Updated-05 Dec, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. Processing a 3D model may lead to arbitrary code execution.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-1378
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-3.39% / 86.91%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:12
Updated-04 Aug, 2024 | 06:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Registry Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008Windows 10 Version 1607Windows Server version 2004Windows Server 2019 (Server Core installation)Windows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 8.1Windows 7Windows Server 2012 (Server Core installation)Windows 10 Version 1709Windows 10 Version 1909Windows 7 Service Pack 1Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows 10 Version 1803Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server, version 1909 (Server Core installation)Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows 10 Version 1709 for 32-bit Systems
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-32804
Matching Score-4
Assigner-Arm Limited
ShareView Details
Matching Score-4
Assigner-Arm Limited
CVSS Score-7.8||HIGH
EPSS-0.20% / 42.21%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 11:54
Updated-28 Aug, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mali GPU Userspace Driver can make an Out-of-Bounds access

Out-of-bounds Write vulnerability in Arm Ltd Midgard GPU Userspace Driver, Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a local non-privileged user to write a constant pattern to a limited amount of memory not allocated by the user space driver.This issue affects Midgard GPU Userspace Driver: from r0p0 through r32p0; Bifrost GPU Userspace Driver: from r0p0 through r44p0; Valhall GPU Userspace Driver: from r19p0 through r44p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r44p0.

Action-Not Available
Vendor-Arm Limited
Product-bifrost_gpu_kernel_driver5th_gen_gpu_architecture_kernel_drivermidgard_gpu_kernel_drivervalhall_gpu_kernel_driverArm 5th Gen GPU Architecture Userspace DriverValhall GPU Userspace DriverMidgard GPU Userspace DriverBifrost GPU Userspace Driver
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33059
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.42%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Audio

Memory corruption in Audio while processing the VOC packet data from ADSP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwaresnapdragon_x20_lte_modemsd865_5gqca6595snapdragon_xr1_platformqca8081_firmwaresnapdragon_653_mobile_platformsm7250-absnapdragon_x50_5g_modem-rf_systemwcd9340_firmwareapq8056wcd9395_firmwaresdm845qcc710_firmwareqca6426wcn3610sa4150psm7325-ae_firmwareqca8337qca6426_firmwarewcd9395qca6574au_firmwarewcn785x-5qca6564_firmwareqam8295pwcd9341sd626_firmwaresnapdragon_x12_lte_modemwsa8810_firmwaresd730_firmwarewsa8845h_firmwareapq8052sdm670sm8150-acsm6375_firmwaresd835_firmwaresm7150-acvideo_collaboration_vc1_platform_firmwaresa4155psd821sm6375msm8108sm7250-aa_firmwareqsm8250_firmwarevideo_collaboration_vc1_platformwcd9385_firmwareqca6421qca6310snapdragon_630_mobile_platformqcs603_firmwarewcd9360apq8053-aa_firmwaresd821_firmwaresa6155psm7150-ac_firmwareqca6564au_firmwaresd820qam8650pvideo_collaboration_vc5_platform_firmwareapq8052_firmwaresm7325_firmwaresa6155p_firmwaremdm9640_firmwaresdm429_firmwareqca6390_firmwaresd835snapdragon_632_mobile_platform_firmwaresdm429qca6436_firmwaresnapdragon_wear_4100\+_platform_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwaresm8250-ac_firmwareqca6420qca6174_firmwarewcn3910apq8064au_firmwarecsrb31024qca9367snapdragon_wear_3100_platform_firmwaresnapdragon_845_mobile_platformmdm9250_