Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-45491

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-03 Feb, 2023 | 00:00
Updated At-26 Mar, 2025 | 18:31
Rejected At-
Credits

Buffer overflow vulnerability in function json_parse_value in sheredom json.h before commit 0825301a07cbf51653882bf2b153cc81fdadf41 (November 14, 2022) allows attackers to code arbitrary code and gain escalated privileges.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:03 Feb, 2023 | 00:00
Updated At:26 Mar, 2025 | 18:31
Rejected At:
â–¼CVE Numbering Authority (CNA)

Buffer overflow vulnerability in function json_parse_value in sheredom json.h before commit 0825301a07cbf51653882bf2b153cc81fdadf41 (November 14, 2022) allows attackers to code arbitrary code and gain escalated privileges.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/sheredom/json.h/issues/94
N/A
https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3j
N/A
Hyperlink: https://github.com/sheredom/json.h/issues/94
Resource: N/A
Hyperlink: https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3j
Resource: N/A
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/sheredom/json.h/issues/94
x_transferred
https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3j
x_transferred
Hyperlink: https://github.com/sheredom/json.h/issues/94
Resource:
x_transferred
Hyperlink: https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3j
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-787CWE-787 Out-of-bounds Write
CWECWE-122CWE-122 Heap-based Buffer Overflow
Type: CWE
CWE ID: CWE-787
Description: CWE-787 Out-of-bounds Write
Type: CWE
CWE ID: CWE-122
Description: CWE-122 Heap-based Buffer Overflow
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:03 Feb, 2023 | 21:15
Updated At:26 Mar, 2025 | 19:15

Buffer overflow vulnerability in function json_parse_value in sheredom json.h before commit 0825301a07cbf51653882bf2b153cc81fdadf41 (November 14, 2022) allows attackers to code arbitrary code and gain escalated privileges.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

json.h_project
json.h_project
>>json.h>>Versions before 2022-11-14(exclusive)
cpe:2.3:a:json.h_project:json.h:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE-122Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-787Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-787
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-122
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-787
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3jcve@mitre.org
Third Party Advisory
https://github.com/sheredom/json.h/issues/94cve@mitre.org
Third Party Advisory
https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3jaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/sheredom/json.h/issues/94af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3j
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/sheredom/json.h/issues/94
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3j
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://github.com/sheredom/json.h/issues/94
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1461Records found

CVE-2024-47670
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.15%
||
7 Day CHG~0.00%
Published-09 Oct, 2024 | 14:49
Updated-05 Jan, 2026 | 10:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ocfs2: add bounds checking to ocfs2_xattr_find_entry()

In the Linux kernel, the following vulnerability has been resolved: ocfs2: add bounds checking to ocfs2_xattr_find_entry() Add a paranoia check to make sure it doesn't stray beyond valid memory region containing ocfs2 xattr entries when scanning for a match. It will prevent out-of-bound access in case of crafted images.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0489
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.86%
||
7 Day CHG-0.00%
Published-11 Jun, 2021 | 16:42
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In memory management driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183464866

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-12980
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.55%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:49
Updated-17 Sep, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwareradeon_pro_softwarewindows_10AMD Radeon Software
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12895
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.55%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:56
Updated-16 Sep, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0574
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.94%
||
7 Day CHG-0.00%
Published-17 Aug, 2021 | 18:28
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In asf extractor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187234876

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-47797
Matching Score-4
Assigner-OpenHarmony
ShareView Details
Matching Score-4
Assigner-OpenHarmony
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.71%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 08:01
Updated-06 Nov, 2024 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Liteos_a has an out-of-bounds Write vulnerability

in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmony
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-47695
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.08%
||
7 Day CHG~0.00%
Published-21 Oct, 2024 | 11:53
Updated-03 Nov, 2025 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds

In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds In the function init_conns(), after the create_con() and create_cm() for loop if something fails. In the cleanup for loop after the destroy tag, we access out of bound memory because cid is set to clt_path->s.con_num. This commits resets the cid to clt_path->s.con_num - 1, to stay in bounds in the cleanup loop later.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-47012
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.75%
||
7 Day CHG+0.01%
Published-25 Oct, 2024 | 10:34
Updated-28 Oct, 2024 | 13:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In mm_GetMobileIdIndexForNsUpdate of mm_GmmPduCodec.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0493
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.86%
||
7 Day CHG-0.00%
Published-11 Jun, 2021 | 16:42
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In memory management driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183461317

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33877
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.06% / 16.96%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:37
Updated-03 Oct, 2024 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out-of-bounds write in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_450_fa_firmwarerealsense_450_faIntel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-47024
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-7.4||HIGH
EPSS-0.04% / 13.68%
||
7 Day CHG+0.01%
Published-25 Oct, 2024 | 10:34
Updated-28 Oct, 2024 | 18:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In vring_size of external/headers/include/virtio/virtio_ring.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-47137
Matching Score-4
Assigner-OpenHarmony
ShareView Details
Matching Score-4
Assigner-OpenHarmony
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.71%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 08:01
Updated-06 Nov, 2024 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Liteos_a has an out-of-bounds Write vulnerability

in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through out-of-bounds write.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmony
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0607
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.94%
||
7 Day CHG~0.00%
Published-22 Jun, 2021 | 11:13
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In iaxxx_calc_i2s_div of iaxxx-codec.c, there is a possible hardware port write with user controlled data due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-180950209

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0589
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.76%
||
7 Day CHG~0.00%
Published-14 Jul, 2021 | 13:45
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180939982

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-1028
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.16%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 18:06
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In setClientStateLocked of SurfaceFlinger.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-193034683

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33066
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.07% / 21.29%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 10:48
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Audio

