Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-52060

Summary
Assigner-RTI
Assigner Org ID-3f572a00-62e2-4423-959a-7ea25eff1638
Published At-13 Dec, 2024 | 10:19
Updated At-07 Feb, 2025 | 21:48
Rejected At-
Credits

Potential stack overflow when using XML configuration file referencing environment variables

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service, Recording Service, Queuing Service, Observability Collector Service, Cloud Discovery Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.1.45.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:RTI
Assigner Org ID:3f572a00-62e2-4423-959a-7ea25eff1638
Published At:13 Dec, 2024 | 10:19
Updated At:07 Feb, 2025 | 21:48
Rejected At:
▼CVE Numbering Authority (CNA)
Potential stack overflow when using XML configuration file referencing environment variables

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service, Recording Service, Queuing Service, Observability Collector Service, Cloud Discovery Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.1.45.

Affected Products
Vendor
RTI
Product
Connext Professional
Modules
  • Routing Service
  • Recording Service
  • Queuing Service
  • Observability Collector Service
  • Cloud Discovery Service
Default Status
unaffected
Versions
Affected
  • From 7.0.0 before 7.3.0.5 (custom)
  • From 6.1.0 before 6.1.2.21 (custom)
  • From 6.0.0 before 6.0.1.40 (custom)
  • From 5.3.0 before 5.3.1.45 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-120CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Type: CWE
CWE ID: CWE-120
Description: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Metrics
VersionBase scoreBase severityVector
4.08.3HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-10CAPEC-10 Buffer Overflow via Environment Variables
CAPEC ID: CAPEC-10
Description: CAPEC-10 Buffer Overflow via Environment Variables
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.rti.com/vulnerabilities/#cve-2024-52060
N/A
Hyperlink: https://www.rti.com/vulnerabilities/#cve-2024-52060
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:3f572a00-62e2-4423-959a-7ea25eff1638
Published At:13 Dec, 2024 | 11:15
Updated At:02 Oct, 2025 | 13:36

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Routing Service, Recording Service, Queuing Service, Observability Collector Service, Cloud Discovery Service) allows Buffer Overflow via Environment Variables.This issue affects Connext Professional: from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.1.45.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.3HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 8.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

rti
rti
>>connext_professional>>Versions from 5.3.0(inclusive) to 5.3.1.45(exclusive)
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
rti
rti
>>connext_professional>>Versions from 6.0.0(inclusive) to 6.0.1.40(exclusive)
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
rti
rti
>>connext_professional>>Versions from 6.1.0(inclusive) to 6.1.2.21(exclusive)
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
rti
rti
>>connext_professional>>Versions from 7.0.0(inclusive) to 7.3.0.5(exclusive)
cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Secondary3f572a00-62e2-4423-959a-7ea25eff1638
CWE ID: CWE-120
Type: Secondary
Source: 3f572a00-62e2-4423-959a-7ea25eff1638
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.rti.com/vulnerabilities/#cve-2024-520603f572a00-62e2-4423-959a-7ea25eff1638
Vendor Advisory
Hyperlink: https://www.rti.com/vulnerabilities/#cve-2024-52060
Source: 3f572a00-62e2-4423-959a-7ea25eff1638
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

377Records found

CVE-2023-29414
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.85%
||
7 Day CHG~0.00%
Published-12 Jul, 2023 | 08:18
Updated-07 Nov, 2024 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-120: Buffer Copy without Checking Size of Input (Classic Buffer Overflow) vulnerability exists that could cause user privilege escalation if a local user sends specific string input to a local function call.