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asm7325-aewcn3620_firmwareqca6174aqca6584_firmwarewcd9340qcs8250_firmwareqcm2290snapdragon_630_mobile_platform_firmwaresm6150-acsm6225sm8150-ac_firmwaresm8550p_firmwarewcn3998_firmwareqcm8550snapdragon_x20_lte_modem_firmwarewcn3988apq8076qca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemsdm710_firmwareqcs410qcm2290_firmwaresa8155pwsa8830sm8550psa6145papq8056_firmwaresa8255p_firmwarewcn785x-1_firmwaremsm8996auqrb5165m_firmwarewcn3620snapdragon_208_processor_firmwaresnapdragon_x5_lte_modemapq8064auqm215_firmwarewcn3950_firmwaresnapdragon_632_mobile_platformqrb5165nsm7325p_firmwarewcd9360_firmwaresmart_audio_400_platforms820a_firmwarevideo_collaboration_vc3_platform_firmwaresd670_firmwaresm7150-aaqcn6224_firmwareqca6431sd660_firmwareqca4020_firmwareqca9379_firmwaresm6350sxr2130_firmwarear8035_firmwareapq8009_firmwaresnapdragon_653_mobile_platform_firmwareqrb5165msnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320qca4024_firmwaresd888_firmwaresnapdragon_662_mobile_platform_firmwareqcs6125_firmwareqcn9074wsa8815_firmwaresm8250-abqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresm7325sm8350-ac_firmwaresm7250p_firmwarewcn3680_firmwarewcn785x-5_firmwarewcn3950sm4250-aaqca6797aq_firmwaresm4350_firmwaresm7350-ab_firmwaresnapdragon_617_processorwcn3991sa8295p_firmwaresd_675_firmwaresa4155p_firmwaresm7250pcsrb31024_firmwaresa8155sm7150-aa_firmwaresnapdragon_845_mobile_platform_firmwaresd888wcn685x-5qca6310_firmwaresd626qcs7230sm8250-acs820awcd9371snapdragon_xr2_5g_platform_firmwaresm7350-abqrb5165_firmwaresm8350_firmwarevideo_collaboration_vc3_platformsnapdragon_212_mobile_platformqca6431_firmwaresm7225_firmwaresm6125qca6698aq_firmwareqcs22908998_firmwareqcs2290_firmwarewcn3615qca9367_firmwarewcn3680sa8255pqcs7230_firmwarewcd9390_firmwarewcn6750qca6430wcn6750_firmwaremdm9650snapdragon_auto_5g_modem-rfsnapdragon_208_processorsm7250-ab_firmware9206_lte_modem_firmwaremsm8108_firmwarecsra6640_firmwaresm4350qam8650p_firmwarewcn3998video_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresd855_firmwarewcd9335_firmwaremdm9640qca6436qrb5165n_firmwaresnapdragon_1200_wearable_platformsnapdragon_x24_lte_modem_firmwarewcn3980_firmwareqca6391_firmwarewsa8835wsa8840_firmwaresm4250-aa_firmwaremsm8905_firmwareqcs4290_firmwarecsra6620qca8081sd660mdm9628sm4375sdm670_firmwareqam8775pqca9377wsa8815qcm4325_firmwaresm7125_firmwareqcm4290_firmwaresnapdragon_425_mobile_platform_firmwareqrb5165smart_audio_400_platform_firmwaresg4150p_firmwarecsra6620_firmwaresnapdragon_820_mobile_platform_firmwareqcs8550qam8775p_firmwaresd865_5g_firmwarewcd9375apq8076_firmwaresnapdragon_wear_2100_platformsa8145psd_675sm4350-ac_firmwareapq8053-aasm7250-ac_firmwarewcn685x-1_firmwarewcn3680b_firmwareqcm8550_firmwareapq8017qcs410_firmwaresa6150p_firmwaresw5100pmsm8905sxr1120qcs610_firmwarewcd9335wcd9370qca6696wcd9341_firmware8998qca6390wcn6740_firmwaresnapdragon_650_mobile_platformsnapdragon_auto_4g_modemsm8150_firmwareqca6574auwcd9390csra6640msm8209_firmwarewcn3660b_firmwaresd730sdx20msm8350snapdragon_210_processor_firmwareqcm6125_firmwarec-v2x_9150snapdragon_wear_3100_platformqcc710snapdragon_625_mobile_platform_firmwaresxr1120_firmwaresnapdragon_x5_lte_modem_firmware315_5g_iot_modem_firmwaresdm439_firmwaresda845snapdragon_wear_2100_platform_firmwareqfw7114315_5g_iot_modemsnapdragon_x55_5g_modem-rf_systemqam8255p_firmwaresnapdragon_821_mobile_platform_firmwaresa8155_firmwaresm7150-abqca6335mdm9250snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qca6421_firmwareqcm6125mdm9230sm7125wsa8810qsm8250snapdragon_8\+_gen_2_mobile_platformsm8350-acqca6595ausm7315_firmwarewcd9326_firmwarewsa8840mdm9230_firmwareqcs8550_firmwareqfw7124_firmwareqcn9