Memory corruption in Audio while processing RT proxy port register driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwaresnapdragon_x20_lte_modemsd865_5gmdm9215_firmwaresnapdragon_632_mobileqca6595qca8081_firmwaresnapdragon_670_mobilesnapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilefastconnect_6700wcn3610mpq8064sa4150psnapdragon_427_mobile_firmwaresnapdragon_782g_mobile_firmwaresnapdragon_wear_4100\+_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395snapdragon_665_mobile_firmwaresc8180xp-aaabqca6574au_firmwareqca6564_firmware9207_lte_modem_firmwareqam8295pwcd9341sd626_firmwaresnapdragon_820_automotive205_mobilesnapdragon_888\+_5g_mobile_firmwaresnapdragon_x12_lte_modemwsa8810_firmwaresd730_firmwarewsa8845h_firmwaresnapdragon_212_mobilesc8180xp-acafwcn3660_firmwaresnapdragon_850_mobile_computesnapdragon_820_automotive_firmwarefastconnect_6800_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_678_mobile_firmwaremdm9625msnapdragon_425_mobilesnapdragon_632_mobile_firmwaremsm8108qsm8250_firmwarevideo_collaboration_vc1_platformwcn3660asnapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200qca6310wcd9360snapdragon_680_4g_mobilesa6155psnapdragon_212_mobile_firmwareqca6564au_firmwaresd820snapdragon_429_mobile_firmwaremdm8207video_collaboration_vc5_platform_firmwaresnapdragon_888_5g_mobile_firmwaresnapdragon_wear_2500snapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwaremdm9640_firmwaresd835snapdragon_x55_5g_modem-rfsnapdragon_4_gen_2_mobile_firmwareqca6436_firmwaresnapdragon_695_5g_mobile_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqts110sm4125_firmwaremsm8227_firmwareqca6420qca6174_firmwarewcn3910apq8064au_firmwaremdm9205s_firmwarecsrb31024qca9367mdm9250_firmwaresnapdragon_712_mobilewcn3660bqca6574awcn3620_firmwareqca6174aqca6584_firmwarewcd9340qcs8250_firmwaremdm9235mqcm2290snapdragon_auto_5g_modem-rf_gen_2snapdragon_835_mobile_pc_firmwaresm8550p_firmwareqcm8550snapdragon_x20_lte_modem_firmwaresnapdragon_765_5g_mobile_firmwarewcn3988apq8076qcn9024vision_intelligence_300_firmwaremdm8615mqca6574215_mobileqcs410apq8064_firmwareqcm2290_firmwarevision_intelligence_100mdm8215m_firmwarehome_hub_100sa8155psnapdragon_765g_5g_mobile_firmwaresmart_display_200_firmwaresnapdragon_wear_2100_firmwaresm8550pwsa8830sa6145psnapdragon_625_mobile_firmwaremdm8215mmdm8215msm8996ausnapdragon_4_gen_2_mobilesnapdragon_7c_compute_firmwareqrb5165m_firmwaresnapdragon_820_mobile_firmwarewcn3620snapdragon_208_processor_firmwaresnapdragon_865\+_5g_mobile_firmwaresnapdragon_x5_lte_modemsnapdragon_429_mobileapq8064auwcn3950_firmwareqrb5165nmdm9205sfastconnect_6200sm7325p_firmwaresd460wcd9360_firmwaresc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_660_mobile_firmwaremdm9615msnapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarerobotics_rb3_firmwaresd670_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobilesc8180xp-acaf_firmwareqcn6224_firmwarevision_intelligence_100_firmwareqca6431sd660_firmwaremdm9625snapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwareqca9379_firmwaresxr2130_firmwaremdm9225m_firmwaresnapdragon_860_mobile_firmwarear8035_firmwaresnapdragon_778g\+_5g_mobileqrb5165mqca6320sd888_firmwaremdm9215wcd9306qcs6125_firmwaresnapdragon_wear_1300_firmwareqcn9074wsa8815_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresnapdragon_665_mobilemsm8230sm7250p_firmwarewcn3680_firmwarewcn3999wcn3950snapdragon_730g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaremsm8227apq8037snapdragon_778g\+_5g_mobile_firmwaresa8295p_firmwaresmart_audio_400_firmwaresd_675_firmwaresnapdragon_855\+_firmwaresa4155p_firmwareqca9984snapdragon_720g_mobilesm7250pcsrb31024_firmwaresa8155sd_8cx_firmwaresc8180x-acafsd888sd460_firmwaresnapdragon_850_mobile_compute_firmwaresnapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobilear9374wcn3660a_firmwareqca6310_firmwaresd626fastconnect_6800qcs7230pm8937snapdragon_865_5g_mobile_firmwarewcd9371fastconnect_6900_firmwarerobotics_rb5_firmwaresmart_audio_200wcn2243snapdragon_1200_wearablesc8180x-aaab_firmwarevideo_collaboration_vc3_platform215_mobile_firmwareqca6431_firmware9205_lte_modem_firmwareqca6698aq_firmwareqcs2290qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615qca9367_firmwarewcn3999_firmwaremdm9615m_firmwarewcn3680qcs7230_firmwarewcd9390_firmwareqca6430mdm9650snapdragon_765_5g_mobilesnapdragon_860_mobilesc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_208_processorflight_rb5_5g_firmware9206_lte_modem_firmwaremsm8108_firmwaresnapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwaremsm8960sg_firmwarevideo_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresd855_firmwaremdm9225mdm9640qca6436qrb5165n_firmwaresnapdragon_x70_modem-rfsnapdragon_x24_lte_modem_firmwarewcd9335_firmwareqca6391_firmwarewcn3980_firmwarewsa8835wsa8840_firmwaremdm9310_firmwaremsm8930_firmwareqcs4290_firmwaresnapdragon_430_mobile_firmwarecsra6620qca8081apq8084mdm9628sd660wsa8815qca9377snapdragon_439_mobile_firmwareqcm4290_firmwarempq8064_firmwaresnapdragon_720g_mobile_firmwarewcn2243_firmwaremdm9635mmdm9635m_firmwaresnapdragon_710_mobilemdm9615_firmwaresg4150p_firmwarecsra6620_firmwareqcs8550mdm8215_firmwaresnapdragon_626_mobilesd865_5g_firmwaresnapdragon_xr1wcd9375apq8076_firmwaresnapdragon_636_mobilesa8145psd_675snapdragon_8\+_gen_1_mobile_firmwaresmart_display_200ar6003_firmwarewcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwaresnapdragon_wear_3100_firmwareqcm8550_firmwareapq8017qcs410_firmwarerobotics_rb3sa6150p_firmwaresxr1120qcs610_firmwarewcd9335wcd9370snapdragon_7c_gen_2_compute_firmwaremsm8230_firmwareqca4004qca6696wcd9341_firmwarewcn6740_firmwaresnapdragon_780g_5g_mobilesnapdragon_750g_5g_mobileqca9984_firmwaresnapdragon_685_4g_mobilevision_intelligence_200_firmwaresnapdragon_x50_5g_modem-rf_firmwaremsm8930snapdragon_auto_4g_modem9205_lte_modemsnapdragon_690_5g_mobile_firmwareqsc1215snapdragon_wear_1300qca6574auwcd9390pm8937_firmwarecsra6640msm8209_firmwaresnapdragon_778g_5g_mobile_firmwarewcn3660b_firmwaresd730snapdragon_690_5g_mobile9207_lte_modemqcn6024_firmwaremsm8627_firmwaresnapdragon_636_mobile_firmwaresnapdragon_712_mobile_firmwaresnapdragon_625_mobilesnapdragon_210_processor_firmwareqcm6125_firmwarec-v2x_9150qcc710snapdragon_1100_wearable_firmwaresnapdragon_xr2_5g_firmwaremdm9615snapdragon_xr1_firmwaresxr1120_firmwaresnapdragon_x5_lte_modem_firmwaresnapdragon_wear_4100\+315_5g_iot_modem_firmwarefastconnect_6900qfw7114315_5g_iot_modemmsm8960_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_730_mobilesnapdragon_wear_3100mdm9250wsa8845msm8630snapdragon_626_mobile_firmwareqca6421_firmwareqcm6125mdm9230sc8180x-adwsa8810qsm8250qca6595ausnapdragon_888_5g_mobilesm7315_firmwarewcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840mdm9230_firmwareqcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwareqcn9012qsc1215_firmwaremdm9650_firmwarewcd9371_firmwareqcs4490_firmwarewcn3910_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobilewcd9370_firmwaresnapdragon_8\+_gen_2_mobilesa8195pmdm9310snapdragon_1200_wearable_firmwareqca6335_firmwareqcm6490snapdragon_662_mobilemsm8627qca9379msm8960sgsd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaremsm8130_firmwareqcn9011smart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326sa8155p_firmwaresnapdragon_630_mobileqca6564asnapdragon_855\+snapdragon_wear_2100qcn9074_firmwaresnapdragon_768g_5g_mobile_firmwaresnapdragon_7c_gen_2_computesc8180x\+sdx55_firmwarear8035qca6564sa6155qcn6224snapdragon_435_mobile_firmwaresc8180x\+sdx55qca6698aqsm6250apq8064snapdragon_480\+_5g_mobilesd670wcn3680bapq8030sa8145p_firmwaresa8150p_firmwarefastconnect_6700_firmwarewcn3990snapdragon_x75_5g_modem-rf_firmwareqcs6490qcs8250snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarehome_hub_100_firmwaresnapdragon_460_mobile_firmwarewsa8830_firmwarewsa8845_firmwarewsa8832mdm9330_firmwaresnapdragon_auto_4g_modem_firmwaremsm8960sc8180xp-aaab_firmwaremdm9630205_mobile_firmwaresa4150p_firmwaremsm8608_firmwaremsm8209qca6564ausnapdragon_1100_wearablesnapdragon_820_mobilesnapdragon_425_mobile_firmwaresm6250p_firmwaresc8180xp-adar6003sa8195p_firmwareqcm4290sd_455_firmwaremsm8608ar8031mdm9225_firmwareqca9377_firmwareqcm6490_firmwaresg8275p_firmwaresnapdragon_xr2\+_gen_1sm4125mdm9235m_firmwareqcm4490_firmwarevision_intelligence_400_firmwareqcs6125flight_rb5_5gsnapdragon_870_5g_mobile_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobileqca4004_firmwaresnapdragon_870_5g_mobilesmart_audio_200_firmwaresnapdragon_678_mobilesd_455sm6250_firmwaresc8180x-ad_firmwaresnapdragon_7c_computeqca6584auqca6320_firmwareqcn6274_firmwaresnapdragon_435_mobileqcn9011_firmwaresnapdragon_wear_2500_firmwarewcn6740snapdragon_780g_5g_mobile_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwareqfw7114_firmwaremdm9625m_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilemdm9630_firmwareapq8017_firmwarewcd9380sa6145p_firmwaresa6155_firmwaresnapdragon_450_mobile_firmwaresnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresc8180x-aaabsd662_firmwarewcn3660aqt1000wcd9306_firmwaresnapdragon_4_gen_1_mobile_firmwarec-v2x_9150_firmwareqam8295p_firmwaresd855wcd9330_firmwareqca6174wcn3990_firmwaresm7315snapdragon_660_mobileqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobilemsm8909w_firmwaresnapdragon_8_gen_1_mobilesnapdragon_630_mobile_firmwarewcd9330mdm8207_firmwaresd662snapdragon_680_4g_mobile_firmwarewcn3610_firmwareqcs4290snapdragon_865\+_5g_mobilesd820_firmwaresg8275psm6250psdx55_firmwareapq8030_firmwarewcn3615_firmwaresnapdragon_210_processorsxr2130qcm4490snapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfapq8037_firmwaresnapdragon_670_mobile_firmwareaqt1000_firmwaresdm429wqca6584au_firmwareqcn6274qfw7124qca6595au_firmwareqca6696_firmwaremsm8130wcd9380_firmwaremdm9625_firmwareapq8084_firmwareqca6574_firmwaresg4150pmdm9628_firmwaresnapdragon_x75_5g_modem-rfsnapdragon_427_mobile9206_lte_modemqca6574a_firmwaremsm8630_firmwaresdx55mdm9225msnapdragon_4_gen_1_mobilesnapdragon_450_mobilesnapdragon_865_5g_mobilesnapdragon_835_mobile_pcsd675wcd9375_firmwareqca6391ar9374_firmwareqts110_firmwareqcn9012_firmwaresnapdragon_439_mobileqca6584sa8295pfastconnect_7800snapdragon_8\+_gen_2_mobile_firmwarevision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmwaresnapdragon_430_mobilemdm8615m_firmwaresd_8cxvision_intelligence_400wsa8835_firmwarewcn3980mdm9330msm8909wqcs610Snapdragonqca6574a_firmwarequalcomm_video_collaboration_vc1_platform_firmwaremdm9628_firmwareqcs4490_firmwaresd_455_firmwareqca6431_firmwareflight_rb5_5g_platform_firmwaremsm8960_firmwaresa8150p_firmwareqcn9024_firmwareqcs7230_firmwarear6003_firmwarequalcomm_video_collaboration_vc5_platform_firmwarefastconnect_6700_firmwareqcm6490_firmwaremdm9250_firmwaresa8155p_firmwarefastconnect_6200_firmwaremsm8909w_firmwaresa4155p_firmwareapq8030_firmwareqcn6224_firmwareqca6420_firmwarecsrb31024_firmwaresa6155_firmware9206_lte_modem_firmwarempq8064_firmwareqca9377_firmwaremdm9625_firmwaremsm8230_firmwareqca6698aq_firmwareqsc1215_firmwareqca8081_firmwareqca9367_firmwaremsm8627_firmwarefastconnect_7800_firmwarecsra6640_firmwaremdm8215_firmwareqcm8550_firmwareqca6174_firmwarecsra6620_firmwaresa8155_firmwareqcn6024_firmwareqca6436_firmwareqca6595_firmwareqcn6274_firmwareqcn9011_firmwaremdm9650_firmwarec-v2x_9150_firmware9207_lte_modem_firmwareqsm8250_firmwaremdm9615_firmwareqca6564a_firmwaremsm8960sg_firmwaremdm8615m_firmwareqca6335_firmwareqrb5165n_firmwaremsm8108_firmwaresa8195p_firmwareqcn9012_firmwaresd_8cx_firmwarear8035_firmware315_5g_iot_modem_firmwarefastconnect_6800_firmwaremsm8608_firmwareqcs6125_firmwaremdm9640_firmwaremsm8209_firmwaremdm9310_firmwareqcc710_firmwaremdm9615m_firmwareqca6574au_firmwareapq8017_firmwaresa6155p_firmwareqcn9074_firmwareqcs8550_firmwaremdm9635m_firmwaremdm9230_firmwareqca6564au_firmwareqca6564_firmwaremsm8227_firmwareqcm6125_firmwareqca6696_firmwareapq8064au_firmwareqca8337_firmwareqca6584_firmwareqca6595au_firmwareaqt1000_firmwaremsm8630_firmwareqcs6490_firmwaremsm8930_firmwarepm8937_firmwaresa6145p_firmwaresa8295p_firmwaresa4150p_firmwarequalcomm_205_mobile_platform_firmwaresa6150p_firmwaremdm9225m_firmwareqca6174a_firmwareqfw7124_firmwaremsm8130_firmwareqca6391_firmwaremdm9205s_firmwarefastconnect_6900_firmwaremdm9235m_firmwareqca6584au_firmwarerobotics_rb3_platform_firmwareqfw7114_firmwaremdm9330_firmwaremsm8996au_firmwareqam8295p_firmwareqca6320_firmwareqca6574_firmwaremdm9215_firmwareqca9984_firmwaresd_675_firmwareapq8084_firmwareapq8064_firmwaresa8145p_firmwaresd460_firmwarear8031_firmwaremdm8207_firmwaremdm9630_firmwareqcm4490_firmwarequalcomm_215_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc3_platform_firmwarerobotics_rb5_platform_firmwareqcs4290_firmwareqcs610_firmwarehome_hub_100_platform_firmwareqcs2290_firmwaremdm9625m_firmwareapq8037_firmwaremdm9225_firmwareqca9379_firmwareqrb5165m_firmwareqca6430_firmware9205_lte_modem_firmwarear9374_firmwareapq8076_firmwaremdm8215m_firmwareqca6426_firmwareqca6421_firmwareqcs410_firmwareqts110_firmwareqca6310_firmwareqcm4290_firmwareqca4004_firmwareqcs8250_firmware
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2021-0640
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.55%
||
7 Day CHG~0.00%
Published-17 Aug, 2021 | 18:28
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In noteAtomLogged of StatsdStats.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-187957589

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0577
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.13%
||
7 Day CHG~0.00%
Published-14 Jul, 2021 | 13:46
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In flv extractor, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187161771

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33030
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.65%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-03 Jun, 2025 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input in HLOS

