Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-10397

Summary
Assigner-fedora
Assigner Org ID-92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5
Published At-14 Nov, 2024 | 19:33
Updated At-23 Dec, 2025 | 14:57
Rejected At-
Credits

Preallocated buffer overflows in XDR responses

A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:fedora
Assigner Org ID:92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5
Published At:14 Nov, 2024 | 19:33
Updated At:23 Dec, 2025 | 14:57
Rejected At:
▼CVE Numbering Authority (CNA)
Preallocated buffer overflows in XDR responses

A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code.

Affected Products
Vendor
The OpenAFS Foundation
Product
OpenAFS
Collection URL
https://github.com/openafs/openafs/
Package Name
openafs
Default Status
unaffected
Versions
Affected
  • From 1.0 before 1.6.24 (semver)
  • From 1.8.0 before 1.8.12.2 (semver)
  • From 1.9.0 before 1.9.1 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-787CWE-787 Out-of-bounds Write
Type: CWE
CWE ID: CWE-787
Description: CWE-787 Out-of-bounds Write
Metrics
VersionBase scoreBase severityVector
4.07.7HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txt
N/A
Hyperlink: https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txt
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00019.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00019.html
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:patrick@puiterwijk.org
Published At:14 Nov, 2024 | 20:15
Updated At:23 Dec, 2025 | 15:15

A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.7HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

openafs
openafs
>>openafs>>Versions from 1.0(inclusive) to 1.6.25(exclusive)
cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
openafs
openafs
>>openafs>>Versions from 1.8.0(inclusive) to 1.8.13(exclusive)
cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
openafs
openafs
>>openafs>>1.9.0
cpe:2.3:a:openafs:openafs:1.9.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Secondarypatrick@puiterwijk.org
CWE ID: CWE-787
Type: Secondary
Source: patrick@puiterwijk.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txtpatrick@puiterwijk.org
N/A
https://lists.debian.org/debian-lts-announce/2025/05/msg00019.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txt
Source: patrick@puiterwijk.org
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1350Records found

CVE-2023-53543
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.29%
||
7 Day CHG-0.01%
Published-04 Oct, 2025 | 15:16
Updated-12 Feb, 2026 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check

In the Linux kernel, the following vulnerability has been resolved: vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check The vdpa_nl_policy structure is used to validate the nlattr when parsing the incoming nlmsg. It will ensure the attribute being described produces a valid nlattr pointer in info->attrs before entering into each handler in vdpa_nl_ops. That is to say, the missing part in vdpa_nl_policy may lead to illegal nlattr after parsing, which could lead to OOB read just like CVE-2023-3773. This patch adds the missing nla_policy for vdpa max vqp attr to avoid such bugs.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9399
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:13
Updated-19 Dec, 2024 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In /proc/driver/wmt_dbg driver, there are several possible out of bounds writes. These could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9367
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 9.53%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 19:15
Updated-22 Nov, 2024 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FT_ACDK_CCT_V2_OP_ISP_SET_TUNING_PARAS of Meta_CCAP_Para.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9403
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.74%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:29
Updated-19 Dec, 2024 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MTK_FLP_MSG_HAL_DIAG_REPORT_DATA_NTF handler of flp2hal_- interface.c, there is a possible stack buffer overflow due to a missing bounds check. This could lead to local escalation of privilege in a privileged process with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9389
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.1||MEDIUM
EPSS-0.03% / 9.68%
||
7 Day CHG+0.01%
Published-17 Jan, 2025 | 23:15
Updated-03 Feb, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ip6_append_data of ip6_output.c, there is a possible way to achieve code execution due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9396
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 21:59
Updated-18 Dec, 2024 | 20:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9424
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.05% / 13.87%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 21:23
Updated-22 Nov, 2024 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidadmob
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-53372
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.98%
||
7 Day CHG~0.00%
Published-18 Sep, 2025 | 13:33
Updated-14 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
sctp: fix a potential overflow in sctp_ifwdtsn_skip

In the Linux kernel, the following vulnerability has been resolved: sctp: fix a potential overflow in sctp_ifwdtsn_skip Currently, when traversing ifwdtsn skips with _sctp_walk_ifwdtsn, it only checks the pos against the end of the chunk. However, the data left for the last pos may be < sizeof(struct sctp_ifwdtsn_skip), and dereference it as struct sctp_ifwdtsn_skip may cause coverflow. This patch fixes it by checking the pos against "the end of the chunk - sizeof(struct sctp_ifwdtsn_skip)" in sctp_ifwdtsn_skip, similar to sctp_fwdtsn_skip.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9397
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:10
Updated-19 Dec, 2024 | 17:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In WMT_unlocked_ioctl of MTK WMT device driver, there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-53320
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.81%
||
7 Day CHG~0.00%
Published-16 Sep, 2025 | 16:11
Updated-14 Jan, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info()

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info() The function mpi3mr_get_all_tgt_info() has four issues: 1) It calculates valid entry length in alltgt_info assuming the header part of the struct mpi3mr_device_map_info would equal to sizeof(u32). The correct size is sizeof(u64). 2) When it calculates the valid entry length kern_entrylen, it excludes one entry by subtracting 1 from num_devices. 3) It copies num_device by calling memcpy(). Substitution is enough. 4) It does not specify the calculated length to sg_copy_from_buffer(). Instead, it specifies the payload length which is larger than the alltgt_info size. It causes "BUG: KASAN: slab-out-of-bounds". Fix the issues by using the correct header size, removing the subtraction from num_devices, replacing the memcpy() with substitution and specifying the correct length to sg_copy_from_buffer().

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8834
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.92%
||
7 Day CHG~0.00%
Published-17 Apr, 2018 | 19:00
Updated-16 Sep, 2024 | 19:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.

Action-Not Available
Vendor-omronICS-CERT
Product-cx-flnetnetwork_configuratorcx-protocolcx-oneswitch_box_utilitycx-programmercx-serverOmron CX-One
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-0053
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.59%
||
7 Day CHG+0.02%
Published-11 Jul, 2019 | 19:40
Updated-16 Sep, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow

Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.