012mdm9650_firmwaresnapdragon_821_mobile_platformwcd9371_firmwarewcn3910_firmwareapq8009snapdragon_212_mobile_platform_firmwarewcd9370_firmwaresa8195pqca6335_firmwareqcm64908953pro_firmwaresnapdragon_wear_2500_platformqca9379sd675_firmwareqca6430_firmwareqcn9011qcs605wsa8845hsa6150psm7250-aawcd9326sa8155p_firmwareqca6564asnapdragon_675_mobile_platformsnapdragon_617_processor_firmwaresnapdragon_662_mobile_platformqcn9074_firmwarear8035qca6564sa6155qcm4325qcn6224qca6698aqsm6250sm7250-acsd670wcn685x-1sa8145p_firmwarewcn3680bsnapdragon_820_mobile_platformsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformsnapdragon_636_mobile_platform_firmwarewcn3990qcs6490qcs8250ar8031_firmwaresnapdragon_652_mobile_platform_firmwarewsa8830_firmwarewsa8845_firmwaremdm9330_firmwaresnapdragon_auto_4g_modem_firmwareqcs603snapdragon_675_mobile_platform_firmwaremdm9630sm8250-ab_firmwaresa4150p_firmwaremsm8608_firmwaremsm8209qca6564ausm6225_firmwaresm7325-af_firmwaresa8195p_firmwareapq8053-ac_firmwareqcm4290sm6125_firmwaremsm8608ar8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_1200_wearable_platform_firmware8953prosm4125snapdragon_xr2_5g_platformqcs6125sda845_firmwareapq5053-aa_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwareapq5053-aasdm710sm6250_firmwareqca6584auqca6320_firmwareqcn6274_firmwareqcn9011_firmwaresw5100_firmwarewcn6740snapdragon_425_mobile_platformsm6225-ad_firmwareqfw7114_firmwareqcs605_firmwareqca4024qca6595_firmwaresm8250_firmwaremdm9630_firmwaresm7225apq8017_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresm6225-adsm4350-acsdm660_firmwaresw5100aqt1000c-v2x_9150_firmwaresm8150wcn3991_firmwareqam8295p_firmwaresd855sdm660wcd9330_firmwareqca6174wcn3990_firmwaresm7315qca6564a_firmwaresdx20m_firmwarewcd9385msm8909w_firmwarewcd9330wcn3610_firmwareqcs4290sd820_firmwaresg8275psdx55_firmwarewcn3615_firmwaresnapdragon_210_processorsxr2130snapdragon_wear_2500_platform_firmware8098_firmwaresnapdragon_636_mobile_platformsm7150-ab_firmwareqca4020snapdragon_xr2\+_gen_1_platformqca6174a_firmwaresm7325paqt1000_firmwaresm6150-ac_firmwaresdm429wqca6584au_firmwareqcn6274qfw7124qca6595au_firmwaresw5100p_firmwaresm8250qca6696_firmwareapq8053-acwcd9380_firmwareqca6574_firmwaresg4150pqca6797aqmdm9628_firmwaresm4375_firmware9206_lte_modemqca6574a_firmwaresdx55sdm439sdm845_firmwaresm6350_firmwaresd675wcd9375_firmwareqca6391wcn785x-1qcn9012_firmwareqca6584snapdragon_8_gen_2_mobile_platform_firmwaresa8295p8098snapdragon_xr1_platform_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_625_mobile_platformqm215snapdragon_652_mobile_platformsnapdragon_650_mobile_platform_firmwarewcn685x-5_firmwarewcn3988_firmwaresnapdragon_wear_4100\+_platformwsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980mdm9330msm8909wqcs610Snapdragon
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33032
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.92%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-16 Jun, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in TZ Secure OS

Memory corruption in TZ Secure OS while requesting a memory allocation from TA region.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqcn9070sa6150p_firmwaresa8145p_firmwareqcs610sm6250p_firmwaresnapdragon_x24_lte_modem_firmwarefsm10056csrb31024csra6620qca4024_firmwareqca8082qcn9072qca8386wcn3950_firmwaresc8180x\+sdx55sa8150p_firmwareqca6420_firmwareqca6595au_firmwaresa6155ipq6000sd730_firmwaresnapdragon_auto_4g_modem_firmwarecsra6620_firmwarewcd9370sd_675_firmwaresd675_firmwarecsra6640_firmwareqcn5152_firmwareqca6564qcs6125_firmwarewcn3990_firmwareqcn9000_firmwareqca9377wcd9371_firmwarewcn3950qcn6024_firmwarefastconnect_6200qca8386_firmwaresnapdragon_7c_gen_2_compute_platformqca8084_firmwareqca8082_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6574au_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqca8081_firmwareqcn6023_firmwaresa6155_firmwarewcd9375_firmwarewcn3999_firmwareqca6420qca6564au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa6155p_firmwarewcd9306qcn9274qcs8155smart_audio_400_platform_firmwarewcn3999qcn5052qcs6125sa4155p_firmwaresa8155_firmwareipq6010qca4004_firmwarewcn3988_firmwareqca6430qcn9074sa6145p_firmwareqts110qca8085c-v2x_9150sm6250snapdragon_678_mobile_platform_firmwaresa8195psnapdragon_720g_mobile_platformsnapdragon_8cx_compute_platformwcd9306_firmwarewcd9340wsa8810_firmwarefsm10056_firmwarewcd9335sa6155pqca8081qcn6023qca6174a_firmwaresnapdragon_wear_1300_platform_firmwareqca8085_firmwarewcd9341qca6696_firmwarewcd9371ipq9008_firmwaresnapdragon_665_mobile_platform_firmwarecsr8811snapdragon_855_mobile_platform_firmwareaqt1000sa8150pwcd9375sc8180x\+sdx55_firmwaresm6250_firmwareqca4004sd855_firmwarewcn3988wsa8815_firmwaresa8195p_firmwareqcn5121fastconnect_6800_firmwareqcn5022_firmwareqca6564asnapdragon_7c_gen_2_compute_platform_firmwaresa4150psnapdragon_730_mobile_platform_firmwareqcm6125_firmwaresnapdragon_675_mobile_platform_firmwareqca8072snapdragon_855\+\/860_mobile_platform_firmwarewcd9380_firmwarewcn3990qcn9000sd_675snapdragon_8cx_gen_2_5g_compute_platformfastconnect_6800qca6595qca8084qca6564au9205_lte_modemipq9008snapdragon_8c_compute_platformqca6574csr8811_firmwaresnapdragon_auto_5g_modem-rfwcd9380sm6250psnapdragon_678_mobile_platformsnapdragon_x50_5g_modem-rf_systemqcs410snapdragon_855\+\/860_mobile_platformqca8075_firmwareqca6574asmart_audio_400_platformipq6005_firmwareqca6174ac-v2x_9150_firmwareqca8072_firmwareqca6430_firmwareqcn5052_firmwareqcn9274_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareipq6018_firmwareqca6574_firmwarewcd9340_firmwaresd855wsa8815qca6574a_firmwarefastconnect_6200_firmwareipq6028qcn5021qcn5152qcn9024snapdragon_665_mobile_platformipq9574_firmwaresnapdragon_730g_mobile_platformsnapdragon_x55_5g_modem-rf_system_firmwaresd730qca6391wcn3980_firmwaresnapdragon_x50_5g_modem-rf_system_firmware9205_lte_modem_firmwareaqt1000_firmwareipq6005snapdragon_7c_compute_platform_firmwaresnapdragon_8cx_compute_platform_firmwaresnapdragon_auto_4g_modemar8031_firmwarecsrb31024_firmwareqcn9070_firmwareipq6028_firmwareqca6574ausa8155p_firmwareipq9574qcn5122qca6564a_firmwareqcn9024_firmwarewcd9341_firmwareqcm6125wsa8810snapdragon_x24_lte_modemqcn5121_firmwaresnapdragon_730g_mobile_platform_firmwareqcs610_firmwareipq6018qcn5022sa6145psnapdragon_730_mobile_platformsnapdragon_8c_compute_platform_firmwareqca6564_firmwaresnapdragon_675_mobile_platformipq6010_firmwarear8031qca6595_firmwaresnapdragon_720g_mobile_platform_firmwaresa8145pqca6696snapdragon_732g_mobile_platformqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresa6150psdx55qca8075qcn5021_firmwareqcn9022_firmwarecsra6640qcn6024qcn9022sa8155psd675qcn9072_firmwareipq6000_firmwareqcs8155_firmwareqcn9074_firmwareqcs410_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_wear_1300_platformsa4155psnapdragon_7c_compute_platformsnapdragon_855_mobile_platformqts110_firmwareSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33055
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.42%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Audio