Memory corruption in HLOS while running playready use-case.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaremdm9640_firmwaresm6250p_firmwareqca8337qam8775psnapdragon_888_5g_mobile_platformwcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155snapdragon_427_mobile_platformsnapdragon_480_5g_mobile_platformsd_455_firmwarehome_hub_100_platformsnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwaremsm8108wcd9371_firmwaremsm8108_firmwarewcn3950qcn6024_firmwaresm4125qsw8573_firmwarewcn3660bqsm8350_firmwaresnapdragon_460_mobile_platformqsm8350sd460_firmwaresnapdragon_660_mobile_platform_firmwaresm7315_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_636_mobile_platformqca8081_firmwareqca6420snapdragon_auto_5g_modem-rf_firmwareqca9367_firmwaremdm8207sa8155_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqca6430snapdragon_630_mobile_platformsnapdragon_678_mobile_platform_firmwareqts110wcd9306_firmwarewcd9340snapdragon_8cx_compute_platformvision_intelligence_200_platform_firmwaresnapdragon_765_5g_mobile_platform_firmwareqca6698aq_firmwaremsm8209_firmwaresnapdragon_690_5g_mobile_platformmdm9250_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_wear_2500_platformqca6696_firmwarewcd9371sd_8cxsa8150psnapdragon_430_mobile_platformqca4004sd660sd865_5g_firmwaresd660_firmwareqcn5121snapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwareqcn5022_firmwareqcn7606_firmwaresnapdragon_7c_gen_2_compute_platform_firmwaresnapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwaressg2125psdm429w9205_lte_modemsnapdragon_670_mobile_platform_firmwaresd670_firmwareqca6574csr8811_firmwaresnapdragon_7c\+_gen_3_computewcd9380qcs410snapdragon_210_processorsnapdragon_430_mobile_platform_firmwareqca9379_firmwaresxr1230pc-v2x_9150_firmwareqcn9012_firmwaresd626ipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815snapdragon_865\+_5g_mobile_platformqca6584_firmwaresnapdragon_630_mobile_platform_firmwareqcs8250ipq6028sd835snapdragon_821_mobile_platformwcn3980_firmwaresd730sa8295p9205_lte_modem_firmwarewcn6740_firmwaresnapdragon_8cx_compute_platform_firmwareqcs4490_firmwaresnapdragon_x65_5g_modem-rf_systemapq8064au_firmwarefastconnect_6900qca6234fastconnect_6900_firmwaresnapdragon_660_mobile_platformsd670smart_audio_200_platform_firmwareqcn9024_firmwaresdx57mqcm4290_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqualcomm_215_mobile_platform_firmwarear8031mdm8207_firmwaresnapdragon_750g_5g_mobile_platformsd820_firmwareqca6391_firmwaresa4150p_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640snapdragon_695_5g_mobile_platformssg2115p_firmwaresnapdragon_1200_wearable_platformwcn3660qca9379qam8255psa4155pqca6234_firmwareqsm8250_firmwareqcn7606snapdragon_480\+_5g_mobile_platformwsa8830sxr2230p_firmware9207_lte_modemsnapdragon_850_mobile_compute_platformsnapdragon_x24_lte_modem_firmwareqam8650pcsrb31024mdm9628_firmwareflight_rb5_5g_platformmdm9650snapdragon_865_5g_mobile_platformflight_rb5_5g_platform_firmwareqcs4290mdm9250qca6420_firmwaresnapdragon_450_mobile_platform_firmwaresnapdragon_auto_4g_modem_firmwaresd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9984_firmwareqca9377wcd9385_firmwarewcd9326_firmwarefastconnect_6200wcn3615_firmwaresnapdragon_7c_gen_2_compute_platformqcn9011_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6584snapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwaresnapdragon_208_processor_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqrb5165nwcd9306qca6584ausnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformsnapdragon_208_processorsnapdragon_439_mobile_platformqcn50529206_lte_modemqca9367snapdragon_wear_3100_platformwcn3988_firmware315_5g_iot_modemqcn9074qca6421fastconnect_6700_firmwaresa8195psxr1120snapdragon_626_mobile_platform_firmwarewcd9326wcd9335qcm4490qcn6023snapdragon_888\+_5g_mobile_platformqcs4290_firmwaresxr2130_firmwareqcs6490_firmwarewcd9375aqt1000snapdragon_210_processor_firmwaresc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformwsa8815_firmwaresnapdragon_636_mobile_platform_firmwareapq8017sxr1120_firmwareqcm6125_firmwaresnapdragon_x5_lte_modemsnapdragon_855\+\/860_mobile_platform_firmwarerobotics_rb5_platform_firmwaresnapdragon_1100_wearable_platformsd865_5gqca6595qualcomm_205_mobile_platformsxr1230p_firmwaresa8540p_firmwareqca8075_firmwaresxr2130snapdragon_wear_4100\+_platformsmart_audio_400_platformipq6005_firmwareqca6310_firmwaresa9000pqca6574_firmwaresm7325p_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwareqca6574a_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformqrb5165msm7315snapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwaresnapdragon_7c_compute_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_auto_4g_modemsnapdragon_632_mobile_platform_firmwarecsrb31024_firmwareqcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwareipq6028_firmwareqcn5122qcs8250_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_712_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwareqcn5022snapdragon_8c_compute_platform_firmwareqca6564_firmwarewcn6740snapdragon_732g_mobile_platformqcs8550snapdragon_x50_5g_modem-rf_systemqca8075qcn6024qcn9022ipq6000_firmwareqcs410_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_wear_1300_platformsnapdragon_7c_compute_platformqts110_firmwareqam8255p_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwareqcs610315_5g_iot_modem_firmwareqca6431_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwarewcd9360_firmwarevision_intelligence_100_platform_firmwareqca4024_firmwaresnapdragon_wear_2100_platform_firmwaresnapdragon_212_mobile_platformsa8150p_firmwareqcs2290snapdragon_x70_modem-rf_systemqca6335csra6620_firmwaresd_675_firmwarecsra6640_firmwareqam8295pmdm9628sd_8_gen1_5g_firmwareqca6574au_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresa6155_firmwarewcd9375_firmwaremsm8909wwcd9360snapdragon_xr2\+_gen_1_platformsnapdragon_782g_mobile_platform_firmwaresnapdragon_427_mobile_platform_firmwaresmart_audio_400_platform_firmwarewcn3999qrb5165m_firmwareqca6698aqqcs6125sa4155p_firmwareipq6010sd662_firmwaresnapdragon_765g_5g_mobile_platformrobotics_rb3_platformsnapdragon_8\+_gen_1_mobile_platformsnapdragon_720g_mobile_platformsd626_firmwaresnapdragon_820_mobile_platformsnapdragon_780g_5g_mobile_platformhome_hub_100_platform_firmwarefsm10056_firmwareqca6436sw5100sa6155pwcn3660_firmwarewcd9341qam8775p_firmwaresa8255ppm8937_firmwareqca6431snapdragon_x12_lte_modemqca6797aqwcn3910_firmwaresnapdragon_855_mobile_platform_firmwarerobotics_rb5_platformwsa8830_firmwaresd855_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3988snapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresa8295p_firmwarewcn3610msm8608mdm9640qca8337_firmwarewcd9380_firmwaresw5100pmsm8996au_firmwaresnapdragon_8cx_gen_2_5g_compute_platformwcd9330snapdragon_w5\+_gen_1_wearable_platformqca6564auqualcomm_215_mobile_platformqet4101_firmwaresnapdragon_782g_mobile_platformsnapdragon_wear_4100\+_platform_firmwarefastconnect_6700qca8072_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwareqsw8573wcn3910qca6320mdm9650_firmwaresnapdragon_4_gen_1_mobile_platformqca6426_firmwaresm4450snapdragon_435_mobile_platformwcn3660b_firmwareqca9984snapdragon_670_mobile_platformwcn3680qcn9024snapdragon_xr2\+_gen_1_platform_firmwarewcd9330_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_820_automotive_platformqca6421_firmwaresmart_audio_200_platformsd821_firmwarevision_intelligence_100_platformsnapdragon_xr2_5g_platformar8031_firmwarewcn3680_firmware9206_lte_modem_firmwareqca6797aq_firmwareqca6564a_firmwaresnapdragon_x24_lte_modemqcn5121_firmwarewsa8832sa8540psnapdragon_8cx_gen_3_compute_platformqsm8250smart_display_200_platform_firmwareipq6018snapdragon_730_mobile_platform9207_lte_modem_firmwareqcs4490qca6595_firmwaresa8145psnapdragon_888\+_5g_mobile_platform_firmwaresnapdragon_710_mobile_platform_firmwaresd888_firmwaresa8155psd675qet4101qcs8155_firmwaresnapdragon_720g_mobile_platform_firmwarear8035_firmwareqcm2290snapdragon_632_mobile_platformsnapdragon_625_mobile_platform_firmwaresnapdragon_855_mobile_platformsnapdragon_wear_2100_platformsnapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwareqcs2290_firmwarefsm10056csra6620qcn9072smart_display_200_platformsnapdragon_888_5g_mobile_platform_firmwaresnapdragon_450_mobile_platformipq6000sd730_firmwarewcd9370ssg2115pqcn5152_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6584au_firmwareqcn9000_firmwaresd_8cx_firmwaresnapdragon_1200_wearable_platform_firmwaresd662qam8295p_firmwareapq8037snapdragon_435_mobile_platform_firmwarevision_intelligence_200_platformsa9000p_firmwareqca6320_firmwarewcn3680b_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_212_mobile_platform_firmwareqca6595auwcn3999_firmwaresnapdragon_425_mobile_platformsnapdragon_429_mobile_platformqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310snapdragon_821_mobile_platform_firmwareqcs8155pm8937snapdragon_x70_modem-rf_system_firmwareqcs6490snapdragon_x5_lte_modem_firmwaresnapdragon_625_mobile_platformqcs8550_firmwaresd821vision_intelligence_300_platform_firmwaresa6145p_firmwaresm6250c-v2x_9150apq8017_firmwarewsa8810_firmwarevision_intelligence_400_platformsnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresg4150pqca8081qca6174a_firmwaresnapdragon_wear_1300_platform_firmwarewcd9385snapdragon_x12_lte_modem_firmwaresnapdragon_665_mobile_platform_firmwarear8035csr8811apq8064auvision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewcn3620_firmwaresd820qcm6490wsa8835_firmwarewcn3620qca6564asa4150psg4150p_firmwareqcm4325qca8072qcm2290_firmwaresnapdragon_626_mobile_platformsnapdragon_845_mobile_platformwcn3990qcn9000sd_675fastconnect_6800snapdragon_835_mobile_pc_platformqcn9012snapdragon_8c_compute_platformsd888msm8909w_firmwarewsa8835msm8996ausdm429w_firmwaresnapdragon_auto_5g_modem-rfsd_8_gen1_5gsm6250psnapdragon_678_mobile_platformsnapdragon_855\+\/860_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaressg2125p_firmwaresnapdragon_425_mobile_platform_firmwareqca6574aqca6174asm7325psd855sm4125_firmwaresdx57m_firmwaresnapdragon_439_mobile_platform_firmwarefastconnect_6200_firmwareqcn5021qcn5152msm8209vision_intelligence_300_platformsd460qca6391snapdragon_710_mobile_platformfastconnect_7800aqt1000_firmwareipq6005qcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290qcn9011sd_455qca6574ausa8155p_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125wsa8810snapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_ar2_gen_1_platformwcn3680bsd835_firmwareqam8650p_firmwaresnapdragon_675_mobile_platformipq6010_firmwaresnapdragon_wear_2500_platform_firmwareqca6696msm8608_firmwaresa6150psnapdragon_1100_wearable_platform_firmwareqcn9022_firmwaresnapdragon_768g_5g_mobile_platformapq8037_firmwaresnapdragon_765_5g_mobile_platformqcn9072_firmwaresnapdragon_820_mobile_platform_firmwaresm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_wear_3100_platform_firmwaresw5100_firmwareqcn9074_firmwaresnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-11204
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.54%
||
7 Day CHG~0.00%
Published-22 Feb, 2021 | 06:25