Action-Not Available
Vendor-Debian GNU/LinuxJuniper Networks, Inc.
Product-junosdebian_linuxJunos OS
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9368
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.92%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 19:16
Updated-22 Nov, 2024 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In mtkscoaudio debugfs there is a possible arbitrary kernel memory write due to missing bounds check and weakened SELinux policies. This could lead to local escalation of privilege with system  execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-52816
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.18%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 15:31
Updated-23 Sep, 2025 | 22:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
drm/amdkfd: Fix shift out-of-bounds issue

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix shift out-of-bounds issue [ 567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int' [ 567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G OE 6.2.0-34-generic #34~22.04.1-Ubuntu [ 567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N_871 09/25/2023 [ 567.614504] Workqueue: events send_exception_work_handler [amdgpu] [ 567.614748] Call Trace: [ 567.614750] <TASK> [ 567.614753] dump_stack_lvl+0x48/0x70 [ 567.614761] dump_stack+0x10/0x20 [ 567.614763] __ubsan_handle_shift_out_of_bounds+0x156/0x310 [ 567.614769] ? srso_alias_return_thunk+0x5/0x7f [ 567.614773] ? update_sd_lb_stats.constprop.0+0xf2/0x3c0 [ 567.614780] svm_range_split_by_granularity.cold+0x2b/0x34 [amdgpu] [ 567.615047] ? srso_alias_return_thunk+0x5/0x7f [ 567.615052] svm_migrate_to_ram+0x185/0x4d0 [amdgpu] [ 567.615286] do_swap_page+0x7b6/0xa30 [ 567.615291] ? srso_alias_return_thunk+0x5/0x7f [ 567.615294] ? __free_pages+0x119/0x130 [ 567.615299] handle_pte_fault+0x227/0x280 [ 567.615303] __handle_mm_fault+0x3c0/0x720 [ 567.615311] handle_mm_fault+0x119/0x330 [ 567.615314] ? lock_mm_and_find_vma+0x44/0x250 [ 567.615318] do_user_addr_fault+0x1a9/0x640 [ 567.615323] exc_page_fault+0x81/0x1b0 [ 567.615328] asm_exc_page_fault+0x27/0x30 [ 567.615332] RIP: 0010:__get_user_8+0x1c/0x30

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9400
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:14
Updated-19 Dec, 2024 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gt1x_debug_write_proc and gt1x_tool_write of drivers/input/touchscreen/mediatek/GT1151/gt1x_generic.c and gt1x_tools.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-8839
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.05%
||
7 Day CHG~0.00%
Published-30 Apr, 2018 | 15:00
Updated-16 Sep, 2024 | 20:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Delta PMSoft versions 2.10 and prior have multiple stack-based buffer overflow vulnerabilities where a .ppm file can introduce a value larger than is readable by PMSoft's fixed-length stack buffer. This can cause the buffer to be overwritten, which may allow arbitrary code execution or cause the application to crash. CVSS v3 base score: 7.1; CVSS vector string: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H. Delta Electronics recommends affected users update to at least PMSoft v2.11, which was made available as of March 22, 2018, or the latest available version.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-pmsoftPMSoft
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-49845
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in HLOS