Memory Corruption in Audio while invoking callback function in driver from ADSP.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsw5100pqca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwareqca6696sm7250-absnapdragon_x50_5g_modem-rf_systemwcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcc710_firmwareqca6426wcn6740_firmwaresa4150psm7325-ae_firmwareqca8337qca6426_firmwarewcd9395qca6574au_firmwarewcn785x-5qam8295psm8150_firmwarewcd9341qca6574auwcd9390snapdragon_x12_lte_modemwsa8810_firmwarewsa8845h_firmwarecsra6640wcn3660b_firmwaresm8150-acsm6375_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psm8350qcm6125_firmwareqcc710sm6375sm7250-aa_firmwaresdm439_firmwarevideo_collaboration_vc1_platformqfw7114wcd9385_firmwareqca6421snapdragon_x55_5g_modem-rf_systemqam8255p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155pqca6421_firmwareqcm6125wsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresnapdragon_8\+_gen_2_mobile_platformsm8350-acqca6595ausm7315_firmwaresm7325_firmwarewcd9326_firmwaresa6155p_firmwarewsa8840qcs8550_firmwareqfw7124_firmwareqca6436_firmwareqcn9012snapdragon_8_gen_2_mobile_platformwcn3910_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwaresm8250-ac_firmwareqca6420wcn3910wcd9370_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_660_mobile_platformwcn3660bqca6574asm7325-aeqca6174asa8195pwcd9340qcs8250_firmwareqcm2290sm6225qcm6490sm8150-ac_firmwaresm8550p_firmwarewcn3998_firmwareqcm8550wcn3988qca6574sm7325-afsnapdragon_x75_5g_modem-rf_systemqca6430_firmwareqcn9011wsa8845hwcd9326sa6150psm7250-aaqcs410qcm2290_firmwaresa8155p_firmwarewcn685x-1_firmwaresa8155pwsa8830snapdragon_662_mobile_platformsm8550psa6145psa8255p_firmwarewcn785x-1_firmwarear8035qrb5165m_firmwareqcm4325qcn6224qca6698aqwcn3950_firmwareqrb5165nsm7250-acwcn685x-1sa8145p_firmwaresm7325p_firmwarewcn3680bsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformvideo_collaboration_vc3_platform_firmwarewcn3990qcs6490qcs8250wsa8830_firmwareqcn6224_firmwareqca6431wsa8845_firmwaresd660_firmwaresm6350sxr2130_firmwarear8035_firmwareqrb5165msm8250-ab_firmwaresa4150p_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresd888_firmwaresnapdragon_662_mobile_platform_firmwareqcs6125_firmwaresm6225_firmwaresm7325-af_firmwarewsa8815_firmwaresa8195p_firmwaresm8250-abqca8337_firmwareqcm4290snapdragon_x12_lte_modem_firmwaresm7325sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresm8350-ac_firmwaresm7250p_firmwaresm4125wcn785x-5_firmwarewcn3950snapdragon_xr2_5g_platformsm4250-aaqcs6125apq5053-aa_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwaresm7350-ab_firmwarewcn3991sa8295p_firmwareapq5053-aasa4155p_firmwaresm7250pqcn6274_firmwaresd888qcn9011_firmwaresw5100_firmwarewcn685x-5wcn6740sm6225-ad_firmwareqfw7114_firmwareqca6595_firmwareqcs7230sm8250-acsm8250_firmwaresm7225wcd9380sa6145p_firmwareqam8255psnapdragon_xr2_5g_platform_firmwaresa8150psm7350-absnapdragon_auto_5g_modem-rf_firmwareqrb5165_firmwaresm8350_firmwaresm6225-adsm4350-acsw5100video_collaboration_vc3_platformaqt1000sm8150wcn3991_firmwareqam8295p_firmwaresd855qca6431_firmwaresm7225_firmwarewcn3990_firmwaresm7315qca6698aq_firmwareqcs2290wcd9385qcs2290_firmwarewcn3615sa8255pqcs7230_firmwareqcs4290wcd9390_firmwarewcn6750qca6430sg8275pwcn6750_firmwaresdx55_firmwaresnapdragon_auto_5g_modem-rfwcn3615_firmwaresm7250-ab_firmwaresxr2130csra6640_firmwaresnapdragon_xr2\+_gen_1_platformqca6174a_firmwaresm7325pqam8650p_firmwarewcn3998video_collaboration_vc5_platformqca6420_firmwareaqt1000_firmwareqcs6490_firmwarewcn3980_firmwaresd855_firmwarewcd9335_firmwareqcn6274qca6436qfw7124qrb5165n_firmwareqca6595au_firmwareqca6391_firmwarewsa8835wsa8840_firmwaresw5100p_firmwaresm4250-aa_firmwaresm8250qca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarewsa8815csra6620qca8081sd660sg4150psm4375qam8775pqca6797aqqca9377sm4375_firmwareqcm4325_firmwareqca6574a_firmwaresdx55sdm439qcm4290_firmwaresm6350_firmwarewcd9375_firmwareqca6391qrb5165wcn785x-1qualcomm_215_mobile_platformqcn9012_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarecsra6620_firmwaresa8295psnapdragon_x50_5g_modem-rf_system_firmwareqcs8550qam8775p_firmwaresd865_5g_firmwarequalcomm_215_mobile_platform_firmwarewcd9375wcn685x-5_firmwarewcn3988_firmwaresa8145psm4350-ac_firmwarewsa8835_firmwaresnapdragon_660_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwaresm7250-ac_firmwarewcn3980wcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33033