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption and information leakage in sub-system due to lack of check for validity and boundary compliance for parameters that are read from shared MSG RAM in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qfe2080fc_firmwareqca9377_firmwareqpm5679_firmwarepmd9607_firmwareqfs2530qpm8870_firmwareqln1030pm6125mdm9645wcn3950_firmwarepm8150aqdm5670qpm5541_firmwareqpa5581_firmwareqpa8821qcs6125_firmwarepm456_firmwaremsm8108sa415mwcn3998wcd9371_firmwaremsm8108_firmwarewcn3950mdm9206_firmwareqsw8573_firmwarewcn3660bsd450_firmwareqsm8350_firmwareqsm8350smb2351_firmwarepm855pwtr4605_firmwarepm6150aqca9367_firmwareipq8072_firmwaresa8155_firmwareqca4004_firmwareqat3522qfe4455fcpmr735asdm830_firmwaresd765gsdr660qfe1045_firmwareqfe3345qfs2630_firmwaresdr865mdm9250_firmwareqdm5620_firmwaresmr545qca6696_firmwareqln5020pmm855au_firmwaresa8150pqfe3340sd660sd712pm640p_firmwareqcn5121wcn6750_firmwarepm6150lsd450sd8885gpm855l_firmwareqca6428_firmwareqtc410sqfe3335_firmwareqpa8801ipq8078qat5533_firmwareipq8173sdx55m_firmwareqpa8673_firmwaresd670_firmwaresd632_firmwareqfs2630pmm8996auqpm5579_firmwaresmb1380_firmwareqfe4309_firmwarepmk8350_firmwareqcn5024pm855p_firmwaresmb1381pm7250wtr4905sdx24_firmwareqcn9012_firmwaresd439_firmwareqdm2301qfe2101_firmwareqdm5621_firmwareqpm6375msm8937_firmwareipq6028pmp8074qca1990wcn3980_firmwaresd730qfe3320_firmwarepm8008pm8350b_firmwarepme605_firmwarewtr1605l_firmwarepme605apq8064au_firmwareipq8078_firmwareqcn5054qln1021aq_firmwareqcs603qln4640_firmwareqpm6582qcn9024_firmwareqfe4303qcs610_firmwareapq8084_firmwarepm215ar8031wtr2965qca6391_firmwarepmx20_firmwareqca4024pmi8937_firmwareqat3516_firmwareapq8053qcn5021_firmwarewcn3660qca9379pm855bsmb2351qsm8250_firmwaremdm9150_firmwareqpa5581qfe1040_firmwarecsrb31024mdm9628_firmwaremdm9650fsm10055_firmwareqbt1500_firmwareqpm5870_firmwarepmk8001qcs4290qet6100smb1394_firmwareapq8009_firmwaremsm8916_firmwaresd675_firmwareipq8072qca6426qca9984_firmwareqca9377qpm5641qpa5373_firmwarewtr2955rgr7640au_firmwarepm7250_firmwareqdm5620ipq8074aqcn5122_firmwareqat5533qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqsm7250_firmwaremdm9207qpm6670pm7150l_firmwareqca6584aupm855pm8250qcn5052mdm9607_firmwaremdm9655_firmwareqfs2530_firmwaresa415m_firmwareqat3519_firmwareqpm5677qat5515qcs4290_firmwareqtc800h_firmwarepmk7350_firmwareqpm5620sd750g_firmwareaqt1000sm6250_firmwarepmm8195auqln4642ipq5010_firmwareipq8074a_firmwarewsa8815_firmwarepmi8937smr525_firmwareqpm8820_firmwareqfe4301_firmwareapq8017qpm6621_firmwarewtr2955_firmwareqbt1000_firmwarepm8019qca6595smb1398_firmwarepm8150cpmr735bsd665_firmwareqcn5154qpm5577_firmwareqdm5679_firmwareqca6310_firmwarepm6150l_firmwareqca6574_firmwaresd665pm6150a_firmwarepmd9607sd8c_firmwarewtr2965_firmwarecsrb31024_firmwareqfs2608qcn9070_firmwareqln1036aqipq6028_firmwareipq8072a_firmwarepmi8940_firmwaresc8180x_firmwareqca9889_firmwaresd710mdm9607mdm9645_firmwareqln1035bd_firmwaresdx20m_firmwarepmw3100qca6564_firmwarewcn6740smb1350_firmwarepmk8002apq8096au_firmwareqcn9022sdm830smb1357qpa5580qpm5579fsm10055qfe2550qcn5550qdm2307qca6431_firmwareqpa8802wcd9360_firmwareqpm6585_firmwareqat3519qbt2000_firmwareipq8078asa8150p_firmwaresdr8250_firmwareqcn5064csra6620_firmwareqln1020csra6640_firmwarepmc1000hqat3518smr526_firmwareipq8076apm640a_firmwarewgr7640_firmwareqca4020qca6428qdm5652qcn5164_firmwareipq8071sa6155_firmwarewcd9360sdx20mqca6438_firmwareqpa8675_firmwareqpa5460_firmwarewcn3999pm8940_firmwareqsm7250pm8996apq8016_firmwareipq6010sd662_firmwareqdm2308_firmwareqca4020_firmwareqca6436wcn6851sa6155pqcs603_firmwarepmc7180wcn3660_firmwarepmi8952mdm9655qca6431qfe4320_firmwarewcn3910_firmwaresd855_firmwareqdm5650qfe2080fcsdr052sa8195p_firmwaresmb1390msm8208_firmwaremsm8608qpa8686_firmwarewcd9380_firmwarepm8350bhs_firmwarewgr7640qat5568qpa8801_firmwareqdm5671_firmwaresd636qtm527_firmwarepm8005_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwarepm8996_firmwarear8151smr526qca8072_firmwareqca6430_firmwarepmk8003qtc801s_firmwarewcn3980qat3522_firmwareqsw8573qcs605qbt1000sd7cwcn3910smb1394qca6426_firmwarepm8350_firmwarepm8009qfe4373fcmsm8953qat3518_firmwarepmi8998qfe2520sd821_firmwarear8031_firmwarepm855lqfe4302pm8150b_firmwaresmr545_firmwareqca6694au_firmwarepm670sd210_firmwarepm8005qdm2302sdxr1apq8096auqcs405_firmwarepmi8996_firmwareqln4650_firmwareqet5100msd439qat3516qpm5658ar8035_firmwareqcm2290qpm5658_firmwareqcn5024_firmwarewcn3991_firmwareqdm5652_firmwareqfe4465fcqcn9070fsm10056pmi632pm8350bh_firmwarepmr735b_firmwaresmb1360_firmwarepm670l_firmwaresdr660gqfe2340sd455sd730_firmwarewcd9370sdr425qcn9000_firmwareipq5018ar8151_firmwareqpm5541qat5516qfe4308qcn5124_firmwarepm8350bhapq8037qca6320_firmwarewcn3680b_firmwareqca6595auipq5010qdm2305sa6155p_firmwareqca6310pm8937qpm2630smb1398sa6145p_firmwaresdr675ipq8071aipq8071a_firmwarewcd9385qat3550_firmwareqln5040_firmwarepm4125_firmwarear8035pm8019_firmwareapq8064auqca6694_firmwareqdm2310qfe2550_firmwareqcn9100_firmwareqln5030_firmwaresda429wwcn3620_firmwaresd820smb1396_firmwarewcn3620smr546pmx24qln5040qca8072qpm8895sdr845qtm527qfe3440fc_firmwarepmk8350qdm3302_firmwarepmc7180_firmwaremsm8996auqfe1035qpm5657_firmwarepmi8940sm6250pqln1035bdpm855asdr660_firmwarepm8909_firmwareqca6574aqfe4303_firmwareqpm4640qet5100m_firmwareipq8076_firmwaremdm9205qpm4650sa515msd8cxqfe4305ipq8076sdr865_firmwareqfe4465fc_firmwarepm8250_firmwaresd460qca6391sdxr1_firmwarepm215_firmwaremsm8920pm660asdx50mpm640apm8916pmd9655auqdm4650ipq8074_firmwareqca6574ausa8155p_firmwaresd205_firmwareqsw6310qcm6125qpm2630_firmwaresmb231_firmwareqdm2308qat3550wcn6856sd835_firmwareqtc800s_firmwaresa6150pqcn9022_firmwareqpa8688_firmwareapq8037_firmwareipq8070apmm8195au_firmwareqcn9072_firmwaresm7250psd720g_firmwareqpm4621_firmwaresd850qln4640sd636_firmwareqfs2580mdm9640_firmwaresm6250p_firmwareqfe4455fc_firmwareqca8337qdm5579ipq8173_firmwareqfs2608_firmwareqpa8688qcn5124qat5522_firmwareqca6595au_firmwaresa6155pm7150lpm8998_firmwarewtr5975_firmwareqpa5580_firmwareqcn6024_firmwaresd720gsm4125wtr1605qfe4320qcc112qsw8574_firmwaresd460_firmwarepm8953_firmwaresd6905gqpa4360_firmwareqca8081_firmwareqfe2520_firmwarewcn3998_firmwareqca6420apq8053_firmwareqpm6670_firmwareipq8070_firmwareipq8078a_firmwaremdm8207pm660_firmwarepm8150bqfe2101qca6430wcd9306_firmwarewcd9340msm8209_firmwaresmb1358qca9888_firmwarewcd9371smb1350qcn5154_firmwaresm4350_firmwarewtr3950pm6350qdm5621qtc800sqca4004qat3514_firmwaresd660_firmwareqcn5022_firmwareqat5516_firmwarewcn3991sdm429wpm8150l_firmwaresdxr25gpm6150smb1354_firmwareqca6574qpa8842csr8811_firmwaresdr052_firmwarewcd9380qualcomm215qcs410qfe3100_firmwareqca9379_firmwareqpa8803sdxr25g_firmwarepmd9645ipq6018_firmwarewcd9340_firmwarewsa8815wcn6850pmp8074_firmwareqdm2301_firmwaresd835pm660l_firmwarepm6250_firmwarewcn6740_firmwareqtm525_firmwareqcn5064_firmwareqpm5621_firmwareqca6234rsw8577qpa6560_firmwareqpa8802_firmwareqfe4308_firmwareqpm5621sd670ipq8174_firmwarepm8009_firmwareqfs2580_firmwareqcm4290_firmwarepm8150lpmi8998_firmwaresa6145ppm660a_firmwaresdr105pm4250qpm5577mdm8207_firmwaresdm630_firmwaremdm9205_firmwaresd820_firmwarepm8150wcd9370_firmwaresdx55csra6640pm8350bhsqat3555_firmwarepmi8994qpa8803_firmwareqca6234_firmwareqln1031qpm5870pm8909qfe1040wsa8830pm660qet6110_firmwareqdm5579_firmwareqpm6325pm6125_firmwareqbt1500qfe2340_firmwarepmx24_firmwarepmm855aumdm9250qca6420_firmwaresmb1396pm7150apm8350qca6564qpa4361_firmwarepm8350c_firmwareqpa5461_firmwarewcn3990_firmwarewcd9385_firmwareqdm5650_firmwareqpa4340_firmwarewcd9326_firmwarewhs9410wcn3615_firmwaresdr845_firmwareqln1021aqsmb1380pmk8002_firmwareqsw6310_firmwaresa8155qln1031_firmwareqdm4650_firmwaresdx55_firmwarepmm6155au_firmwarewcn3615pm8940wcd9306msm8208qpm4641qat5515_firmwareipq8174qpm8830_firmwaresd429qca9367qfe2082fc_firmwaresdm630qdm4643wcn3988_firmwarepmx55qpm4641_firmwareqcn9074sd205sd429_firmwarepm8150c_firmwareqca6421qdm3301qpa8842_firmwaresa8195psdr735_firmwarepm8953qca6694qat3514wcd9326wcd9335pm6350_firmwareqcn6023pm8004_firmwaresdr8150_firmwarepm439qpm4630qca6390wcd9375msm8917_firmwareqpm5677_firmwaresdx20_firmwarewtr3925_firmwarepm8998pmk7350msm8916qcc112_firmwareqln1020_firmwarepm670a_firmwareqcm6125_firmwarepmx55_firmwareqfe4373fc_firmwarepm8150_firmwareqpm8830pmm8996au_firmwareqat5522qpa4360pmk8003_firmwareqca8075_firmwaresc8180xqpa4361ipq6005_firmwaremdm9206qpm4640_firmwarepm8350csmr525qca9888qfe4305_firmwareipq8070a_firmwarepmr525pm8150a_firmwarewtr3950_firmwareqln1036aq_firmwarepm6150_firmwareqca6175asd765pmx20qca6574a_firmwareqpm4630_firmwareqat3555sd850_firmwareapq8009qpa5461qfe2082fcpm670_firmwareqtc801sqpm5641_firmwareqfe3320qcn5122pm8008_firmwareqpm6621pmr735a_firmwarepmx50qfe3345_firmwareqcn5022sdr8250sd768gqln1030_firmwarepmw3100_firmwarepm8004pm640lmsm8940qca8075qcn6024sd845sd455_firmwareipq6000_firmwarepmd9655au_firmwareqcs410_firmwareqca6175a_firmwaresa6150p_firmwareqcs610pmi8996qpm5620_firmwareqfe1045qca4024_firmwarepm855a_firmwareqtc800hqcs2290qca6335msm8917qcs605_firmwaresmr546_firmwarewtr3905qdm5671qpm4650_firmwaresd8csd632sdr425_firmwaremdm9628qpa5460qdm2305_firmwareqpm5670_firmwaresd710_firmwareqca6574au_firmwareqpm8870wcd9375_firmwareqpm5679qbt2000pmx50_firmwarewhs9410_firmwaresdr735gqdm3301_firmwareqcs6125smb1360qcs405qca1990_firmwarequalcomm215_firmwareqfe3440fcrsw8577_firmwarefsm10056_firmwarepm439_firmwareqpa6560msm8937sdr675_firmwarewcd9341sm7350_firmwareqdm4643_firmwarepm8937_firmwareqet4100_firmwaresd750gqdm3302qpm5657wtr1605_firmwaremdm9207_firmwareqpm5875_firmwarewsa8830_firmwarewcn3988qca6438wtr3925qet4100wcn3610mdm9640ipq5018_firmwareqpm6585qca8337_firmwaresda429w_firmwaresmb1355ipq8072aqln4650qtc800t_firmwaremsm8996au_firmwaresdr735g_firmwarewcd9330ipq8076a_firmwareqet5100qca6564auwcn6856_firmwareqcn5164msm8940_firmwareqet4101_firmwarepm7250bqln4642_firmwarepmk8001_firmwaresmb1355_firmwareqcn5054_firmwareqet4200aq_firmwaresdx50m_firmwaresdr735smb1395pm660lwtr5975wcd9335_firmwareqcn5052_firmwarepm7350c_firmwareqca6335_firmwareqca6320mdm9650_firmwarewcn3660b_firmwarewcn3680qca9984qfe4309qcn9024qpa8675qcn5550_firmwaresdr051_firmwaresdx55mwcd9330_firmwarepm670aqca6421_firmwarewtr3905_firmwareqsw8574sd6905g_firmwarewcn3680_firmwarewcn6851_firmwareqdm5670_firmwareipq8070sd8655gpm7150a_firmwarepmc1000h_firmwareqca6564a_firmwareqdm2310_firmwarepm4250_firmwaresdr105_firmwarepmd9645_firmwareqcn5121_firmwaresd8885g_firmwarewtr1605lqdm5677qsm8250ipq6018pm855_firmwarepmm6155aupm855b_firmwareqca6595_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwareqpm5875sa8155psd675wtr4605qet4101pm670lpmm8155au_firmwaresdr051qln5030qcs2290_firmwarepm4125qpa2625_firmwarepm456sd7c_firmwareqfe2081fc_firmwarecsra6620qet5100_firmwareqpa5373qpm4621qcn9072qet6100_firmwaresd765g_firmwareqpa8686smb1358_firmwareqca6390_firmwareipq6000qcn5152_firmwarepmr525_firmwareqca6584au_firmwareqfe3340_firmwarepmi632_firmwaresmb358_firmwaresd662qpa8821_firmwaresdr660g_firmwarepm3003awcn3999_firmwareqca6436_firmwareqtc800tsm7350smb1354qca6564au_firmwareqpm8820qfe2081fcqln5020_firmwaresa515m_firmwareapq8084sd821sm6250sd712_firmwareapq8017_firmwarewsa8810_firmwaresmb231sd765_firmwareqdm5677_firmwareqca8081qet4200aqqca6174a_firmwareqpm6325_firmwareqdm2302_firmwarepmm8155aucsr8811qpa8673msm8953_firmwareqca6694ausd210qfe4302_firmwarewcn6850_firmwarewsa8835_firmwaresmb358qca6564aqet6110pmi8952_firmwareqcm2290_firmwareqpm5670wcn3990qcn9000sdx24qcn9012pmi8994_firmwarepm8350bqdm2307_firmwarewsa8835sdm429w_firmwarergr7640aupm8916_firmwareqca9889qca6174asmb1390_firmwareipq8074wcn6750pm7350cqtm525wtr6955qfe3335sd855sm4125_firmwarewtr6955_firmwarepm640pqcn5021qcn5152sd768g_firmwaremsm8209smb1351smb1357_firmwaresd8cx_firmwareipq6005aqt1000_firmwareqcn9100qpm8895_firmwareqpa4340qfe1035_firmwareqcm4290sdr8150sdx20msm8920_firmwaresmb1395_firmwarepmd9655sd8655g_firmwarewcd9341_firmwarewsa8810qtc410s_firmwareqat5568_firmwarewtr4905_firmwaremdm9150qdm5679wcn3680bipq6010_firmwarepm3003a_firmwareqca6696qfe4301sm4350apq8016msm8608_firmwaresd845_firmwaresmb1381_firmwareqpa2625ipq8071_firmwareqcn9074_firmwarepm6250Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0576
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.94%
||
7 Day CHG-0.00%
Published-17 Aug, 2021 | 18:28
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In flv extractor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187236084