Action-Not Available
Vendor-
Product-accutech_managerAccutech Manageraccutech_manager
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28580
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.88%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:03
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in WLAN Host

Memory corruption in WLAN Host while setting the PMK length in PMK length in internal cache.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresa6155p_firmwareqam8295p_firmwareqcs610_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696wsa8830_firmwarewcd9340_firmwareqfw7124_firmwarewcd9341_firmwareqcc710_firmwarewsa8815_firmwaresa8195p_firmwarewcd9370_firmwareqca8337_firmwareqca8337wcn3660bqca6574au_firmwaresa8195pqca6595auwcd9340qam8295pwcd9341qca6574auwcn3950wsa8810_firmwarewcn3988wcn3980_firmwareqcn6274wcn3660b_firmwareqfw7124snapdragon_x75_5g_modem-rf_systemwsa8835qca6595au_firmwareqca6391_firmwaresw5100p_firmwaresa8295p_firmwareqca6696_firmwarewcd9380_firmwaresa6150pqcs410sa8155p_firmwareqca8081wsa8815video_collaboration_vc1_platform_firmwaresa8155pwcn3680b_firmwarewsa8830qcn6274_firmwaresa6145pqcc710sw5100_firmwarear8035qfw7114_firmwarefastconnect_6900fastconnect_7800_firmwareqca6391video_collaboration_vc1_platformqcn6224qfw7114wcn3950_firmwarefastconnect_6900_firmwaresa8295psnapdragon_8_gen_1_mobile_platformwcd9380sa6145p_firmwarefastconnect_7800sa8145p_firmwarewcn3680bsa8150psnapdragon_8_gen_1_mobile_platform_firmwaresa8150p_firmwarewcn3988_firmwaresa6155pvideo_collaboration_vc3_platform_firmwaresa8145pwsa8835_firmwarewsa8810snapdragon_x75_5g_modem-rf_system_firmwarewcn3980sw5100video_collaboration_vc3_platformqcn6224_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28570
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.21%
||
7 Day CHG~0.00%
Published-07 Nov, 2023 | 05:26
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking Size of Input in Audio

Memory corruption while processing audio effects.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sdm429w_firmwareqcs410_firmwaresa6150p_firmwaresd865_5gsnapdragon_429_mobile_platform_firmwaresw5100pqca6595qcs610_firmwarewcd9335sxr2130_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696wcd9340_firmwarewcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320qcc710_firmwareqca6426qca6564auwcn3610qcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwareqca6574au_firmwareqam8295pwcd9341qca6574ausnapdragon_855_mobile_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformsnapdragon_835_mobile_pc_platform_firmwarewcn3660b_firmwareqca6554afastconnect_6800_firmwaresa8295p_firmwaresd835_firmwarevideo_collaboration_vc1_platform_firmwareqca6584auqca6320_firmwareqcn6274_firmwareqcc710sw5100_firmwareqca6310_firmwarefastconnect_6800qfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwarefastconnect_6900video_collaboration_vc1_platformqfw7114snapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqca6310wcd9380sa6145p_firmwaresnapdragon_xr2_5g_platform_firmwaresa8150pmsm8996au_firmwaresa6155psnapdragon_835_mobile_pc_platformqca6564au_firmwarewsa8810snapdragon_865\+_5g_mobile_platformsw5100video_collaboration_vc3_platformqca6595auaqt1000snapdragon_865_5g_mobile_platform_firmwaresa6155p_firmwareqam8295p_firmwaresd855sd835wcn3990_firmwaresnapdragon_870_5g_mobile_platform_firmwareqfw7124_firmwareqca6564a_firmwareqca6436_firmwaresnapdragon_wear_4100\+_platform_firmwarewcn3610_firmwaresnapdragon_855\+\/860_mobile_platform_firmwareqca6420snapdragon_865\+_5g_mobile_platform_firmwareqca6430wcd9370_firmwaresdx55_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6554a_firmwarewcn3660bqca6574asxr2130wcn3620_firmwaresa8195pwcd9340snapdragon_820_automotive_platform_firmwaresnapdragon_855_mobile_platform_firmwareqca6420_firmwareaqt1000_firmwarewcn3988sdm429wqca6584au_firmwaresd855_firmwareqcn6274qca6436qca6574qfw7124snapdragon_x75_5g_modem-rf_systemqca6595au_firmwareqca6391_firmwarewcd9335_firmwarewsa8835qca6430_firmwaresnapdragon_870_5g_mobile_platformsw5100p_firmwareqca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwaresa6150pqca6574_firmwareqcs410sa8155p_firmwareqca8081qca6564awsa8815mdm9628sa8155pwcn3980_firmwarewsa8830mdm9628_firmwaresa6145pqcn9074_firmwarear8035qca6574a_firmwaresdx55msm8996auwcn3620qca6391qcn6224wcn3950_firmwaresa8295pfastconnect_6200fastconnect_7800sa8145p_firmwarewcn3680bsd865_5g_firmwaresa8150p_firmwaresnapdragon_855\+\/860_mobile_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_wear_4100\+_platformwsa8835_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformfastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcn6224_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30981
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.75% / 73.19%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 18:51
Updated-03 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.1, Security Update 2021-008 Catalina, macOS Big Sur 11.6.2. An application may be able to execute arbitrary code with kernel privileges.