Memory corruption during the FRS UDS generation process.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1011_firmwarewcd9340_firmwaresa8775psnapdragon_765_5g_mobileqca6678aqwcd9385_firmwarewcn3988_firmwaresnapdragon_x35_5g_modem-rf_firmwareqca6431_firmwareqca6678aq_firmwareqam8295p_firmwareqca6698aq_firmwaresa8775p_firmwaresnapdragon_ar1_gen_1qfw7114_firmwarewsa8832_firmwareqcs615_firmwaresd_8_gen1_5g_firmwareqdx1010wcd9385snapdragon_x55_5g_modem-rf_firmwarewcd9340qsm8350qca6797aqqcs8550_firmwarefastconnect_6900snapdragon_865\+_5g_mobile_firmwaresm6650pqcn9274fastconnect_6200_firmwareqca6574_firmwareqfw7124_firmwareqca6595ausm7250p_firmwaresa8150pqca8337_firmwarewsa8835snapdragon_888\+_5g_mobile_firmwarear8035_firmwaresc8380xp_firmwaresa9000p_firmwarewcd9390sa8195psa6150pwcd9390_firmwarewcd9395snapdragon_x55_5g_modem-rfqcs5430_firmwaresm8650qsd865_5gqca6421_firmwareqca6688aqqca6574asnapdragon_x65_5g_modem-rfsnapdragon_x72_5g_modem-rfwsa8810_firmwaresxr2330pqru1062_firmwareqru1052_firmwareqdu1110_firmwarewsa8815fastconnect_6200qca6436_firmwaresm8650q_firmwaresa6155psa8155psa7255psa8650p_firmwareqcc710qca6797aq_firmwareqca6391_firmwarefastconnect_7800qcn6224wcn7881_firmwareqca6696_firmwaresnapdragon_888\+_5g_mobilesnapdragon_765_5g_mobile_firmwaresa9000psxr2330p_firmwarewsa8845hsrv1lqdx1011sa8540p_firmwaresrv1h_firmwaresnapdragon_888_5g_mobile_firmwareqca6174asm4635_firmwareqcn6274snapdragon_x62_5g_modem-rf_firmwaresm8750psa8530psm7675qca8081wsa8840_firmwarewsa8845qru1032qca6688aq_firmwaresm4635qam8620pqru1052sa8255p_firmwareqca6431snapdragon_8_gen_1_mobilesa8145p_firmwarewcd9380_firmwaresm8635p_firmwareqamsrv1hsa8650pqam8650pqdu1000wcd9370qca6574ausa6145psnapdragon_8_gen_1_mobile_firmwarewsa8815_firmwaresnapdragon_768g_5g_mobilewcn3950_firmwareqca8081_firmwareqcm5430_firmwaresa8620psnapdragon_8_gen_3_mobile_firmwareqmp1000qca6426_firmwaresa8150p_firmwaresrv1hwcn3950wcd9395_firmwareqdu1210_firmwaresm8635wcn7860_firmwaresnapdragon_x75_5g_modem-rfwcd9380qcs8550sa8770psm8635_firmwarewcn6650qdu1010_firmwaresnapdragon_auto_5g_modem-rf_gen_2qam8620p_firmwarewsa8840fastconnect_7800_firmwaresc8380xpsnapdragon_x35_5g_modem-rfqcs5430sm8635pqca6426qdu1110wsa8835_firmwaresm8735qru1032_firmwareqam8255p_firmwareqca6696snapdragon_765g_5g_mobilesc8280xp-abbb_firmwaresa6150p_firmwarewcn6755qcn6224_firmwaresd_8_gen1_5gqcs8300_firmwareqcs8300sa8295psm7675p_firmwareqep8111qca6174a_firmwareqdu1210qca8337fastconnect_6800_firmwaresm7250pwcd9378snapdragon_xr2_5gwcn6450sm7675_firmwarewcn6650_firmwareqca6698aqsm7675psnapdragon_888_5g_mobilewcn7860sxr2130_firmwarewsa8810sd865_5g_firmwaresnapdragon_768g_5g_mobile_firmwareqmp1000_firmwaresnapdragon_x32_5g_modem-rfsa7775pqam8775pqca6574a_firmwareqfw7124qca6595au_firmwarewcn7750_firmwareqcs9100sa8530p_firmwaresa8540psa8295p_firmwaresnapdragon_x65_5g_modem-rf_firmwareqca6574snapdragon_auto_5g_modem-rf_gen_2_firmwaresxr2130sm8750_firmwareqamsrv1h_firmwarefastconnect_6800qdu1010sa7255p_firmwarefastconnect_6700_firmwaresm8750p_firmwareqcm5430sm7635sm6650p_firmwareqcs9100_firmwaresnapdragon_x32_5g_modem-rf_firmwareqamsrv1mqca6436snapdragon_8_gen_3_mobilesnapdragon_765g_5g_mobile_firmwareqcn6274_firmwareqca6421qcm6490qcc710_firmwaresm8750sm6650_firmwaresrv1m_firmwarewcn7880qam8295psa8770p_firmwaresnapdragon_865\+_5g_mobileqcm6490_firmwaresc8280xp-abbbwcn7750wsa8845_firmwareqcm8550snapdragon_x72_5g_modem-rf_firmwarewcn7880_firmwareqca6391qca6595sa8620p_firmwarewsa8845h_firmwaresnapdragon_865_5g_mobile_firmwaresa6155p_firmwarewcn6450_firmwarewcn7861qam8775p_firmwareqca6584au_firmwareqca6584auqcs6490_firmwaresa8195p_firmwareqca6574au_firmwarewcd9370_firmwaresa8155p_firmwareqfw7114sm6650qam8255psnapdragon_870_5g_mobile_firmwaresm8735_firmwarewsa8832wcn6755_firmwareqep8111_firmwaresrv1mwcd9375qru1062sa7775p_firmwarear8035snapdragon_xr2_5g_firmwareqcs615wsa8830video_collaboration_vc3_platformqcm8550_firmwaresnapdragon_ar1_gen_1_firmwarewcd9375_firmwaresnapdragon_865_5g_mobilesrv1l_firmwarewcn7861_firmwaresa8255pfastconnect_6700video_collaboration_vc3_platform_firmwareqca6595_firmwarewcn7881qsm8350_firmwaresnapdragon_x75_5g_modem-rf_firmwaresnapdragon_x62_5g_modem-rfqdu1000_firmwareqcs6490snapdragon_870_5g_mobilewcn3988wsa8830_firmwareqam8650p_firmwaresm7635_firmwaresa8145pfastconnect_6900_firmwarewcd9378_firmwareqcn9274_firmwareqamsrv1m_firmwaresa6145p_firmwareqdx1010_firmwareSnapdragon
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-52351
Matching Score-4
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-7.8||HIGH
EPSS-0.01% / 3.16%
||
7 Day CHG~0.00%
Published-08 Apr, 2024 | 02:21
Updated-06 May, 2025 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ril service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t770t612sc7731et606t610sc9832eandroids8000sc9863at310t820t616t618t760SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000t310t820t616t770t610t612t606s8000sc9832et760sc7731esc9863at618
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9376
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.56%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 20:59
Updated-18 Dec, 2024 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9393
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 17:17
Updated-18 Dec, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In procfile_write of drivers/misc/mediatek/connectivity/wlan/gen2/os/linux/gl_proc.c, there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-42255
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.12%
||
7 Day CHG~0.00%
Published-30 Dec, 2022 | 00:00
Updated-23 Apr, 2025 | 16:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncCitrix (Cloud Software Group, Inc.)Red Hat, Inc.VMware (Broadcom Inc.)
Product-linux_kernelenterprise_linux_kernel-based_virtual_machinevirtual_gpuhypervisorvspherecloud_gamingvGPU software (guest driver) - Linux, vGPU software (Virtual GPU Manager), NVIDIA Cloud Gaming (guest driver), NVIDIA Cloud Gaming (Virtual GPU Manager)
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2018-9462
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:39
Updated-19 Dec, 2024 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In store_cmd of ftm4_pdc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9392
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 17:15
Updated-19 Dec, 2024 | 17:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In get_binary of vendor/mediatek/proprietary/hardware/connectivity/gps/gps_hal/src/data_coder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9388
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.05%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 22:22
Updated-19 Dec, 2024 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In store_upgrade and store_cmd of drivers/input/touchscreen/stm/ftm4_pdc.c, there are out of bound writes due to missing bounds checks or integer underflows. These could lead to escalation of privilege.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2018-9370
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.17%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 19:20
Updated-22 Nov, 2024 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In download.c there is a special mode allowing user to download data into memory and causing possible memory corruptions due to missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9463
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:40
Updated-19 Dec, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In sw49408_irq_runtime_engine_debug of touch_sw49408.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9414
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.71%
||
7 Day CHG~0.00%
Published-02 Dec, 2024 | 21:09
Updated-18 Dec, 2024 | 19:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gattServerSendResponseNative of com_android_bluetooth_gatt.cpp, there is a possible out of bounds stack write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-4498
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 8.41%
||
7 Day CHG~0.00%
Published-10 May, 2025 | 10:00
Updated-23 Oct, 2025 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Simple Bus Reservation System Install Bus install stack-based overflow