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-33067
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.21%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:47
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in Audio

Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwareqcs610_firmwarewcd9335sxr2130_firmwaresrv1mqca8081_firmwarewcd9370ar8035_firmwareqca6696wcd9340_firmwaresnapdragon_888_5g_mobile_platformwcd9341_firmwareqca6320sd888_firmwareqcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwaresnapdragon_1200_wearable_platform_firmwareqca9377_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsa9000p_firmwaresrv1hsnapdragon_835_mobile_pc_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770psnapdragon_780g_5g_mobile_platform_firmwarec-v2x_9150qca6584auqca6320_firmwareqcn6274_firmwaresd888qcc710wcn6740qca6310_firmwarefastconnect_6800qfw7114_firmwaresnapdragon_x5_lte_modem_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_782g_mobile_platform_firmwarewcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310qam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150psnapdragon_778g_5g_mobile_platformmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810qam8650psnapdragon_865\+_5g_mobile_platformsa9000psrv1h_firmwarevideo_collaboration_vc3_platformaqt1000sm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwarec-v2x_9150_firmwaresa6155p_firmwarewcd9326_firmwareqam8295p_firmwaresrv1m_firmwaresd855sd835wcd9330_firmwarewcn3990_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwareqca6698aq_firmwaresnapdragon_wear_4100\+_platform_firmwarewcd9385mdm9650_firmwareqca9367_firmwarewcd9330snapdragon_7c\+_gen_3_compute_firmwarewcn3610_firmwaresa8255psnapdragon_855\+\/860_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaremdm9650qca9367snapdragon_x55_5g_modem-rf_system_firmwarewcn3660bqca6574asxr2130wcn3620_firmware9206_lte_modem_firmwaresa8195pwcd9340qamsrv1msnapdragon_820_automotive_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm7325pqam8650p_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwaresdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qfw7124sa8775psnapdragon_1200_wearable_platformsnapdragon_x75_5g_modem-rf_systemqca6391_firmwarewcd9335_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformsa8775p_firmwaresnapdragon_782g_mobile_platformqamsrv1hqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pwcd9326qcs410sa8155p_firmwareqca8081qca6564awsa8815mdm9628sa8155pwcn3980_firmwareqam8775pqca9377mdm9628_firmwarewsa8830sa6145pqcn9074_firmwaresa8255p_firmware9206_lte_modemsmart_audio_200_platform_firmwarear8035qca6574a_firmwareqamsrv1m_firmwaremsm8996ausa8650p_firmwarewcn3620wcd9375_firmwareqca6391qcn6224snapdragon_x5_lte_modemsnapdragon_778g_5g_mobile_platform_firmwareqca6698aqwcn3950_firmwaresa8770p_firmwaresa8295psmart_audio_200_platformfastconnect_6200fastconnect_7800sa8145p_firmwaresa8650pqam8775p_firmwaresd865_5g_firmwaresm7325p_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformwcd9375sa8150p_firmwaresnapdragon_855\+\/860_mobile_platformfastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformsnapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragonqam8255p_firmwareqca9377_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwarewcd9380_firmwaresa6150p_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresa8145p_firmwaremsm8996au_firmwaremdm9628_firmwaresnapdragon_820_automotive_platform_firmwareqcn6224_firmwaresdm429w_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6584au_firmwarewcn3990_firmwarec-v2x_9150_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcd9326_firmwareqamsrv1h_firmwaresnapdragon_1200_wearable_platform_firmwarewcd9340_firmwaresm7325p_firmwareqam8295p_firmwaremdm9650_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwaresa9000p_firmwareqca6320_firmwaresm7315_firmwareqca6574au_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_835_mobile_pc_platform_firmwarewcn3680b_firmwarewcd9375_firmwareqca8081_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwarewcd9330_firmwareqca6436_firmwareaqt1000_firmwareqca6564au_firmwarewcn6740_firmwaresa6155p_firmwareqca9367_firmwareqcn6274_firmwaresa8775p_firmwaresnapdragon_x5_lte_modem_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmware9206_lte_modem_firmwaresa6145p_firmwaresa8155p_firmwaresmart_audio_200_platform_firmwarefastconnect_6700_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwaresa8255p_firmwareqcs610_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwaresd835_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresd888_firmwareqcc710_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwareqcn9074_firmwarefastconnect_6800_firmwareqcs410_firmwaresa8295p_firmwareqfw7124_firmwarear8035_firmware
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2020-11261
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-1.14% / 78.27%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 05:00
Updated-28 Oct, 2025 | 13:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-06-01||Apply updates per vendor instructions.

Memory corruption due to improper check to return error when user application requests memory allocation of a huge size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-pm8150msm8996auqbt2000_firmwarewcn3990_firmwaremsm8937_firmwareqca6426_firmwareqfe4373fc_firmwaresd710_firmwareqpm6621sd_8c_firmwarewsa8835_firmwarepm640l_firmwareqcs605pm7250_firmwarewcd9341_firmwarewcn3660bqat3550_firmwareqtc800t_firmwarepmi8937_firmwarewsa8830wcd9340apq8009w_firmwarepmi632_firmwareqat3514pm855_firmwareqet4100_firmwareqdm4650_firmwareqca6564aqpm6621_firmwaresmb1394pm7150a_firmwareqsw8573wtr6955msm8940wcn6856_firmwareqca6420_firmwareqet4101sd632_firmwareqpm6670_firmwaresd_455sd820apq8064au_firmwareqpa4361_firmwarepm8996pm7150lsmb1396_firmwarepm7250b_firmwarewcd9326_firmwarewcd9380_firmwarepm660l_firmwareqdm2307smr526pm670l_firmwareqdm2310qln1031sd_8cxsdr660qca6595ausd662_firmwaresda429wqca6390pm8004smb231pmc1000h_firmwarepm6350sm6250qpa8801_firmwaresmr525sdr425qfe4303_firmwareqtm525qcm6125qat5515_firmwaremsm8996au_firmwareqdm5621qfe2101_firmwarepm8350pmi8996_firmwareqpa8802wcd9370_firmwareqat3519_firmwareqcs603pm8350_firmwarear8151_firmwarepm439qca9377apq8053_firmwareqca4020qtc800spm8009_firmwareqdm5671_firmwarepm8004_firmwarepmw3100_firmwarewcn3620pm8909wcn6850_firmwareqat5516_firmwareqfs2580qet6100_firmwaresmr525_firmwareqpm6585_firmwarepmi8937pm855a_firmwarewsa8810qdm5670_firmwareqpm5620sdr845msm8937qpm4641qpa6560_firmwaresd820_firmwarewtr4905sd665sdr865_firmwarecsra6620_firmwareqat3516qtc800s_firmwaresdr425_firmwarepmr735bqpm8820_firmwareqca6335qfs2530_firmwarepmi8996qcm2290_firmwareqpa5581_firmwaresd_675qca9377_firmwareqdm2302qpm4650_firmwarepm456sa8155ppm6150a_firmwareqpa5580pmi8952qpm5670pmm6155au_firmwareqca6696_firmwarepm8150lpm8150a_firmwarepm8005qfe4309smb1394_firmwarewcn3950_firmwareqcs2290qpm8830apq8017_firmwarepmm8996auqdm2310_firmwarewcn3998_firmwaresdx20_firmwarewcn3610qdm2302_firmwaresdr660gsmb1358_firmwarewsa8815pmm6155auqpm5577_firmwareqpa5580_firmwareqet6100wsa8815_firmwareqpa8675sd765_firmwaresdw2500_firmwareapq8037sdxr2_5g_firmwarepme605qpa8821_firmwaresdxr2_5gwcd9335smb231_firmwaresm6250pqca6335_firmwarewcn3660pm640p_firmwarepm4125_firmwareqdm5670csrb31024_firmwaremsm8909w_firmwareqca6421_firmwarewcn3991pm660asd750g_firmwareqca6584auqln5040_firmwarepmx50_firmwaresmb1360_firmwareqsw6310mdm9650qpa8803_firmwareqfe3340_firmwarepm8909_firmwareqdm2301_firmwarepm8150b_firmwaresdr052_firmwarepmk8350_firmwarewcn3615qpm4640qca6420qca6430_firmwarepm6125pm3003a_firmwarepm215_firmwareqpm8830_firmwareqpa8801pm4125qca6391_firmwareqln1030sdr735sd439_firmwareqfs2608csra6640msm8917_firmwarepmk7350qcs605_firmwaresmb1381qet5100_firmwaresd888_5g_firmwaresm4350_firmwarewcn3615_firmwarepm855p_firmwaresdr735gapq8009_firmwaresa6155wcd9385_firmwareqcm2290qat5516qtm527wtr2965_firmwareqfe4301_firmwarepm7350c_firmwarepm8916_firmwaresmb1354_firmwaresdr8150qpm5577sdw3100msm8940_firmwarewgr7640wtr5975_firmwarepmi8994_firmwareqca9379qpm2630_firmwareqca6584au_firmwarepmi632sda429w_firmwarepmr525_firmwareqca6421sd210apq8009wsd835_firmwaresmb1395pm6150_firmwarepm8350bpmx20_firmwareqfs2630qca6390_firmwaresd765qca6310_firmwareqca6595au_firmwaresa6155pqcs410_firmwaresmb1350_firmwaresd710qat3518_firmwareqat3550qpa5460apq8053pmr735afsm10056_firmwarepm7250qbt1000qcs610smb1357_firmwareapq8064ausdr660g_firmwareqpm6375_firmwarepmm855aupm855l_firmwareqpm5677_firmwareqdm2305_firmwarepmk8001sa515m_firmwareqbt1500qpa2625_firmwareqat3522_firmwareqfe3340wcn3620_firmwareqln1031_firmwareqfs2530pmr735a_firmwarewtr2955_firmwarewcn3991_firmwaresdr675qpm5679_firmwaresd835wcn3680b_firmwareqcm4290_firmwareqpa8686qln4640_firmwarepm215sdr845_firmwareqca6564_firmwarepm855pqet6110qfe2550sdxr1_firmwarepmk8003_firmwareqca6310rsw8577_firmwareqpm5621_firmwareqpa8686_firmwareqpm5620_firmwaresa6145pqdm5579wcd9335_firmwareqpa8821qsw6310_firmwarefsm10055_firmwarepm855qca6174aqfs2630_firmwaresmb1398_firmwareqdm2307_firmwaresdx24pm6350_firmwareqdm5677sdr735g_firmwareqdm5579_firmwarewcd9340_firmwareqat5533_firmwareqat5522pmk8002_firmwareqpm6375msm8920_firmwaresd750gsdw3100_firmwarewcd9375_firmwareqca6564a_firmwareqcs2290_firmwareqdm5620_firmwarepm670a_firmwarewcd9380qbt2000qfe4373fcqtm527_firmwarepmk8002qca6436csrb31024pmm855au_firmwareqcs603_firmwareqpm5621wcn3660_firmwarepm6150sm7250psdx24_firmwarepm8008_firmwareqca8337_firmwarepm8150c_firmwareqpm5658_firmwaresd_636_firmwaresd865_5gsdx50mwtr3925sd821qpa5461qln5040qca6696qsw8574pm8916qbt1500_firmwareqet4101_firmwaresmb1350smb1380_firmwareqca6574asd460qpm4630qpm8895_firmwareqpm5579qpm6325apq8009sdm830smb1355qln1036aqsa415m_firmwarepm670qdm5679sd210_firmwarepm8937_firmwarepm8937wcd9371_firmwaresdm630qat5568_firmwareqpm6670wcn3999qpa5373pm8350b_firmwarepm8150awcn3950sd845smb1395_firmwareaqt1000_firmwareqdm5650_firmwareqdm5652pmk8003qdm2308_firmwarewtr3950_firmwareqpm8870_firmwarepm8350bhs_firmwarepmx24sd720g_firmwarepm6250wcd9385rgr7640au_firmwarepm8996_firmwarepm8150bwgr7640_firmwarewcn6750_firmwaresdxr1wcn3680_firmwarepm6150aqfe4308ar8035_firmwareqln1021aq_firmwareqca6391qln1030_firmwareqca4020_firmwareqdm2308sd765gqca6574qca6431qfs2580_firmwareqpm5658qpm8820wtr5975qca6436_firmwarepm8350csdr675_firmwareqpm5677qpa6560qpm8895pm8998_firmwareqpa2625qfe2520_firmwaresmb2351wtr2955ar8151qcm6125_firmwareqpa4361sd730qca6430qdm4643_firmwareqpa4340_firmwarepm8250_firmwareqpm5657_firmwareqet5100qsm7250_firmwareqcs405qln4650sd660_firmwarewcn3999_firmwaresdr8150_firmwareqpm5579_firmwareqfs2608_firmwareqat3519pmk7350_firmwareqcs4290sd205_firmwareqdm5620qpa5460_firmwarepmd9655_firmwarepmc1000hwtr4905_firmwareqbt1000_firmwareqfe4302_firmwareqtc800h_firmwarepmi8952_firmwareqln5020qpa8803sm7250p_firmwarepm8940sd855wtr6955_firmwareqat3555_firmwareqpm5870pm8350c_firmwaresdr8250_firmwarepm855b_firmwareqcm4290qln4650_firmwaresmb1381_firmwarepm670argr7640auwcn6740pmx24_firmwareqcs6125_firmwaresd_8cx_firmwareqpa4360sdm830_firmwaresdr051_firmwaresd460_firmwarewtr3905_firmwareqpm6325_firmwareqca9379_firmwarewsa8810_firmwareqfe4301qln4640qln4642pm6250_firmwareqca6174a_firmwareqpm4621_firmwareqtc410spm855awcn3610_firmwareqtc800hpm8350bh_firmwaresdx55m_firmwareqtm525_firmwareapq8096au_firmwaresmr526_firmwarequalcomm215qsw8574_firmwaresm4125_firmwareqpm4640_firmwaresdm429w_firmwaresdw2500sd_8cwcn3680bmsm8953pm8953_firmwarepmm8155au_firmwareqpa8842_firmwarewcn6851wtr3905pmk8001_firmwarear8031apq8037_firmwareqdm2301smb1396sd439pmi8994qat5568sm7350_firmwareqat3516_firmwarewcd9341qpm5541_firmwareqpm5657pmr735b_firmwarepm456_firmwareqsm7250pmk8350ar8035pm439_firmwarepm8150l_firmwarewcn3680qat3522qpm2630sdm429wqfe4320sd690_5gwcn3660b_firmwarewcn3988_firmwareqpa8675_firmwaresd429sd720gsd768g_firmwaresdx55_firmwareqpm4630_firmwarewcd9375qca6564qdm5650qpa4360_firmwarepmw3100sd_636sm4125pm8998wcn6856sd450_firmwaresd765g_firmwarepmm8996au_firmwarepm670_firmwareqcs4290_firmwareqpa8673aqt1000qsm8250sd_675_firmwarepm8953sd665_firmwareqdm3301_firmwaresd865_5g_firmwarewcd9370qpm8870qdm5652_firmwarepm640lsd690_5g_firmwarewcn3988pmx50qfe4305sd675qfe2520qat5533msm8953_firmwarepm855lsa515mqca6574_firmwareqat3555msm8920sm4350pmm8155ausa8155sm6250p_firmwareqfe4303qpa5461_firmwarepm8250qdm4643qfe4308_firmwareqca6320_firmwareqfe4320_firmwareqln1021aqqpm5641_firmwaresd662sd670_firmwarewcn6740_firmwarewcd9371sd855_firmwarepm7150l_firmwaresd821_firmwarepm8350bhqcc1110sd768gqfe4309_firmwareqsm8250_firmwaresm7350smb1398qln1020pm6150l_firmwarepm8150csd660smb1380ar8031_firmwaresdr8250sdx50m_firmwaresd205pme605_firmwareqdm4650qtc800tpmx55csra6640_firmwareqfe2550_firmwaresd845_firmwaresdx20mqpa8842wsa8830_firmwareqpa4340sd_455_firmwareqcs6125qln5020_firmwareqet5100msmb1351_firmwareqet4100pm660qat5522_firmwareqcs410smb2351_firmwarepm640a_firmwaresd429_firmwareqpm6585qpm5875_firmwarewcn3998pm855bsmb1355_firmwareqpm5641sm6250_firmwaresmb1358wcn6850sa8155p_firmwareqln1036aq_firmwareqdm5671wcn6750wtr2965pm640pwtr3925_firmwaresmb1360pm670lpmr525qpa5373_firmwarewcn3910_firmwaresd670qpa8673_firmwareqdm3301qln1020_firmwareqca6426qln4642_firmwaresd888_5gpm3003aapq8017mdm9650_firmwareqpm6582wcn3910apq8096auqca6574a_firmwareqat5515sd450pm660lqualcomm215_firmwarewcd9326qet5100m_firmwaresdx55mpm6150lpmi8998qfe4305_firmwaresd730_firmwareqpm5679sdr051sdr052wcn3980_firmwaresdr735_firmwarepm8009qca8337pmx20qcs610_firmwareqpm4621qpm5870_firmwareqdm2305qca6574au_firmwareqtc410s_firmwaresa415msdx20m_firmwarewsa8835sa8155_firmwaremsm8909wfsm10056qpm4641_firmwareqpm5541smb1357qtc801sqdm5679_firmwareqat3518qpm5670_firmwaresdr660_firmwarewtr3950pm8150_firmwarepm8350bhspmd9655qdm3302_firmwareqpm5875qfe2101smb1390wcn3980qfe4302qdm5621_firmwaresa6155_firmwarepm7250bpm660a_firmwaresdx55qcs405_firmwareqet6110_firmwareqca6574ausdm630_firmwaresa6145p_firmwareqtc801s_firmwarepm6125_firmwareqat3514_firmwarepm660_firmwaresmb1351smb1390_firmwarecsra6620smb1354wcn3990sa6155p_firmwareqln5030_firmwareqca6431_firmwarepm8940_firmwaresd675_firmwareqca6564au_firmwareqca6320pm640aqpa8802_firmwarepm8005_firmwarepmi8998_firmwareqsw8573_firmwareqpm4650qpm6582_firmwaresdr865qcc1110_firmwarepm8008pm7350cqca6564ausd632qdm3302msm8917sdx20wcn6851_firmwarepm7150afsm10055qdm5677_firmwarepmx55_firmwareqpa5581rsw8577qln5030Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon WearablesSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-46725
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.86%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 06:32
Updated-03 Nov, 2025 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amdgpu: Fix out-of-bounds write warning