Action-Not Available
Vendor-Apple Inc.
Product-macosmac_os_xmacOS
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28559
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.58%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in WLAN HAL

Memory corruption in WLAN FW while processing command parameters from untrusted WMI payload.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaresa6150p_firmwaresm6250p_firmwareqcs610ipq4028_firmwareqcn5550ar9380ipq8173_firmwarewcd9360_firmwareqcn5124qca4024_firmwarewcn3950_firmwareimmersive_home_318_platform_firmwaresc8180x\+sdx55ipq8078aipq5028_firmwaresm4450_firmwaresa8150p_firmwareqca6595au_firmwareqcs2290sa6155snapdragon_480_5g_mobile_platformqca6335qcn5064sd_455_firmwarehome_hub_100_platformcsra6620_firmwaresd_675_firmwarecsra6640_firmwaresnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca9987_firmwareqca6554a_firmwarewcd9371_firmwarewcn3950qcn6024_firmwaresm4125ipq8076aimmersive_home_316_platform_firmwaresnapdragon_730_mobile_platform_snapdragon_460_mobile_platformsnapdragon_660_mobile_platform_firmwaresd460_firmwareqca6428qualcomm_robotics_rb3_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwareqcn5164_firmwaresnapdragon_636_mobile_platformipq8071wcd9375_firmwareqca8081_firmwaresa6155_firmwareqca6420wcd9360qca6438_firmwareqca9986snapdragon_auto_5g_modem-rf_firmwareipq8070_firmwareipq8065ipq8078a_firmwaresmart_audio_400_platform_firmwarewcn3999ipq5028qca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwareipq8068snapdragon_765g_5g_mobile_platformqca6430snapdragon_630_mobile_platformsnapdragon_678_mobile_platform_firmwarewcd9340snapdragon_8cx_compute_platformsnapdragon_720g_mobile_platformqcn6132sw5100home_hub_100_platform_firmwaresa6155psnapdragon_690_5g_mobile_platformmdm9250_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwarewcd9371qcn5154_firmwarewcn3910_firmwaresd_8cxsnapdragon_855_mobile_platform_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd660sd855_firmwarewcn3988qca6438sd660_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwarefastconnect_6800_firmwareqcn5022_firmwareqcn7606_firmwaresnapdragon_7c_gen_2_compute_platform_firmwareqca9898immersive_home_216_platform_firmwareipq4028qca4010_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqca6428_firmwareqca9985_firmwareipq4018_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100psnapdragon_8cx_gen_2_5g_compute_platformipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platformipq8078qca6564auipq8173snapdragon_670_mobile_platform_firmwareqcn5164sd670_firmwareqca6574csr8811_firmwarewcd9380fastconnect_6700qcs410qcn5024ipq4019_firmwaresnapdragon_765_5g_mobile_platform_qca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815wcn3910qca6320snapdragon_630_mobile_platform_firmwareqca9986_firmwaresnapdragon_4_gen_1_mobile_platformsm4450qca9984ipq6028ipq8064sd835snapdragon_670_mobile_platformqcn9024wcn3980_firmwaresd730qcn5550_firmwareipq8064_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_8cx_compute_platform_firmwareqcn5064_firmwareqcs4490_firmwarear8031_firmwareipq8078_firmwarefastconnect_6900fastconnect_6900_firmwareipq8070snapdragon_660_mobile_platformqca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwarewsa8832qcn7605_firmwaresw5100p_firmwareqcs610_firmwareipq6018qca9886_firmwaresnapdragon_765_5g_mobile_platform__firmwarear8031immersive_home_214_platformqcs4490qca6595_firmwaresa8145psnapdragon_750g_5g_mobile_platformqca6391_firmwaresnapdragon_710_mobile_platform_firmwareimmersive_home_214_platform_firmwareqca4024wcd9370_firmwaresdx55sa8155pcsra6640sd675snapdragon_695_5g_mobile_platformsnapdragon_860_mobile_platformsnapdragon_720g_mobile_platform_firmwaresnapdragon_855_mobile_platformqcm2290snapdragon_480\+_5g_mobile_platformqcn7606qcn5024_firmwarewsa8830snapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwaresnapdragon_855\+_mobile_platform_firmwaresnapdragon_850_mobile_compute_platformqcs2290_firmwarecsra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290snapdragon_860_mobile_platform_firmwaremdm9250qca6420_firmwareipq8069_firmwaresnapdragon_855\+_mobile_platformipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6584au_firmwarewcn3990_firmwareqcn9000_firmwareqca9984_firmwareqca9377qualcomm_robotics_rb3_platformsd_8cx_firmwarewcd9385_firmwareqcn7605wcd9326_firmwarefastconnect_6200immersive_home_216_platformimmersive_home_316_platformsnapdragon_7c_gen_2_compute_platformipq8074aimmersive_home_318_platformsd662qcn5124_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6320_firmwaresnapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareipq5010qca6564au_firmwareqca6584ausa6155p_firmwareqca6310ipq8174qca9990qcn5052vision_intelligence_300_platform_firmwarewcn3988_firmwareqcn9074sm6250fastconnect_6700_firmwaresa8195psxr1120wsa8810_firmwarevision_intelligence_400_platformwcd9326wcd9335qca4010sg4150pqca8081qcm4490qcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385snapdragon_665_mobile_platform_firmwareqca9898_firmwarewcd9375csr8811aqt1000ipq4019sc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwareqcn9100_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformvision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_636_mobile_platform_firmwaresxr1120_firmwareqca6564asg4150p_firmwaresnapdragon_730_mobile_platform__firmwareqcm6125_firmwareqcm4325qcm2290_firmwaresnapdragon_845_mobile_platformwcn3990qcn9000sd_675qca6554afastconnect_6800qca6595ar9380_firmwaresnapdragon_835_mobile_pc_platformqcn9012snapdragon_8c_compute_platformqcn6122_firmwareipq8065_firmwarewsa8835snapdragon_auto_5g_modem-rfsm6250psnapdragon_678_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwareqcn5154qca8075_firmwareipq4018smart_audio_400_platformqca6574aqca9889qcn6132_firmwareqca9888qca6310_firmwareipq8074qca9994_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886sd855sm4125_firmwareipq8076qca6574a_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformfastconnect_6200_firmwareipq8069qcn5152vision_intelligence_300_platformsnapdragon_x55_5g_modem-rf_system_firmwaresd460qca6391snapdragon_710_mobile_platformsnapdragon_7c_compute_platform_firmwareaqt1000_firmwareqcn9100qcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290wsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwareipq6028_firmwareipq8072a_firmwaresd_455ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122wcd9341_firmwareqcm6125wsa8810snapdragon_765g_5g_mobile_platform_firmwaresnapdragon_712_mobile_platformsnapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformqcn5022snapdragon_8c_compute_platform_firmwaresd835_firmwaresnapdragon_675_mobile_platformipq6010_firmwareqca6696snapdragon_732g_mobile_platformsnapdragon_x50_5g_modem-rf_systemsa6150pqca8075qcn9022_firmwaresnapdragon_768g_5g_mobile_platformqcn6024qcn9022qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwaresw5100_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwareipq4029snapdragon_7c_compute_platformsnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28741
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.9||HIGH
EPSS-0.09% / 24.92%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:06
Updated-02 Aug, 2024 | 13:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aMicrosoft CorporationIntel Corporation
Product-windowsquickassist_technology_libraryquickassist_technology_firmwarequickassist_technologyIntel(R) QAT drivers for Windows - HW Version 1.0
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28560
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 6.73%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in WLAN HAL

