Memory corruption while handling user packets during VBO bind operation.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Memory corruption while handling user packets during VBO bind operation.
Version | Base score | Base severity | Vector |
---|---|---|---|
3.1 | 8.4 | HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html | x_transferred |
Memory corruption while handling user packets during VBO bind operation.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.1 | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Secondary | 3.1 | 8.4 | HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Hyperlink | Source | Resource |
---|---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html | product-security@qualcomm.com | Patch Vendor Advisory |