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds write warning Check the ring type value to fix the out-of-bounds write warning

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-32380
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.00%
||
7 Day CHG~0.00%
Published-23 Jun, 2023 | 00:00
Updated-05 Dec, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. Processing a 3D model may lead to arbitrary code execution.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-31436
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.17%
||
7 Day CHG~0.00%
Published-28 Apr, 2023 | 00:00
Updated-21 Oct, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45542
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.29%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in WLAN Windows Host

Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8845_firmwareqcc2076_firmwarewsa8840wcd9370sc8180xp-aaab_firmwarewcd9340_firmwarewcd9385sc8380xpwcd9341_firmwareqca1064qcn7606snapdragon_7c_compute_platform_firmwareqcn7605_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqcc2073_firmwarefastconnect_6700qca1064_firmwareqca6420sc8180xp-adsc8280xp-abbbsnapdragon_7c_gen_2_compute_platform_firmwareqca6430wsa8815_firmwarewcd9370_firmwaresc8180xp-ad_firmwareqcn7605qcc2076qcm6490_firmwaresc8180xp-aaabqcn7606_firmwareqca6595auwcd9340wcd9341qcm6490wsa8810_firmwarewsa8845h_firmwareqca2062qca6420_firmwareaqt1000_firmwareqcs6490_firmwaresc8180xp-acafqca2064_firmwaresnapdragon_7c\+_gen_3_computewsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwareqca2066_firmwareqca6430_firmwarefastconnect_6800_firmwareqcs5430wsa8845hwcd9380_firmwareqcm5430sm6250_firmwaresc8180x-ad_firmwareqcm5430_firmwaresc8180x-acafwsa8815wsa8830sc8180x\+sdx55_firmwareqca2062_firmwareqcc2073sc8380xp_firmwareqca2065fastconnect_6800qca1062fastconnect_7800_firmwarefastconnect_6900wcd9375_firmwareqca6391qcs5430_firmwaresc8180x\+sdx55snapdragon_7c_gen_2_compute_platformwcd9385_firmwaresm6250fastconnect_6900_firmwarewcd9380qca1062_firmwarefastconnect_6200sc8280xp-abbb_firmwarefastconnect_7800sc8180x-acaf_firmwarewcd9375snapdragon_7c_compute_platformwsa8845fastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwareqca2064sc8180x-adsc8180x-aaabwsa8810sc8180x-aaab_firmwarewsa8835_firmwareqca2066qcs6490sc8180xp-acaf_firmwarefastconnect_6200_firmwareqca2065_firmwarewsa8830_firmwarevideo_collaboration_vc3_platformaqt1000Snapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-10842
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.58%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 17:25
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (S.LSI chipsets) software. There is a heap out-of-bounds write in the tsmux driver. The Samsung ID is SVE-2019-16295 (February 2020).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45026
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.90%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 15:13
Updated-03 Nov, 2025 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
s390/dasd: fix error recovery leading to data corruption on ESE devices

In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix error recovery leading to data corruption on ESE devices Extent Space Efficient (ESE) or thin provisioned volumes need to be formatted on demand during usual IO processing. The dasd_ese_needs_format function checks for error codes that signal the non existence of a proper track format. The check for incorrect length is to imprecise since other error cases leading to transport of insufficient data also have this flag set. This might lead to data corruption in certain error cases for example during a storage server warmstart. Fix by removing the check for incorrect length and replacing by explicitly checking for invalid track format in transport mode. Also remove the check for file protected since this is not a valid ESE handling case.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45782
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.26%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 17:05
Updated-14 Nov, 2025 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Grub2: fs/hfs: strcpy() using the volume name (fs/hfs.c:382)

A flaw was found in the HFS filesystem. When reading an HFS volume's name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name's length. This issue may read to a heap-based out-of-bounds writer, impacting grub's sensitive data integrity and eventually leading to a secure boot protection bypass.

Action-Not Available
Vendor-Red Hat, Inc.GNU
Product-openshift_container_platformenterprise_linuxgrub2Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 10Red Hat Enterprise Linux 7
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45555
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.02% / 4.23%
||
7 Day CHG~0.00%
Published-06 Jan, 2025 | 10:33
Updated-28 Feb, 2025 | 06:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow to Buffer Overflow in Automotive OS Platform

Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8770p_firmwaresa7775pqca6564aqam8620pqam8255p_firmwaresa8540psa8155pqam8255psrv1hsa7255pqca6688aq_firmwaresrv1h_firmwaresnapdragon_820_automotive_firmwareqca6595au_firmwaresa8145p_firmwareqam8650p_firmwaresa8155_firmwaresrv1lmsm8996au_firmwaresa8255p_firmwaresa8650p_firmwaresa8540p_firmwaresa6155_firmwareqca6595ausa7255p_firmwaresa6145psa8295p_firmwareqca6696sa8295pqca6584au_firmwaresa6150pqca6574au_firmwaresrv1m_firmwaresa8155qca6584ausa6150p_firmwareqca6595sa8155p_firmwareqca6595_firmwareqca6564ausrv1l_firmwaremsm8996auqamsrv1hsa8255psa6155qca6574aqamsrv1m_firmwareqam8775p_firmwareqam8295p_firmwaresa8620p_firmwaresa8650pqam8650psa8770psa8195p_firmwareqca6574a_firmwaresa8620psa8145pqca6564a_firmwaresa8150p_firmwareqca6696_firmwaresa8775psa6155psa9000p_firmwaresa8150pqca6698aqqamsrv1h_firmwaresa6155p_firmwaresrv1mqam8775psa7775p_firmwareqam8295psnapdragon_820_automotiveqam8620p_firmwaresa9000pqca6564au_firmwaresa8775p_firmwareqca6698aq_firmwareqca6574ausa6145p_firmwaresa8195pqamsrv1mqca6688aqSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-0432
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.32%
||
7 Day CHG~0.00%
Published-17 Sep, 2020 | 18:45
Updated-04 Aug, 2024 | 06:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807

Action-Not Available
Vendor-n/aopenSUSEGoogle LLC
Product-androidleapAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-44977
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.11%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 19:54
Updated-03 Nov, 2025 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amdgpu: Validate TA binary size

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Validate TA binary size Add TA binary size validation to avoid OOB write. (cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-0136
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.91%
||
7 Day CHG~0.00%
Published-11 Jun, 2020 | 14:43
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple locations of Parcel.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-120078455

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-0094
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.94%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 20:10
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In setImageHeight and setImageWidth of ExifUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-148223871

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45563
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.07% / 20.91%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:31
Updated-09 May, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Camera Driver

Memory corruption while handling schedule request in Camera Request Manager(CRM) due to invalid link count in the corresponding session.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewcd9385wsa8835sxr2230p_firmwarewcn3660bwcd9385_firmwaresxr2230pwcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewsa8832_firmwarewsa8832wcn3660b_firmwarefastconnect_7800sxr2250pSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-48847
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.70%
||
7 Day CHG~0.00%
Published-16 Jul, 2024 | 12:25
Updated-04 May, 2025 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
watch_queue: Fix filter limit check

In the Linux kernel, the following vulnerability has been resolved: watch_queue: Fix filter limit check In watch_queue_set_filter(), there are a couple of places where we check that the filter type value does not exceed what the type_filter bitmap can hold. One place calculates the number of bits by: if (tf[i].type >= sizeof(wfilter->type_filter) * 8) which is fine, but the second does: if (tf[i].type >= sizeof(wfilter->type_filter) * BITS_PER_LONG) which is not. This can lead to a couple of out-of-bounds writes due to a too-large type: (1) __set_bit() on wfilter->type_filter (2) Writing more elements in wfilter->filters[] than we allocated. Fix this by just using the proper WATCH_TYPE__NR instead, which is the number of types we actually know about. The bug may cause an oops looking something like: BUG: KASAN: slab-out-of-bounds in watch_queue_set_filter+0x659/0x740 Write of size 4 at addr ffff88800d2c66bc by task watch_queue_oob/611 ... Call Trace: <TASK> dump_stack_lvl+0x45/0x59 print_address_description.constprop.0+0x1f/0x150 ... kasan_report.cold+0x7f/0x11b ... watch_queue_set_filter+0x659/0x740 ... __x64_sys_ioctl+0x127/0x190 do_syscall_64+0x43/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae Allocated by task 611: kasan_save_stack+0x1e/0x40 __kasan_kmalloc+0x81/0xa0 watch_queue_set_filter+0x23a/0x740 __x64_sys_ioctl+0x127/0x190 do_syscall_64+0x43/0x90 entry_SYSCALL_64_after_hwframe+0x44/0xae The buggy address belongs to the object at ffff88800d2c66a0 which belongs to the cache kmalloc-32 of size 32 The buggy address is located 28 bytes inside of 32-byte region [ffff88800d2c66a0, ffff88800d2c66c0)

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28793
Matching Score-4
Assigner-Zscaler, Inc.
ShareView Details
Matching Score-4
Assigner-Zscaler, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.59%
||
7 Day CHG~0.00%
Published-23 Oct, 2023 | 13:26
Updated-27 Feb, 2025 | 20:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap Based Buffer Overflow in Library

Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.