Memory corruption in WLAN HAL while processing devIndex from untrusted WMI payload.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-s820aqca9377_firmwaresnapdragon_850_mobile_compute_platform_firmwaremdm9640_firmwaresm6250p_firmwareipq4028_firmware8098ar9380ipq8173_firmwareqcn5124wcn3950_firmwaresc8180x\+sdx55sm4450_firmwareqca6595au_firmwaresa6155sd_455_firmwareapq8076qcs6125_firmwaresm4375wcn3998sc8180xp-adwcd9371_firmwarewcn3950qcn6024_firmwaresm4125immersive_home_316_platform_firmwaresm6375_firmwarewcn3660bsnapdragon_660_mobile_platform_firmwaresd460_firmware8998_firmwaresm4250-aasnapdragon_636_mobile_platformwcn3998_firmwareqca8081_firmwareqca6420sda845qca9986ipq8070_firmwareipq8065ipq8078a_firmwareipq8072_firmwaresc8180xp-aa_firmwaresa8155_firmwareqca4004_firmwareipq8068qca6430snapdragon_630_mobile_platformwcd9340snapdragon_808_processorsnapdragon_808_processor_firmwarewcn685x-1_firmwareqca9888_firmwareqcn6122sm8150_firmwaresnapdragon_810_processor_firmwareqca6696_firmwarewcd9371sc8180x-abqcn5154_firmwaresm4350_firmwaresd_8cxsa8150pqca4004mdm9330_firmwareqca9992_firmwaresd660sm7225_firmwaresd660_firmwareqcn5121qcn5022_firmwareqcn7606_firmwaresm6125_firmwareimmersive_home_216_platform_firmwareqca4010_firmwaresnapdragon_675_mobile_platform_firmwareqca6428_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca9980_firmwareipq8078ipq8173sd670_firmwareqca6574csr8811_firmwarewcd9380qcs410qcn5024qca9379_firmwaresc8180xp-ad_firmwareqca9985qcn9012_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815sm6150-ac_firmwaresnapdragon_630_mobile_platform_firmwareipq6028ipq8064sd835snapdragon_821_mobile_platformqca1990wcn3980_firmwaresd730sc7180-ac_firmwaresm6350qcn5064_firmwareqcs4490_firmwareipq8078_firmwareqcn50548098_firmwareqcs603snapdragon_660_mobile_platformqca9994qca6164_firmwaresm6350_firmwarewcn785x-1_firmwareqca9980sd670qcn9024_firmwareipq8174_firmwareqcm4290_firmwareqcn7605_firmwaresw5100p_firmwareqcs610_firmwareapq8084_firmwaresa6145pqca9886_firmwarear8031immersive_home_214_platformqca6164sd820_firmwareqca6391_firmwareqca4024wcd9370_firmwaresdx55qcn5021_firmwarecsra6640qca9379qcn7606sdm845_firmwarewsa8830qca95618998sdm712_firmwaresnapdragon_850_mobile_compute_platformcsrb31024qca9992qcs4290qca6420_firmwaresc7180-acapq8009_firmwaresnapdragon_auto_4g_modem_firmwaresd675_firmwareipq8072wcn3990_firmwareqca9984_firmwareqca9377wcd9385_firmwarewcd9326_firmwarewcn3615_firmwareipq8074aqca9982apq8094sa8155snapdragon_x55_5g_modem-rf_systemqcn5122_firmwaresdx55_firmwarewcn3615qcn6023_firmwaresm7250p_firmwarewcn3610_firmwareqca6584auqfe1952sm6225ipq8174qcn5052mdm9235m_firmwareapq8092wcn3988_firmwareqcn9074sm7250-aasa8195psxr1120sdm710_firmwaresm4375_firmwarewcd9326wcd9335qca9982_firmwareqcm4490qcn6023qcs4290_firmwaresm7150-abqca6390qca9898_firmwarewcd9375aqt1000sc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_662_mobile_platformapq8092_firmwareipq5010_firmwareipq8074a_firmwaresm8150wsa8815_firmwaresnapdragon_636_mobile_platform_firmwaresxr1120_firmwaremdm9235mqcm6125_firmwareqca9882sdm845qca6595ipq8065_firmwareqcn5154qca8075_firmwaresc8180xp-acipq6005_firmwarewcn685x-5_firmwareqcn6132_firmwaresdm670_firmwareqca9888qca6310_firmwareapq8094_firmwareipq8070a_firmwareqca6574_firmwareqca9886qca6574a_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareapq8009snapdragon_auto_4g_modemcsrb31024_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwarewcn685x-5ipq6028_firmwareipq8072a_firmwareqca9531sc8180xp-af_firmwareqca9889_firmwareqcn5122sm7250-aa_firmwaresc8180x-aa_firmwaresm8150-ac_firmwareqcn5022sc8180x-aasc8180x-af_firmwaresm6150-acsnapdragon_x50_5g_modem-rf_systemqca8075qcn6024qcn9022ipq6000_firmwareqcs410_firmwaremdm9330sa6150p_firmwareqcs610qcn5550sc8180x-ab_firmwareqca9561_firmwareqca4024_firmwareimmersive