A vulnerability classified as critical has been found in code-projects Simple Bus Reservation System 1.0. Affected is the function a::install of the component Install Bus. The manipulation of the argument bus leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Fabian RosSource Code & Projects
Product-simple_bus_reservation_systemSimple Bus Reservation System
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9398
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.80%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:11
Updated-19 Dec, 2024 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In fm_set_stat of mediatek FM radio driver, there is a possible OOB write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9558
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.58%
||
7 Day CHG~0.00%
Published-06 Dec, 2018 | 14:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In rw_t2t_handle_tlv_detect of rw_t2t_ndef.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege in the NFC kernel with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-112161557.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-52531
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.53%
||
7 Day CHG~0.00%
Published-02 Mar, 2024 | 21:52
Updated-04 May, 2025 | 07:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wifi: iwlwifi: mvm: Fix a memory corruption issue

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: Fix a memory corruption issue A few lines above, space is kzalloc()'ed for: sizeof(struct iwl_nvm_data) + sizeof(struct ieee80211_channel) + sizeof(struct ieee80211_rate) 'mvm->nvm_data' is a 'struct iwl_nvm_data', so it is fine. At the end of this structure, there is the 'channels' flex array. Each element is of type 'struct ieee80211_channel'. So only 1 element is allocated in this array. When doing: mvm->nvm_data->bands[0].channels = mvm->nvm_data->channels; We point at the first element of the 'channels' flex array. So this is fine. However, when doing: mvm->nvm_data->bands[0].bitrates = (void *)((u8 *)mvm->nvm_data->channels + 1); because of the "(u8 *)" cast, we add only 1 to the address of the beginning of the flex array. It is likely that we want point at the 'struct ieee80211_rate' allocated just after. Remove the spurious casting so that the pointer arithmetic works as expected.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9366
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.05% / 13.87%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 19:13
Updated-22 Nov, 2024 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In IMSA_Recv_Thread and VT_IMCB_Thread of ImsaClient.cpp and VideoTelephony.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2018-9371
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.09% / 26.36%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 19:22
Updated-22 Nov, 2024 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Mediatek Preloader, there are out of bounds reads and writes due to an exposed interface that allows arbitrary peripheral memory mapping with insufficient blacklisting/whitelisting. This could lead to local elevation of privilege, given physical access to the device with no additional execution privileges needed. User interaction is needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2018-9560
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.88%
||
7 Day CHG~0.00%
Published-06 Dec, 2018 | 14:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In HID_DevAddRecord of hidd_api.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth service with User execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-79946737.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9402
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.8||HIGH
EPSS-0.05% / 15.93%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 23:27
Updated-19 Dec, 2024 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of gl_proc.c, there is a buffer overwrite due to a missing bounds check. This could lead to escalation of privileges in the kernel.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-9471
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 33.93%
||
7 Day CHG~0.00%
Published-20 Nov, 2024 | 17:16
Updated-18 Dec, 2024 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2018-9395
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 17:20
Updated-18 Dec, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In mtk_cfg80211_vendor_packet_keep_alive_start and mtk_cfg80211_vendor_set_config of drivers/misc/mediatek/connectivity/wlan/gen2/os/linux/gl_vendor.c, there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-52775
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.54%
||
7 Day CHG~0.00%
Published-21 May, 2024 | 15:30
Updated-23 Sep, 2025 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
net/smc: avoid data corruption caused by decline

In the Linux kernel, the following vulnerability has been resolved: net/smc: avoid data corruption caused by decline We found a data corruption issue during testing of SMC-R on Redis applications. The benchmark has a low probability of reporting a strange error as shown below. "Error: Protocol error, got "\xe2" as reply type byte" Finally, we found that the retrieved error data was as follows: 0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C 0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2 It is quite obvious that this is a SMC DECLINE message, which means that the applications received SMC protocol message. We found that this was caused by the following situations: client server ¦ clc proposal -------------> ¦ clc accept <------------- ¦ clc confirm -------------> wait llc confirm send llc confirm ¦failed llc confirm ¦ x------ (after 2s)timeout wait llc confirm rsp wait decline (after 1s) timeout (after 2s) timeout ¦ decline --------------> ¦ decline <-------------- As a result, a decline message was sent in the implementation, and this message was read from TCP by the already-fallback connection. This patch double the client timeout as 2x of the server value, With this simple change, the Decline messages should never cross or collide (during Confirm link timeout). This issue requires an immediate solution, since the protocol updates involve a more long-term solution.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-21869
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.97%
||
7 Day CHG~0.00%
Published-27 Mar, 2025 | 13:38
Updated-29 Oct, 2025 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
powerpc/code-patching: Disable KASAN report during patching via temporary mm