Action-Not Available
Vendor-Zscaler, Inc.
Product-client_connectorClient Connector
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45577
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Camera Driver

Memory corruption while invoking IOCTL calls from userspace to camera kernel driver to dump request information.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewsa8835wcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewcn3660b_firmwarefastconnect_7800wcn3660bSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-4467
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.62%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 15:57
Updated-25 Feb, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qemu-kvm: 'qemu-img info' leads to host file read/write

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Advanced Virtualization for RHEL 8.2.1Advanced Virtualization for RHEL 8.4.0.EUSRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 10Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat Enterprise Linux 7Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 8Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 6Red Hat Enterprise Linux 8.8 Extended Update SupportRed Hat OpenShift Virtualization 4Red Hat Enterprise Linux 8 Advanced VirtualizationRed Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRed Hat Enterprise Linux 9
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-45579
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in Camera Driver

Memory corruption may occur when invoking IOCTL calls from userspace to the camera kernel driver to dump request information, due to a missing memory requirement check.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9380_firmwaresnapdragon_429_mobile_firmwarefastconnect_7800_firmwarewcn3620_firmwarewsa8835wcn3620sdm429w_firmwarewsa8830wsa8830_firmwarewsa8835_firmwarewcd9380snapdragon_8_gen_1_mobile_firmwaresnapdragon_429_mobilefastconnect_6900sdm429wfastconnect_6900_firmwaresnapdragon_8_gen_1_mobilewcn3660b_firmwarefastconnect_7800wcn3660bSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43528
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.63% / 69.99%
||
7 Day CHG+0.17%
Published-08 Oct, 2024 | 17:35
Updated-08 Jul, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Secure Kernel Mode Elevation of Privilege Vulnerability

Windows Secure Kernel Mode Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2022_23h2windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_11_23h2Windows Server 2022Windows 10 Version 21H2Windows Server 2019 (Server Core installation)Windows 11 Version 24H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2019Windows 10 Version 1809Windows 11 version 22H2Windows 10 Version 22H2Windows 11 Version 23H2Windows 11 version 21H2Windows 11 version 22H3
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2024-43560
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-3.72% / 87.81%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 17:36
Updated-08 Jul, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability

Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2016 (Server Core installation)Windows Server 2022Windows 11 Version 24H2Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows 10 Version 1507Windows 10 Version 1607Windows Server 2012 R2 (Server Core installation)Windows Server 2012Windows 10 Version 22H2Windows 11 version 22H3Windows 10 Version 21H2Windows Server 2019Windows Server 2012 R2Windows 11 version 22H2Windows Server 2016Windows Server 2012 (Server Core installation)Windows 11 Version 23H2Windows 11 version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2024-56626
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.79%
||
7 Day CHG~0.00%
Published-27 Dec, 2024 | 14:51
Updated-03 Nov, 2025 | 21:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write An offset from client could be a negative value, It could allows to write data outside the bounds of the allocated buffer. Note that this issue is coming when setting 'vfs objects = streams_xattr parameter' in ksmbd.conf.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43768
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.21% / 42.57%
||
7 Day CHG~0.00%
Published-02 Jan, 2025 | 23:58
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28545
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.2||HIGH
EPSS-0.04% / 12.12%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Restriction of Operations within the Bounds of a Memory Buffer in TZ Secure OS

Memory corruption in TZ Secure OS while loading an app ELF.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwareqcm8550_firmwaresw5100pvision_intelligence_300_platformsd865_5gqca6595wcd9335wcd9370qca8081_firmwaresnapdragon_x50_5g_modem-rf_systemqca4004qca6696wcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426wcn6740_firmwarefastconnect_6700qca9984_firmwaresnapdragon_768g_5g_mobile_platform_firmwarewsa8832_firmwareqca8337qdu1110qca6426_firmwarewcd9395snapdragon_460_mobile_platform9205_lte_modemqca6574au_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwareqcn7606_firmwareqam8295pwcd9341qca6574auwcd9390wsa8810_firmwarewsa8845h_firmwarecsra6640snapdragon_8cx_gen_2_5g_compute_platformsa9000p_firmwaresrv1hfastconnect_6800_firmwareqcn6024_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platformssg2115pqcc710snapdragon_850_mobile_compute_platformsnapdragon_8cx_compute_platform_firmwaresa8540psnapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqsm8250_firmwareqsm8350_firmwarerobotics_rb3_platform315_5g_iot_modem_firmwarefastconnect_6900snapdragon_765g_5g_mobile_platformqru1032_firmwareqfw7114wcd9385_firmwareqca6421315_5g_iot_modemsnapdragon_x55_5g_modem-rf_systemqca6310qam8255p_firmwaresa8155_firmwarewcd9360snapdragon_888_5g_mobile_platform_firmwaresnapdragon_wear_1300_platform_firmwareqca6335snapdragon_ar2_gen_1_platform_firmwareqcs4490snapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_685_4g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155pqca6421_firmwareqca6564au_firmwaresnapdragon_768g_5g_mobile_platformwsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresa9000pqdu1000_firmwareqsm8250snapdragon_8\+_gen_2_mobile_platformsrv1h_firmwareqca6595ausm7315_firmwareqdu1010wcd9326_firmwaresa6155p_firmwarewsa8840qcs8550_firmwareqdu1210_firmwaresnapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6436_firmwareqcn9012snapdragon_8\+_gen_1_mobile_platformqcs4490_firmwaresnapdragon_8_gen_2_mobile_platformwcn3910_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwaresnapdragon_855\+\/860_mobile_platform_firmwareqca6420wcn3910wcd9370_firmwaresnapdragon_x70_modem-rf_system_firmwaresnapdragon_845_mobile_platformsnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqdu1110_firmwareqdu1000qca6574aqca6174awcd9340qcs8250_firmwareqcm2290qdu1210qca6335_firmwareqcm6490sa8540p_firmwaresm8550p_firmwareqcm8550wcn3988qcn9024snapdragon_460_mobile_platform_firmwareqca6574snapdragon_x75_5g_modem-rf_systemsxr2230p_firmwaresd675_firmwaresnapdragon_8cx_compute_platformqca6430_firmwaresnapdragon_870_5g_mobile_platformqcn9011qamsrv1hsdx57mqcn9024_firmwaresnapdragon_8cx_gen_3_compute_platformwsa8845hwcd9326qcm2290_firmwaresa8155p_firmwareqca6564asa8155pwsa8830snapdragon_675_mobile_platformsnapdragon_wear_1300_platformsnapdragon_662_mobile_platformsm8550psa6145psnapdragon_8\+_gen_1_mobile_platform_firmwarevision_intelligence_400_platform_firmwaresnapdragon_765_5g_mobile_platformsa8255p_firmwareflight_rb5_5g_platform_firmwaresnapdragon_665_mobile_platformar8035sa6155qrb5165m_firmwaresa8650p_firmwaresnapdragon_678_mobile_platform_firmwareqcm4325robotics_rb5_platformqcn6224qca6698aqwcn3950_firmwaressg2125p_firmwareqrb5165nsnapdragon_8c_compute_platform_firmwaresnapdragon_8_gen_1_mobile_platformfastconnect_6200sd670sm7325p_firmwaresd460wcd9360_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwaresnapdragon_888\+_5g_mobile_platformqdx1011smart_audio_400_platformsnapdragon_855\+\/860_mobile_platformsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformfastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990sd670_firmwaresnapdragon_680_4g_mobile_platform_firmwareqcs6490qcs8250snapdragon_750g_5g_mobile_platformfastconnect_6200_firmwarear8031_firmwarewsa8830_firmwareqcn6224_firmwareqca6431snapdragon_850_mobile_compute_platform_firmwarewsa8845_firmwarewsa8832sdx57m_firmwaresxr2130_firmwaresnapdragon_675_mobile_platform_firmwarear8035_firmwareqrb5165msnapdragon_888_5g_mobile_platformsc8380xpsnapdragon_w5\+_gen_1_wearable_platform_firmwaresd888_firmwaresnapdragon_662_mobile_platform_firmwarewcd9306qca6564auwsa8815_firmwareqca8337_firmwareqcm4290snapdragon_680_4g_mobile_platformar8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_8c_compute_platformsm7250p_firmwarewcn3999sm4125qcm4490_firmwaresnapdragon_855_mobile_platformqru1032robotics_rb3_platform_firmwarewcn3950flight_rb5_5g_platformsnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_670_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platformqca4004_firmwaresa8295p_firmwaresd_675_firmwareqca9984sm7250psa8155sd_8cx_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcn6274_firmwaresd888qcn9011_firmwareqru1062_firmwaresd460_firmwaresnapdragon_4_gen_2_mobile_platformsw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwarewcn6740sc8380xp_firmwareqru1062qca6310_firmwarefastconnect_6800qfw7114_firmwareqcs7230snapdragon_685_4g_mobile_platform_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_782g_mobile_platform_firmwarefastconnect_6900_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_xr2_5g_platform_firmwaresnapdragon_4_gen_1_mobile_platformsa8150pvision_intelligence_300_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_665_mobile_platform_firmwaresnapdragon_x24_lte_modemsnapdragon_auto_5g_modem-rf_firmwaresxr1230psnapdragon_865\+_5g_mobile_platformsd662_firmwaresw5100video_collaboration_vc3_platformaqt1000wcd9306_firmwaresnapdragon_865_5g_mobile_platform_firmwareqam8295p_firmwaresd855qca6431_firmwarewcn3990_firmware9205_lte_modem_firmwaresm7315qca6698aq_firmwareqcs2290qca6564a_firmwareqcn7606wcd9385qcs2290_firmwareqsm8350wcn3999_firmwaresd662snapdragon_678_mobile_platformsa8255pqcs7230_firmwareqcs4290sxr1230p_firmwarewcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqca6430sg8275psdx55_firmwareqdx1011_firmwaresnapdragon_auto_5g_modem-rfssg2125pqru1052sxr2130qcm4490csra6640_firmwaresnapdragon_xr2\+_gen_1_platformqca6174a_firmwaresm7325pqam8650p_firmwarevideo_collaboration_vc5_platformsnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemsd855_firmwarewcd9335_firmwareqrb5165n_firmwareqca6436wcn3980_firmwareqcn6274snapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwaresnapdragon_480_5g_mobile_platform_firmwareqfw7124qdu1010_firmwareqca6595au_firmwaresw5100p_firmwaresnapdragon_ar2_gen_1_platformsnapdragon_782g_mobile_platformqca6696_firmwareqcs4290_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwareqca6574_firmwarecsra6620qca8081wsa8815sg4150psd_8_gen1_5gqam8775pqca9377qca6797aqqcm4325_firmwarevision_intelligence_400_platformqca6574a_firmwaresdx55qcm4290_firmwaresnapdragon_480\+_5g_mobile_platformsd675sd_8_gen1_5g_firmwarewcd9375_firmwareqca6391snapdragon_x70_modem-rf_systemsnapdragon_778g_5g_mobile_platform_firmwaresmart_audio_400_platform_firmwareqcn9012_firmwaresg4150p_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwaresnapdragon_670_mobile_platformcsra6620_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresa8295probotics_rb5_platform_firmwareqcs8550snapdragon_x50_5g_modem-rf_system_firmwarefastconnect_7800sa8650pqam8775p_firmwaresd865_5g_firmwarewcd9375wcn3988_firmwareqamsrv1h_firmwaresd_675snapdragon_888\+_5g_mobile_platform_firmwaresd_8cxwsa8835_firmwaressg2115p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_690_5g_mobile_platform_firmwareqdx1010Snapdragon
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-43527
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.63% / 69.99%
||
7 Day CHG+0.12%
Published-08 Oct, 2024 | 17:35
Updated-08 Jul, 2025 | 15:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Elevation of Privilege Vulnerability