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.92%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-21 May, 2025 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Audio

Memory corruption in Audio during playback with speaker protection.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaremdm9640_firmwaresm6250p_firmwareqca8337snapdragon_888_5g_mobile_platformwcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155snapdragon_427_mobile_platformsnapdragon_480_5g_mobile_platformsd_455_firmwarehome_hub_100_platformapq8076snapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwaremsm8108wcd9371_firmwaremsm8108_firmwarewcn3950qcn6024_firmwaresm4125wcn3660bsnapdragon_460_mobile_platformsnapdragon_660_mobile_platform_firmwaresd460_firmwaremdm9230_firmwaresm7315_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_636_mobile_platformqca8081_firmwareqca6420snapdragon_auto_5g_modem-rf_firmwareqca9367_firmwaremdm8207sa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqca6430snapdragon_630_mobile_platformsnapdragon_678_mobile_platform_firmwareqts110wcd9306_firmwarewcd9340snapdragon_8cx_compute_platformmdm9625_firmwarevision_intelligence_200_platform_firmwaresnapdragon_765_5g_mobile_platform_firmwareqca6698aq_firmwaremsm8209_firmwaresnapdragon_690_5g_mobile_platformmdm9250_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_wear_2500_platformqca6696_firmwarewcd9371sd_8cxsa8150psnapdragon_430_mobile_platformqca4004mdm9330_firmwaresd660sd865_5g_firmwaresd660_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresnapdragon_7c_gen_2_compute_platform_firmwaresnapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresdm429w9205_lte_modemsnapdragon_670_mobile_platform_firmwaresd670_firmwareqca6574snapdragon_7c\+_gen_3_computewcd9380qcs410snapdragon_210_processorsnapdragon_430_mobile_platform_firmwareqca9379_firmwarec-v2x_9150_firmwareqcn9012_firmwaresd626wcd9340_firmwarewsa8815snapdragon_865\+_5g_mobile_platformqca6584_firmwaresnapdragon_630_mobile_platform_firmwareqcs8250sd835wcn3980_firmwaresd730sa8295p9205_lte_modem_firmwarewcn6740_firmwaresnapdragon_8cx_compute_platform_firmwaremdm9225qcs4490_firmwaresnapdragon_x65_5g_modem-rf_systemapq8064au_firmwaremdm9225mfastconnect_6900fastconnect_6900_firmwaresnapdragon_660_mobile_platformsd670smart_audio_200_platform_firmwareqcn9024_firmwaresdx57mqcm4290_firmwareqcs610_firmwareapq8084_firmwaresa6145pqualcomm_215_mobile_platform_firmwarear8031mdm8207_firmwaresnapdragon_750g_5g_mobile_platformsd820_firmwareqca6391_firmwaresa4150p_firmwarewcd9370_firmwaresdx55csra6640snapdragon_695_5g_mobile_platformsnapdragon_x20_lte_modemsnapdragon_1200_wearable_platformwcn3660qca9379sa4155pqsm8250_firmwaresnapdragon_480\+_5g_mobile_platformwsa88309207_lte_modemsnapdragon_850_mobile_compute_platformsnapdragon_x24_lte_modem_firmwarecsrb31024mdm9628_firmwareflight_rb5_5g_platformmdm9650snapdragon_865_5g_mobile_platformflight_rb5_5g_platform_firmwareqcs4290snapdragon_x20_lte_modem_firmwaremdm9250qca6420_firmwaresnapdragon_450_mobile_platform_firmwaresnapdragon_auto_4g_modem_firmwaresd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377wcd9385_firmwarewcd9326_firmwarefastconnect_6200wcn3615_firmwaresnapdragon_7c_gen_2_compute_platformqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6584snapdragon_835_mobile_pc_platform_firmwaresdx55_firmwaresnapdragon_208_processor_firmwarewcn3615sm7250p_firmwarewcn3610_firmwareqrb5165nwcd9306qca6584ausnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_208_processorsnapdragon_439_mobile_platform9206_lte_modemqca9367mdm9235m_firmwaresnapdragon_wear_3100_platformwcn3988_firmware315_5g_iot_modemqcn9074qca6421fastconnect_6700_firmwaresa8195psxr1120snapdragon_626_mobile_platform_firmwarewcd9326wcd9335qcm4490snapdragon_888\+_5g_mobile_platformqcs4290_firmwaresxr2130_firmwareqcs6490_firmwaremdm9625wcd9375aqt1000snapdragon_210_processor_firmwaresc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformwsa8815_firmwaremdm9625msnapdragon_636_mobile_platform_firmwareapq8017sxr1120_firmwaremdm9235mmdm9630_firmwareqcm6125_firmwaresnapdragon_x5_lte_modemsnapdragon_855\+\/860_mobile_platform_firmwarerobotics_rb5_platform_firmwaresnapdragon_1100_wearable_platformsd865_5gqca6595qualcomm_205_mobile_platformsxr2130snapdragon_wear_4100\+_platformsmart_audio_400_platformqca6310_firmwareqca6574_firmwaresm7325p_firmwaresnapdragon_xr2_5g_platform_firmwareqca6574a_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformqrb5165msm7315snapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_7c_compute_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_auto_4g_modemsnapdragon_632_mobile_platform_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcs8250_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_712_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_8c_compute_platform_firmwareqca6564_firmwarewcn6740snapdragon_732g_mobile_platformqcs8550snapdragon_x50_5g_modem-rf_systemqcn6024qcs410_firmwaremdm9330snapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_wear_1300_platformsnapdragon_7c_compute_platformqts110_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwareqcs610315_5g_iot_modem_firmwareqca6431_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwarewcd9360_firmwarevision_intelligence_100_platform_firmwaresnapdragon_wear_2100_platform_firmwaresnapdragon_212_mobile_platformsa8150p_firmwareqcs2290snapdragon_x70_modem-rf_systemqca6335csra6620_firmwaresd_675_firmwarecsra6640_firmwareqam8295pmdm9628qca6574au_firmwaremdm9630snapdragon_778g\+_5g_mobile_platform_firmwaresa6155_firmwarewcd9375_firmwaremsm8909wwcd9360snapdragon_xr2\+_gen_1_platformsnapdragon_782g_mobile_platform_firmwaresnapdragon_427_mobile_platform_firmwaresmart_audio_400_platform_firmwarewcn3999qrb5165m_firmwareqca6698aqqcs6125sa4155p_firmwaresd662_firmwaresnapdragon_765g_5g_mobile_platformrobotics_rb3_platformsnapdragon_8\+_gen_1_mobile_platformsnapdragon_720g_mobile_platformsd626_firmwaresnapdragon_820_mobile_platformsnapdragon_780g_5g_mobile_platformhome_hub_100_platform_firmwareqca6436sa6155pwcn3660_firmwarewcd9341pm8937_firmwareqca6431snapdragon_x12_lte_modemwcn3910_firmwaresnapdragon_855_mobile_platform_firmwarerobotics_rb5_platformwsa8830_firmwaresd855_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresa8295p_firmwarewcn3610mdm9640msm8608qca8337_firmwarewcd9380_firmwarewcd9330msm8996au_firmwaresnapdragon_8cx_gen_2_5g_compute_platformmdm9225m_firmwareqca6564auqualcomm_215_mobile_platformsnapdragon_782g_mobile_platformsnapdragon_wear_4100\+_platform_firmwarefastconnect_6700mdm9230qca6174qca6430_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwaremdm9225_firmwareqca6320wcn3910mdm9650_firmwaresnapdragon_4_gen_1_mobile_platformqca6426_firmwaresm4450snapdragon_435_mobile_platformwcn3660b_firmwareqca9984snapdragon_670_mobile_platformwcn3680qcn9024snapdragon_xr2\+_gen_1_platform_firmwarewcd9330_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_820_automotive_platformqca6421_firmwaresmart_audio_200_platformvision_intelligence_100_platformsnapdragon_xr2_5g_platformar8031_firmwarewcn3680_firmware9206_lte_modem_firmwareqca6564a_firmwaresnapdragon_x24_lte_modemwsa8832qsm8250smart_display_200_platform_firmwaresnapdragon_730_mobile_platform9207_lte_modem_firmwareqcs4490qca6595_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwaresnapdragon_710_mobile_platform_firmwaresd888_firmwaresa8155psd675snapdragon_720g_mobile_platform_firmwarear8035_firmwareqcm2290snapdragon_632_mobile_platformsnapdragon_625_mobile_platform_firmwaresnapdragon_855_mobile_platformsnapdragon_wear_2100_platformsnapdragon_662_mobile_platform_firmwaresa8145p_firmwareqcs2290_firmwarecsra6620smart_display_200_platformsnapdragon_888_5g_mobile_platform_firmwaresnapdragon_450_mobile_platformqca6174_firmwaresd730_firmwarewcd9370snapdragon_480\+_5g_mobile_platform_firmwareqca6584au_firmwareapq8076_firmwaresd_8cx_firmwaresnapdragon_1200_wearable_platform_firmwaresd662qam8295p_firmwareapq8037snapdragon_435_mobile_platform_firmwarevision_intelligence_200_platformqca6320_firmwarewcn3680b_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_212_mobile_platform_firmwareqca6595auwcn3999_firmwaresnapdragon_425_mobile_platformsnapdragon_429_mobile_platformqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310pm8937snapdragon_x70_modem-rf_system_firmwareqcs6490snapdragon_x5_lte_modem_firmwareapq8084qcs8550_firmwaresnapdragon_625_mobile_platformvision_intelligence_300_platform_firmwaresa6145p_firmwaresm6250c-v2x_9150apq8017_firmwarewsa8810_firmwarevision_intelligence_400_platformsg4150pqca8081qca6174a_firmwaresnapdragon_wear_1300_platform_firmwarewcd9385snapdragon_x12_lte_modem_firmwaresnapdragon_665_mobile_platform_firmwarear8035apq8064auvision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewcn3620_firmwaresd820qcm6490wsa8835_firmwarewcn3620qca6564asa4150psg4150p_firmwareqcm2290_firmwaresnapdragon_626_mobile_platformsnapdragon_845_mobile_platformmdm9635m_firmwarewcn3990sd_675fastconnect_6800mdm9625m_firmwaresnapdragon_835_mobile_pc_platformqcn9012snapdragon_8c_compute_platformsd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresnapdragon_auto_5g_modem-rfsm6250psnapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_425_mobile_platform_firmwareqca6574aqca6174asm7325pmdm9635msd855sm4125_firmwaresdx57m_firmwaresnapdragon_439_mobile_platform_firmwarefastconnect_6200_firmwaremsm8209vision_intelligence_300_platformsd460qca6391snapdragon_710_mobile_platformfastconnect_7800aqt1000_firmwareqcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290qcn9011sd_455qca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformwcn3680bsd835_firmwaresnapdragon_675_mobile_platformsnapdragon_wear_2500_platform_firmwareqca6696msm8608_firmwaresa6150psnapdragon_1100_wearable_platform_firmwaresnapdragon_768g_5g_mobile_platformapq8037_firmwaresnapdragon_765_5g_mobile_platformsnapdragon_820_mobile_platform_firmwaresm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_wear_3100_platform_firmwareqcn9074_firmwaresnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-32837
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.51%
||
7 Day CHG~0.00%
Published-06 Nov, 2023 | 03:50
Updated-25 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In video, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08235273; Issue ID: ALPS08250357.

Action-Not Available
Vendor-Google LLCMediaTek Inc.
Product-mt6889mt6893mt8797mt8798mt6885androidmt6883MT6883, MT6885, MT6889, MT6893, MT8797, MT8798
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9462
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.17%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:39
Updated-19 Dec, 2024 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In store_cmd of ftm4_pdc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • ...
  • 21
  • 22
  • Next
Details not found