In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Disable KASAN report during patching via temporary mm Erhard reports the following KASAN hit on Talos II (power9) with kernel 6.13: [ 12.028126] ================================================================== [ 12.028198] BUG: KASAN: user-memory-access in copy_to_kernel_nofault+0x8c/0x1a0 [ 12.028260] Write of size 8 at addr 0000187e458f2000 by task systemd/1 [ 12.028346] CPU: 87 UID: 0 PID: 1 Comm: systemd Tainted: G T 6.13.0-P9-dirty #3 [ 12.028408] Tainted: [T]=RANDSTRUCT [ 12.028446] Hardware name: T2P9D01 REV 1.01 POWER9 0x4e1202 opal:skiboot-bc106a0 PowerNV [ 12.028500] Call Trace: [ 12.028536] [c000000008dbf3b0] [c000000001656a48] dump_stack_lvl+0xbc/0x110 (unreliable) [ 12.028609] [c000000008dbf3f0] [c0000000006e2fc8] print_report+0x6b0/0x708 [ 12.028666] [c000000008dbf4e0] [c0000000006e2454] kasan_report+0x164/0x300 [ 12.028725] [c000000008dbf600] [c0000000006e54d4] kasan_check_range+0x314/0x370 [ 12.028784] [c000000008dbf640] [c0000000006e6310] __kasan_check_write+0x20/0x40 [ 12.028842] [c000000008dbf660] [c000000000578e8c] copy_to_kernel_nofault+0x8c/0x1a0 [ 12.028902] [c000000008dbf6a0] [c0000000000acfe4] __patch_instructions+0x194/0x210 [ 12.028965] [c000000008dbf6e0] [c0000000000ade80] patch_instructions+0x150/0x590 [ 12.029026] [c000000008dbf7c0] [c0000000001159bc] bpf_arch_text_copy+0x6c/0xe0 [ 12.029085] [c000000008dbf800] [c000000000424250] bpf_jit_binary_pack_finalize+0x40/0xc0 [ 12.029147] [c000000008dbf830] [c000000000115dec] bpf_int_jit_compile+0x3bc/0x930 [ 12.029206] [c000000008dbf990] [c000000000423720] bpf_prog_select_runtime+0x1f0/0x280 [ 12.029266] [c000000008dbfa00] [c000000000434b18] bpf_prog_load+0xbb8/0x1370 [ 12.029324] [c000000008dbfb70] [c000000000436ebc] __sys_bpf+0x5ac/0x2e00 [ 12.029379] [c000000008dbfd00] [c00000000043a228] sys_bpf+0x28/0x40 [ 12.029435] [c000000008dbfd20] [c000000000038eb4] system_call_exception+0x334/0x610 [ 12.029497] [c000000008dbfe50] [c00000000000c270] system_call_vectored_common+0xf0/0x280 [ 12.029561] --- interrupt: 3000 at 0x3fff82f5cfa8 [ 12.029608] NIP: 00003fff82f5cfa8 LR: 00003fff82f5cfa8 CTR: 0000000000000000 [ 12.029660] REGS: c000000008dbfe80 TRAP: 3000 Tainted: G T (6.13.0-P9-dirty) [ 12.029735] MSR: 900000000280f032 <SF,HV,VEC,VSX,EE,PR,FP,ME,IR,DR,RI> CR: 42004848 XER: 00000000 [ 12.029855] IRQMASK: 0 GPR00: 0000000000000169 00003fffdcf789a0 00003fff83067100 0000000000000005 GPR04: 00003fffdcf78a98 0000000000000090 0000000000000000 0000000000000008 GPR08: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 GPR12: 0000000000000000 00003fff836ff7e0 c000000000010678 0000000000000000 GPR16: 0000000000000000 0000000000000000 00003fffdcf78f28 00003fffdcf78f90 GPR20: 0000000000000000 0000000000000000 0000000000000000 00003fffdcf78f80 GPR24: 00003fffdcf78f70 00003fffdcf78d10 00003fff835c7239 00003fffdcf78bd8 GPR28: 00003fffdcf78a98 0000000000000000 0000000000000000 000000011f547580 [ 12.030316] NIP [00003fff82f5cfa8] 0x3fff82f5cfa8 [ 12.030361] LR [00003fff82f5cfa8] 0x3fff82f5cfa8 [ 12.030405] --- interrupt: 3000 [ 12.030444] ================================================================== Commit c28c15b6d28a ("powerpc/code-patching: Use temporary mm for Radix MMU") is inspired from x86 but unlike x86 is doesn't disable KASAN reports during patching. This wasn't a problem at the begining because __patch_mem() is not instrumented. Commit 465cabc97b42 ("powerpc/code-patching: introduce patch_instructions()") use copy_to_kernel_nofault() to copy several instructions at once. But when using temporary mm the destination is not regular kernel memory but a kind of kernel-like memory located in user address space. ---truncated---

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-21440
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:16
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Read in Windows WLAN Host

Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-aqt1000qcs5430wsa8810_firmwareqcm5430_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6700wsa8845snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwarewsa8845h_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8840fastconnect_7800qca6391sc8180x\+sdx55_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwareqca1064_firmwarefastconnect_6800sm6250_firmwareqcc2073_firmwareqca1062qca2062wcd9385snapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwarewcd9385_firmwareqcm6490_firmwarevideo_collaboration_vc3_platform_firmwaresm6250wsa8840_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwareqcs6490wcd9370_firmwareqca6430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_8cx_compute_platform_\(sc8180x-aa\)wcd9370wsa8815wsa8845hsnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"sc8380xp_firmwarefastconnect_6700_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwarewcd9341wsa8810qca2064_firmwareaqt1000_firmwareqcm5430wcd9380snapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwarefastconnect_6800_firmwarewsa8815_firmwarefastconnect_6900_firmwarewsa8845_firmwareqca6391_firmwareqca6430_firmwareqcc2073wcd9375snapdragon_7c\+_gen_3_compute_firmwarewcd9340qca1064snapdragon_8cx_compute_platform_\(sc8180xp-af\)qcs5430_firmwarevideo_collaboration_vc3_platformqca2066fastconnect_7800_firmwareqca6420qca2065wcd9340_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwareqcc2076_firmwareqca2064fastconnect_6900snapdragon_7c_compute_platform_\(sc7180-ac\)qca6420_firmwareqcm6490snapdragon_8cx_compute_platform_\(sc8180x-ab\)qca2066_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)snapdragon_8cx_compute_platform_\(sc8180xp-ac\)qca2062_firmwarewcd9341_firmwaresc8380xpsnapdragon_7c\+_gen_3_computesnapdragon_7c_compute_platform_\(sc7180-ac\)_firmwareqcc2076snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareqca2065_firmwareqcs6490_firmwaresc8180x\+sdx55snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)snapdragon_8c_compute_platform_\(sc8180xp-ad\)wcd9380_firmwarefastconnect_6200_firmwarefastconnect_6200qca1062_firmwarewcd9375_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-7514
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.92%
||
7 Day CHG~0.00%
Published-17 Apr, 2018 | 19:00
Updated-16 Sep, 2024 | 23:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.