_home_318_platform_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6335sdm712qcn5064sdm670csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwares820a_firmwareqca9987_firmwareapq5053-aa_firmwarewcn685x-1sda845_firmwareqca6554a_firmwareipq8076asm7150-acqca4020qca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwaresa6155_firmwaresm6225-adqca6438_firmwaresc8180xp-afwcn3999sm6225-ad_firmwareipq5028qca7500ipq4029_firmwareqcs6125ipq6010sd662_firmwaresm7250-ab_firmwareqcn6132snapdragon_820_mobile_platformqca1990_firmwaresw5100qca4020_firmwaresa6155pqcs603_firmwarewcd9341ipq8068_firmwaresc8180xp-ab_firmwarewcn3910_firmwareqfe1922wsa8830_firmwaresd855_firmwarewcn3988qca6438sm4250-aa_firmwaresa8195p_firmwareqca9898ipq4028wcn3610mdm9640wcd9380_firmwareipq8072aqca7500_firmwaresw5100pmsm8996au_firmwarewcd9330ipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platformqca6564auqcn5164qca9558sc8180xp-aaqcn5054_firmwareipq4019_firmwaresm7150-aa_firmwaresc8180x-ac_firmwareqca6174qca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980qca6335_firmwaresm7225qcs605wcn3910qca6320qca9986_firmwaresm4450wcn3660b_firmwareqca9984sc8180x-adqcn9024qcn5550_firmwarewcd9330_firmwareipq8064_firmwaresm7150-aasnapdragon_x50_5g_modem-rf_system_firmwaresm7125sd821_firmwaresnapdragon_652_mobile_platformar8031_firmwaresm7150-ab_firmwareipq8070qca9887_firmwaresdm710qca6564a_firmwareqca9880wsa8832qcn5121_firmwaresc8180xp-ac_firmwaresnapdragon_810_processoripq6018qcs4490qca6595_firmwaresa8145pimmersive_home_214_platform_firmwaresm4350-ac_firmwaresa8155psd675qca9531_firmwarear8035_firmwareqcm2290qcn5024_firmwarewcn3991_firmwaresnapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwaresm6125qcs2290_firmwarewcn785x-5csra6620qca9987qcn9072sm7250-ac_firmwareqca9880_firmwareqca6390_firmwareipq8069_firmwareipq6000qca6174_firmwaresd730_firmwarewcd9370qcn5152_firmwareqca6584au_firmwareapq8076_firmwareqcn9000_firmwaresd_8cx_firmwareqcn7605immersive_home_216_platformimmersive_home_316_platformimmersive_home_318_platformsd662qcn5124_firmwareqfe1952_firmwareqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwaresm4350-acsnapdragon_w5\+_gen_1_wearable_platform_firmwareipq5010qca6564au_firmwaresa6155p_firmwareqca6310snapdragon_821_mobile_platform_firmwareqca9990apq8084sd821vision_intelligence_300_platform_firmwaresa6145p_firmwaresm6250wsa8810_firmwaresc7180-adqca4010sg4150pqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385sc8180x-acar8035csr8811ipq4019qcn9100_firmwaresd820wsa8835_firmwareqca6564asg4150p_firmwarewcn785x-1qcm4325qcm2290_firmwaresnapdragon_845_mobile_platformmdm9635m_firmwareapq5053-aawcn3990qcn9000sd_675qca6554aar9380_firmwaresm8150-acqcn9012qca9558_firmwareqcn6122_firmwarewsa8835msm8996ausc7180-ad_firmwaresm6250pipq4018qca6574aqca9889qca6174asc8180x-afipq8074qca9994_firmwaremdm9635mipq8076_firmwaresm7150-ac_firmwaresm7250-absd855sm4125_firmwareipq8076qfe1922_firmwareqca9887qcn5021ipq8069qcn5152wcn785x-5_firmwarevision_intelligence_300_platformsd460qca6391ipq6005aqt1000_firmwareqcn9100qcm4490_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290qca9882_firmwaresd_455sm6225_firmwareipq8074_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125wsa8810sm7250-acwcn3680bsd835_firmwaresnapdragon_675_mobile_platformipq6010_firmwareqca6696sm4350sm7125_firmwaresa6150psc8180xp-abqcn9022_firmwareqca9990_firmwareipq8070asnapdragon_652_mobile_platform_firmwaresc8180x-ad_firmwareqcn9072_firmwaresnapdragon_820_mobile_platform_firmwaresm7250pipq8071_firmwareqcn9074_firmwaresw5100_firmwareipq4029snapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28579
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.53%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:03
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in WLAN Host