Windows Kernel Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2Windows 11 Version 24H2
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2024-43626
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.21% / 43.85%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 17:53
Updated-08 Jul, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Telephony Service Elevation of Privilege Vulnerability

Windows Telephony Service Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2012windows_11_24h2windows_server_2008windows_10_1809windows_10_21h2windows_10_1507windows_server_2022_23h2windows_10_1607windows_server_2025windows_11_23h2windows_server_2022windows_server_2016windows_server_2019windows_11_22h2windows_10_22h2Windows Server 2022Windows 11 Version 24H2Windows Server 2019 (Server Core installation)Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows 10 Version 1507Windows 10 Version 1607Windows Server 2012 R2 (Server Core installation)Windows Server 2012Windows 10 Version 22H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 21H2Windows Server 2019Windows Server 2008 R2 Service Pack 1Windows Server 2012 R2Windows Server 2025Windows Server 2008 Service Pack 2Windows Server 2025 (Server Core installation)Windows 11 version 22H2Windows Server 2016Windows Server 2016 (Server Core installation)Windows 11 Version 23H2Windows Server 2008 Service Pack 2Windows Server 2022, 23H2 Edition (Server Core installation)
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2024-44093
Matching Score-4
Assigner-Google Devices
ShareView Details
Matching Score-4
Assigner-Google Devices
CVSS Score-7.4||HIGH
EPSS-0.04% / 13.27%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 20:28
Updated-18 Sep, 2024 | 13:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ppmp_unprotect_buf of drm/code/drm_fw.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-783
Operator Precedence Logic Error
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28565
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.59%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in WLAN HAL

Memory corruption in WLAN HAL while handling command streams through WMI interfaces.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaremdm9640_firmwaresm6250p_firmwaresnapdragon_x20_lteipq4028_firmwareqca1023ar9380ipq8173_firmwareqcn5124mdm9645wcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155mdm8215sd_455_firmwareapq8076qcs6125_firmwaresnapdragon_730g_firmwaresc8180xp-adwcd9371_firmwarewcn3950qcn6024_firmwaresm4125snapdragon_662wcn3660bsd460_firmwaresnapdragon_712_firmwareqca8081_firmwaresnapdragon_821snapdragon_x5_lte_firmwareqca6420snapdragon_w5\+_gen_1qca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwareipq8072_firmwaresc8180xp-aa_firmwareqca0000sa8155_firmwaresnapdragon_765_5g_firmwareqca4004_firmwareipq8068qca6430qts110wcd9306_firmwarewcd9340snapdragon_850qca6698aq_firmwaresnapdragon_675_firmwaremdm9250_firmwareqca9888_firmwareqcn6122qca6696_firmwarewcd9371sc8180x-abqcn5154_firmwaremdm8215_firmwaresd_8cxqcn5501_firmwaresa8150psnapdragon_auto_4g_firmwarear7420_firmwareqca4004snapdragon_765g_5g_firmwareqca9992_firmwaresd660snapdragon_4_gen_1snapdragon_768g_5g_firmwaresd660_firmwarefastconnect_6800_firmwareqcn5022_firmwareqcn7606_firmwareqca4010_firmwareqca6428_firmwareqca9985_firmwareipq4018_firmwareqca4531_firmwareqca9980_firmwaresnapdragon_x12_lte_firmwareipq8078ipq8173sd670_firmwareqca6574snapdragon_810_firmwarecsr8811_firmwarewcd9380snapdragon_720gqcs410snapdragon_652qcn5024qca9379_firmwaresc8180xp-ad_firmwareqca9985qcn9012_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815qca6584_firmwaremdm9215_firmwareipq6028ipq8064sd835qca1990wcn3980_firmwaresd730snapdragon_765g_5gqcn5064_firmwareqcs4490_firmwaresmart_audio_200_firmwareapq8064au_firmwareipq8078_firmwarefastconnect_6900fastconnect_6900_firmwaresmart_audio_400_firmwaresnapdragon_820_firmwareqca9994snapdragon_750g_5gqca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwareqcn7605_firmwaresw5100p_firmwareqcs610_firmwaresa6145pqca9886_firmwarear8031qca1023_firmwaresnapdragon_712sd820_firmwareqca6391_firmwaresnapdragon_808sa4150p_firmwareqca4024snapdragon_808_firmwarewcd9370_firmwaresdx55csra6640snapdragon_690_5gsnapdragon_xr1_firmwareqca9379sa4155pqcn7606wsa8830qca9561csrb31024qca9563_firmwaremdm9628_firmwaremdm9650snapdragon_690_5g_firmwareqca9992qcs4290mdm9250qca6420_firmwaresnapdragon_765_5gmdm9310_firmwareimmersive_home_216sd675_firmwareipq8072snapdragon_x5_lteqca6564wcn3990_firmwareqca9984_firmwareqca9377snapdragon_xr1qca4531wcd9385_firmwarewcd9326_firmwarefastconnect_6200wcn3615_firmwareipq8074aqca9982apq8094sa8155qca6584qcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwarewcd9306qca6584ausnapdragon_695_5g_firmwareqfe1952ipq8174qcn5052qca9367apq8092snapdragon_850_firmwarewcn3988_firmwareqcn9074fastconnect_6700_firmwaresa8195psxr1120qca6694qca7550snapdragon_636_firmwarewcd9326wcd9335qca9982_firmwareqcm4490qcn6023qcs4290_firmwaresnapdragon_auto_4gvision_intelligence_300_firmwarehome_hub_100snapdragon_660immersive_home_316_firmwareqca9898_firmwarewcd9375aqt1000sc8180x\+sdx55_firmwaresm6250_firmwareapq8092_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwaresnapdragon_820apq8017sxr1120_firmwareqcm6125_firmwaresnapdragon_665_firmwareqca9882snapdragon_636qca6595snapdragon_685_4g_firmwareqca9896_firmwareipq8065_firmwaresnapdragon_auto_5g_firmwareqcn5154qca8075_firmwaresc8180xp-acqcn6132_firmwareqca9888qca6310_firmwareapq8094_firmwareipq8070a_firmwarehome_hub_100_firmwaremdm9615qca6574_firmwareqca9886qcn5502_firmwaresnapdragon_480\+_5g_firmwareqca6175aqca6574a_firmware9205_lte_firmwaresnapdragon_678mdm9310csrb31024_firmwarewsa8832_firmwareqcn9070_firmwareipq6028_firmwareipq8072a_firmwareqca9531sc8180xp-af_firmwareqca9889_firmwaresnapdragon_460_firmwareqcn5122mdm9645_firmwarevision_intelligence_300sdx20m_firmwaresc8180x-aa_firmwareqcn5022sc8180x-aaqca6564_firmwaresc8180x-af_firmwaresnapdragon_821_firmwareqca8075qcn6024qcn9022mdm9615_firmwareipq6000_firmwareqcs410_firmwaresnapdragon_wear_1300_firmwaresnapdragon_860_firmwareqca6175a_firmwareqts110_firmwaresa6150p_firmwareqcs610qcn5550sc8180x-ab_firmwarewcd9360_firmwareqca9561_firmwaresmart_audio_400qca4024_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335qcn5064snapdragon_x55_5gvision_intelligence_400csra6620_firmwaresd_675_firmwarecsra6640_firmwareqca9987_firmwareqca6554a_firmwarerobotics_rb3ipq8076amdm9628snapdragon_768g_5gsnapdragon_730_firmwareqca6428snapdragon_x55_5g_firmwareqca6574au_firmwareqcn5164_firmwareipq8071snapdragon_845smart_audio_200sa6155_firmwarewcd9375_firmwarewcd9360sdx20mqca6438_firmwaresc8180xp-afwcn3999ipq5028qca7500ipq4029_firmwareqca6698aqqcs6125sa4155p_firmwareipq6010sd662_firmwaresnapdragon_855\+qcn6132qca1990_firmwaresw5100qcn3018_firmwaresa6155psnapdragon_x20_lte_firmwaresnapdragon_710snapdragon_630wcd9341ipq8068_firmwaresc8180xp-ab_firmwareqca9988_firmwarewcn3910_firmwareqfe1922wsa8830_firmwaresnapdragon_810sd855_firmwarewcn3988qca6438snapdragon_662_firmwaresa8195p_firmwareqca9898ipq4028wcn3610mdm9640immersive_home_216_firmwarewcd9380_firmwarerobotics_rb3_firmwareipq8072aqca7500_firmwaresw5100pmsm8996au_firmwaresnapdragon_665wcd9330immersive_home_214_firmwareipq8076a_firmwareqca7550_firmwareqca6564auipq4029vision_intelligence_400_firmwareqcn5164qca9558qca7520_firmwaresc8180xp-aasnapdragon_x50_5gfastconnect_6700ipq4019_firmwaresnapdragon_auto_5gsnapdragon_480_5gsc8180x-ac_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980snapdragon_460qca6335_firmwaresnapdragon_680_4g_firmwarewcn3910qca6320mdm9650_firmwareqca9986_firmwaresm4450wcn3660b_firmwareqca9984sc8180x-adqcn9024qcn5550_firmwarewcd9330_firmwaresnapdragon_7c_gen_2ipq8064_firmwaresnapdragon_670_firmwaresnapdragon_wear_1300sd821_firmwaresnapdragon_730ar8031_firmwaresnapdragon_710_firmwareipq8070immersive_home_318qcn5502qca4012_firmwareqca9887_firmwareqca6564a_firmwareqca9880wsa8832sc8180xp-ac_firmwaresnapdragon_x24_lte_firmwareipq6018qcn3018qcs4490qca6595_firmwaresa8145psnapdragon_730gsa8155psd675qca9531_firmware9205_ltear8035_firmwareqcm2290qcn5024_firmwareqcn9070sa8145p_firmwareimmersive_home_318_firmwareqca7520qcs2290_firmwaresnapdragon_845_firmwaresnapdragon_4_gen_1_firmwarecsra6620qca9987qcn9072qca9880_firmwareipq8069_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca0000_firmwaresnapdragon_835_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwaresnapdragon_720g_firmwaresd_8cx_firmwareqcn7605qca9563snapdragon_732gsd662qcn5124_firmwareqfe1952_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwaresnapdragon_7c_compute_firmwareipq5010immersive_home_214qca6564au_firmwaresa6155p_firmwareqca6310snapdragon_855\+_firmwaresnapdragon_7c_gen_2_firmwareqca9990qcn5501snapdragon_652_firmwaresd821snapdragon_732g_firmwaresnapdragon_x24_ltesa6145p_firmwaresm6250apq8017_firmwarewsa8810_firmwareqca4010sg4150pqca8081snapdragon_630_firmwareipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385sc8180x-acar8035csr8811apq8064auipq4019qca6694_firmwareqca4012qcn9100_firmwaresnapdragon_480_5g_firmwaresd820wsa8835_firmwaresnapdragon_695_5gqca6564aqca9988sa4150psg4150p_firmwareqcm4325qcm2290_firmwarewcn3990qcn9000sd_675qca6554afastconnect_6800ar9380_firmwareqcn9012qca9558_firmwaresnapdragon_855qcn6122_firmwarewsa8835msm8996ausnapdragon_860sm6250psnapdragon_855_firmwaresnapdragon_670ipq4018qca6574aqca9889qca6174asc8180x-afipq8074qca9994_firmwaresnapdragon_678_firmwareipq8076_firmwarear7420sd855sm4125_firmwareipq8076qfe1922_firmwareqca9887fastconnect_6200_firmwareipq8069qcn5152sd460qca6391snapdragon_w5\+_gen_1_firmwareaqt1000_firmwareqcn9100qcm4490_firmwaresnapdragon_685_4gsnapdragon_660_firmwareqcm4290qca9882_firmwaresnapdragon_675mdm9215sd_455ipq8074_firmwareimmersive_home_316qca6574ausa8155p_firmwaresnapdragon_680_4gsnapdragon_x50_5g_firmwarewcd9341_firmwareqcm6125wsa8810snapdragon_x12_ltewcn3680bsd835_firmwaresnapdragon_835ipq6010_firmwareqca6696sc8180xp-absa6150pqcn9022_firmwareqca9990_firmwareipq8070asc8180x-ad_firmwareqcn9072_firmwaresm7250pipq8071_firmwareqcn9074_firmwaresw5100_firmwaresnapdragon_7c_computeqca9896snapdragon_480\+_5gsnapdragon_750g_5g_firmwareSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • ...
  • 26
  • 27
  • 28
  • 29
  • 30
  • Next
Details not found