Action-Not Available
Vendor-omronICS-CERT
Product-cx-flnetnetwork_configuratorcx-protocolcx-oneswitch_box_utilitycx-programmercx-serverOmron CX-One
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-48638
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 3.17%
||
7 Day CHG~0.00%
Published-08 Dec, 2025 | 16:57
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In __pkvm_load_tracing of trace.c, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47320
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.87%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 05:28
Updated-10 Feb, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Audio

Memory corruption while processing MFC channel configuration during music playback.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm5430sm7675snapdragon_x32_5g_modem-rf_systemsdm429w_firmwaresnapdragon_auto_5g_modem-rf_firmwareqcs6490snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarewsa8845qcm6490_firmwaresm4635sm7250pqcn9011_firmwaresa8650pwcn3980sd626_firmwaresnapdragon_auto_4g_modem_firmwaresm6650p_firmwareqcs610_firmwaresnapdragon_8\+_gen_2_mobile_platformqcm6125sa4155p_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwareqca6797aqsnapdragon_626_mobile_platform_firmwaresd660qam8775p_firmwarewcd9375fastconnect_7800qca8337_firmwarewcn3615_firmwaremsm8996ausa6145p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarecsra6620_firmwareqcm2290qca6698aqsdx55_firmwarewcn3620snapdragon_888_5g_mobile_platform_firmwarevision_intelligence_400_platformqca6584au_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sm7250p_firmwaresmart_display_200_platform_firmwaresa8145p_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewsa8815_firmwarewcd9390ar8031_firmwareqca6595ausnapdragon_x5_lte_modemrobotics_rb2_platformqam8295p_firmwareqcm6490qcs5430snapdragon_x75_5g_modem-rf_systemsa6155_firmwaresnapdragon_4_gen_1_mobile_platformqcn9011wsa8810_firmwarewcn3988_firmwareqcn9012_firmwareqca6564qca6574aqca8081qep8111_firmwareapq8017snapdragon_8_gen_3_mobile_platform_firmwaresnapdragon_x72_5g_modem-rf_systemqcs6490_firmwaresg8275pvideo_collaboration_vc1_platformfastconnect_6900_firmwarewcd9340_firmwareqcs8250_firmwareqrb5165msa7255pfastconnect_6900snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresnapdragon_720g_mobile_platformqca6584ausa8150psa8775psg4150psa8155pmdm9628snapdragon_x12_lte_modemsm7675p_firmwareqcm5430_firmwaresnapdragon_662_mobile_platform_firmwareqfw7124video_collaboration_vc5_platformqrb5165m_firmwaresnapdragon_626_mobile_platformsm7550p_firmwaresnapdragon_690_5g_mobile_platform_firmwarewcn3615csra6640snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresnapdragon_820_automotive_platformcsrb31024qca9367_firmwaresd865_5gqamsrv1h_firmwarewcd9360sm7550_firmwaresnapdragon_8_gen_2_mobile_platformsdx55qcm2290_firmwareqca6688aqsnapdragon_460_mobile_platformsrv1mqcs2290_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_765_5g_mobile_platform_\(sm7250-aa\)ar8035snapdragon_855_mobile_platform_firmwarefastconnect_6800_firmwarevision_intelligence_300_platformwcn3988qca6797aq_firmwaresnapdragon_660_mobile_platform_firmwaresa7775p_firmwarewsa8840_firmwarewcn3660b_firmwareqamsrv1msnapdragon_auto_5g_modem-rfwcn3990_firmwaresd660_firmwaremdm9640qca6678aq_firmwaresnapdragon_480_5g_mobile_platform_firmwaresg8275_firmwareqca6696_firmwareqca6391_firmwaresmart_audio_400_platformqcc710qcs7230_firmwarec-v2x_9150_firmwaresw5100p_firmwaresxr1120wcd9385qca6574wcn3910_firmwaresnapdragon_660_mobile_platformwcn6755snapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwarewcn6650_firmwarewcd9326_firmwareqfw7114_firmwaresm7550qcs410_firmwarerobotics_rb5_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)sm7325p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca6574a_firmwaresd855sd855_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwareqca6595_firmwareqam8650psa8775p_firmwarewcd9370qca6584_firmwareqcs8550_firmwarevideo_collaboration_vc3_platformwcn3990sm8550p_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)sa6150psw5100_firmwaresm6650vision_intelligence_200_platform_\(apq8053-ac\)_firmwareqcs5430_firmwaresw5100pwcd9326sg4150p_firmwareqca6678aqsdm429wsnapdragon_778g_5g_mobile_platformsnapdragon_xr1_platform_firmwareqca6688aq_firmwaresm8650qqca6564_firmwarewsa8835c-v2x_9150wcd9375_firmwarewsa8840snapdragon_x5_lte_modem_firmwarewcd9378qcn6274_firmwarefastconnect_6700_firmwaresa8770pmdm9250snapdragon_855_mobile_platformsa8195pqcs610qfw7124_firmwaresm7635sa8155p_firmwareqep8111mdm9250_firmwarerobotics_rb5_platform_firmwareqcn6224wcd9371vision_intelligence_200_platform_\(apq8053-ac\)flight_rb5_5g_platformqca9377sa6155psm7675_firmwarewcd9335_firmwareaqt1000_firmwaresa8620psm8635_firmwaresa2150psa8255pflight_rb5_5g_platform_firmwarequalcomm_215_mobile_platformqca6564asd865_5g_firmwaresnapdragon_625_mobile_platform_firmwarecsra6640_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcs8550sa6145psnapdragon_auto_5g_modem-rf_gen_2_firmwaresa8145pwsa8832qca6174asa7775psa8295pwcd9330wcn3980_firmwareqrb5165n_firmwaresa8150p_firmwarewcd9371_firmwarecsrb31024_firmwaresnapdragon_429_mobile_platformsm7635p_firmwarewsa8830sm7635psa8195p_firmwareqca6595qcm8550wcd9385_firmwarewsa8835_firmwareqamsrv1hsnapdragon_x35_5g_modem-rf_systemvideo_collaboration_vc1_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevision_intelligence_100_platform_\(apq8053-aa\)_firmwaresnapdragon_w5\+_gen_1_wearable_platform9206_lte_modem_firmwarewcn6650vision_intelligence_300_platform_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_720g_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)sm8635video_collaboration_vc3_platform_firmwarewsa8845h_firmwarewcn3950_firmwarewcn3680bsrv1hsnapdragon_auto_4g_modemsnapdragon_870_5g_mobile_platform_\(sm8250-ac\)ar8035_firmwaresm7675psnapdragon_680_4g_mobile_platformwsa8845hqca9367qam8295psa6155p_firmwarewcn3680b_firmwareqca6698aq_firmwarewcd9340wcn3910wcd9370_firmwaresw5100sa7255p_firmwarevision_intelligence_100_platform_\(apq8053-aa\)sm7550psa6150p_firmwareqcm6125_firmwaresnapdragon_auto_5g_modem-rf_gen_2wsa8832_firmwareqca6595au_firmwaresnapdragon_x12_lte_modem_firmwarevideo_collaboration_vc5_platform_firmwaremdm9628_firmwareqamsrv1m_firmwarewcd9390_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)sd626snapdragon_865_5g_mobile_platform_firmwareqcs2290snapdragon_429_mobile_platform_firmwaremsm8996au_firmwaresm8650q_firmwareqam8255p_firmwarerobotics_rb2_platform_firmwareapq8017_firmwarewcd9330_firmwaresmart_display_200_platformwsa8815fastconnect_6200_firmwaresm8550psnapdragon_778g_5g_mobile_platform_firmwareqrb5165nwcd9335csra6620qcs6125_firmwarewcn3950vision_intelligence_400_platform_firmwaresnapdragon_460_mobile_platform_firmwaresg8275p_firmwaresa4150psa6155wcd9395snapdragon_480_5g_mobile_platformfastconnect_6200snapdragon_690_5g_mobile_platformsnapdragon_888_5g_mobile_platformqcn9012snapdragon_x55_5g_modem-rf_system_firmwaresa4150p_firmwaresmart_audio_400_platform_firmwaresnapdragon_1200_wearable_platformqualcomm_215_mobile_platform_firmwaresnapdragon_xr2_5g_platformsnapdragon_1200_wearable_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarefastconnect_6800wsa8845_firmwaresa8770p_firmwareqca2066qfw7114sm8635psa4155pqcn6224_firmwareqca6564a_firmwareqam8775psnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwaresm8635p_firmwarewcd9378_firmwaresa9000psa8255p_firmware9206_lte_modemsnapdragon_x32_5g_modem-rf_system_firmwareqcs410sa8155_firmwareqca9377_firmwaresnapdragon_8_gen_3_mobile_platformsrv1m_firmwarewcn3660bsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_820_automotive_platform_firmwaresnapdragon_x55_5g_modem-rf_systemsxr1120_firmwaresm4635_firmwaresa8650p_firmwaresa2150p_firmwaresnapdragon_680_4g_mobile_platform_firmwarewcn6755_firmwareqca8337sm6650_firmwareqca6574ausm7325psnapdragon_xr2\+_gen_1_platformsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresnapdragon_625_mobile_platformqam8650p_firmwareqca8081_firmwareqcs8250sa8155qca6564au_firmwareaqt1000qcs6125snapdragon_695_5g_mobile_platformsnapdragon_xr1_platformsa9000p_firmwareqcm8550_firmwarewcd9360_firmwareqcc710_firmwarewcd9341_firmwareqam8255pfastconnect_6700snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)qca6391srv1h_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca2066_firmwaresm6650pqca6574au_firmwaresa8620p_firmwarewcd9341wcd9380snapdragon_xr2\+_gen_1_platform_firmwareqcs7230mdm9640_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwarewcd9380_firmwaresg8275sa8295p_firmwareqca6174a_firmwaresnapdragon_865_5g_mobile_platformwsa8830_firmwareqcn6274wcn3620_firmwareqca6584wcd9395_firmwareqca6564aufastconnect_7800_firmwareqca6696sm7635_firmwarewsa8810ar8031qca6574_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-42937
Matching Score-4
Assigner-Autodesk
ShareView Details
Matching Score-4
Assigner-Autodesk
CVSS Score-7.8||HIGH
EPSS-0.23% / 46.03%
||
7 Day CHG~0.00%
Published-21 Oct, 2022 | 00:00
Updated-07 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.

Action-Not Available
Vendor-n/aAutodesk Inc.
Product-autocad_civil_3dautocad_ltautocadautocad_mechanicalautocad_electricalautocad_plant_3ddesign_reviewautocad_advance_steelautocad_architectureautocad_mepautocad_map_3dAutodesk Design Review
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-46715
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.73%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 16:46
Updated-04 Aug, 2025 | 17:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sandboxie Arbitrary Kernel Write in SbieDrv.sys API (API_GET_SECURE_PARAM)

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_GetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to write to. GetRegValue then writes the contents of the SBIE registry entry selected to this address. An attacker can pass in a kernel pointer and the driver dumps the registry key contents we requested to it. This can be triggered by anyone on the system, including low integrity windows processes. Version 1.15.12 fixes the issue.

Action-Not Available
Vendor-sandboxie-plussandboxie-plus
Product-sandboxieSandboxie
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20798
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.38%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:46
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In battery, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10315812; Issue ID: MSV-5533.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6833mt6765mt8367androidmt6879mt6991mt6989mt6893mt6985mt6835mt8678mt8196mt6877mt8768mt8792mt8793mt8788emt8796mt6768mt8676mt8391mt6855mt2718mt6853mt8766mt8186mt8188mt8696mt8893mt8873mt8791tmt8883mt8786mt6781mt8781MT2718, MT6765, MT6768, MT6781, MT6833, MT6835, MT6853, MT6855, MT6877, MT6879, MT6893, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8367, MT8391, MT8676, MT8678, MT8696, MT8766, MT8768, MT8781, MT8786, MT8788E, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47367
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.87%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in WinBlast Driver

Memory corruption while accessing a buffer during IOCTL processing.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwareqcs6490wcd9375video_collaboration_vc3_platformwcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwareqcs5430x2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcd9370xg101039fastconnect_6900qcc2072_firmwareqcm6490_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwareqcs5430_firmwareqcm6490wsa8830wsa8840wsa8845_firmwarewcd9370_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwarex2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarewcd9375_firmwarexg101002_firmwarex2000092_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430qcs6490_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-42262
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.1||HIGH
EPSS-0.12% / 30.95%
||
7 Day CHG~0.00%
Published-30 Dec, 2022 | 00:00
Updated-11 Apr, 2025 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.

Action-Not Available
Vendor-Red Hat, Inc.Citrix (Cloud Software Group, Inc.)VMware (Broadcom Inc.)Linux Kernel Organization, IncNVIDIA Corporation
Product-linux_kernelgpu_display_driverenterprise_linux_kernel-based_virtual_machinevirtual_gpuhypervisornvsteslavspherequadrocloud_gaminggeforcertxvGPU software (Virtual GPU Manager), NVIDIA Cloud Gaming (Virtual GPU Manager)
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-20763
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.54%
||
7 Day CHG~0.00%
Published-02 Dec, 2025 | 02:34
Updated-26 Feb, 2026 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In mmdvfs, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10267218; Issue ID: MSV-5032.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6883mt6886mt8792mt6989mt6835mt6885mt6991mt8873mt8196mt6833mt6893mt8793mt6983mt8676mt6855mt6895mt8796mt6877mt6899mt6879mt6878mt6889mt8893mt6985mt8678androidmt6897mt6853MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793, MT8796, MT8873, MT8893
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47346
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.72%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 22:48
Updated-27 Jan, 2026 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in HLOS

Memory corruption while processing a secure logging command in the trusted application.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9375_firmwaresm8735_firmwareqam8295p_firmwareqcm5430wcn3988_firmwaresm8650q_firmwaresa7255p_firmwareqca6595au_firmwareqam8620psnapdragon_8_gen_3_mobile_platformqam8255pwcd9375qca6574wcn7860_firmwaresnapdragon_4_gen_2_mobile_platform_firmwarewcn7861qca6574au_firmwaresm7635psm8635p_firmwaresc8380xpsa8650p_firmwaresrv1lqca8081qam8775p_firmwaresm6650_firmwarewcn7880snapdragon_auto_5g_modem-rf_gen_2_firmwareqca6174asa6155p_firmwarewsa8845_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqamsrv1msnapdragon_ar1_gen_1_platform_\"luna1\"_firmwareqamsrv1h_firmwaresm8635psnapdragon_8_gen_3_mobile_platform_firmwarewcn7750sm8635_firmwareqca6574awcd9395_firmwarewcn7881_firmwaresm8750sm4635_firmwaresa9000pqam8255p_firmwaresa8195p_firmwarewsa8810_firmwaresa8150p_firmwareqca6174a_firmwareqca6595ausrv1h_firmwareqca8081_firmwaresa8155p_firmwareqca6696_firmwareqca6584au_firmwareqfw7114sm6650psm8750p_firmwaresnapdragon_x35_5g_modem-rf_systemsnapdragon_ar1_gen_1_platform_firmwaresa6145p_firmwareqcs5430wcn7860sxr2330psa7775psa8295p_firmwareqcs9100qca6698aq_firmwarewsa8835_firmwaresnapdragon_6_gen_1_mobile_platformqcm5430_firmwarewcn7881qca6584auqca6797aq_firmwaresa8775pqcs9100_firmwaresm6650p_firmwareqfw7124_firmwaresxr2330p_firmwareqfw7114_firmwaresrv1mfastconnect_6200_firmwaresa6150p_firmwareqam8650pqca6574_firmwareqam8650p_firmwarewsa8810qca6574auwcn6755_firmwareqca6574a_firmwaresnapdragon_x75_5g_modem-rf_systemwsa8845hqam8775pqca8337_firmwaresm7635_firmwarewcn3950_firmwarewcn7750_firmwarewcn3950sm6650sm7635p_firmwarefastconnect_6700_firmwaresa8650pfastconnect_6900_firmwaresrv1m_firmwarewcn6650qcm6490_firmwareqca6678aq_firmwaresm7435_firmwareqca6797aqwcd9340_firmwarefastconnect_6200srv1hsm8735sxr2350pwcn6650_firmwaresm7635snapdragon_x75_5g_modem-rf_system_firmwaresm8635srv1l_firmwaresnapdragon_4_gen_2_mobile_platformfastconnect_6900sa8155psm8750pqep8111qcn6274qep8111_firmwarewsa8832sa8775p_firmwaresm7675_firmwareqcc710_firmwareqcn6224wcd9370wcd9390fastconnect_7800wcn6755sa8145p_firmwarewsa8832_firmwareqamsrv1hsa8540p_firmwaresa8150pqca6698aqsa8255pwsa8840sa7255psm8750_firmwaresa6155psnapdragon_x32_5g_modem-rf_system_firmwaresm7435ar8035qca6688aq_firmwaresnapdragon_6_gen_1_mobile_platform_firmwarewsa8830sa8540psm7675pqmp1000wcd9385sa6145pqcs5430_firmwareqca6688aqsnapdragon_auto_5g_modem-rf_gen_2wcd9340sa8770p_firmwaresm6475fastconnect_7800_firmwaresnapdragon_ar1_gen_1_platformqcs6490qca6678aqsnapdragon_x35_5g_modem-rf_system_firmwarewsa8830_firmwareqamsrv1m_firmwaresa9000p_firmwareqmp1000_firmwarewsa8840_firmwarewsa8815_firmwarewsa8835wcn7880_firmwarewcd9385_firmwareqca8337sa8620pqfw7124qam8295pqca6595qca6696wcd9380_firmwarewcn3988qcn6224_firmwareqca6595_firmwarevideo_collaboration_vc3_platformsnapdragon_x72_5g_modem-rf_systemsm7675qcm6490sm7675p_firmwareqcs6490_firmwarewsa8815wcd9378_firmwaresa8145pqcs615_firmwarewcd9370_firmwaresa8195par8035_firmwarewsa8845sa8620p_firmwaresm6475_firmwareqcc710snapdragon_x32_5g_modem-rf_systemwsa8845h_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"qam8620p_firmwaresm4635qcs615sa6150pwcd9378sxr2350p_firmwarewcd9395sa8770psc8380xp_firmwarewcd9380sa7775p_firmwaresa8255p_firmwaresa8295pfastconnect_6700qcn6274_firmwarewcd9390_firmwarewcn7861_firmwaresm8650qSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • ...
  • 13
  • 14
  • 15
  • ...
  • 26
  • 27
  • Next
Details not found