Memory Corruption in WLAN Host while deserializing the input PMK bytes without checking the input PMK length.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresa6155p_firmwareqam8295p_firmwareqcs610_firmwarewcd9370qca6696wcd9341_firmwarewsa8815_firmwaresa8195p_firmwarewcd9370_firmwarewcn3660bqca6574au_firmwaresa8195pqca6595auqam8295pwcd9341qca6574auwcn3950wsa8810_firmwarewcn3988wcn3980_firmwarewcn3660b_firmwarewsa8835qca6595au_firmwareqca6391_firmwaresw5100p_firmwaresa8295p_firmwareqca6696_firmwarewcd9380_firmwaresa6150pqcs410sa8155p_firmwarewcn3680b_firmwarewsa8815video_collaboration_vc1_platform_firmwaresa8155pwsa8830sa6145psw5100_firmwarefastconnect_7800_firmwarefastconnect_6900qca6391video_collaboration_vc1_platformwcn3950_firmwarefastconnect_6900_firmwaresa8295psnapdragon_8_gen_1_mobile_platformwcd9380sa6145p_firmwarefastconnect_7800sa8145p_firmwarewcn3680bsa8150psnapdragon_8_gen_1_mobile_platform_firmwaresw5100sa8150p_firmwarewcn3988_firmwaresa6155pvideo_collaboration_vc3_platform_firmwaresa8145pwsa8835_firmwarewsa8810wcn3980wsa8830_firmwarevideo_collaboration_vc3_platformqcs610Snapdragonsnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2002-0969
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.78%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in MySQL daemon (mysqld) before 3.23.50, and 4.0 beta before 4.02, on the Win32 platform, allows local users to execute arbitrary code via a long "datadir" parameter in the my.ini initialization file, whose permissions on Windows allow Full Control to the Everyone group.

Action-Not Available
Vendor-n/aOracle CorporationMicrosoft Corporation
Product-windowsmysqln/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28539
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.03% / 9.35%
||
7 Day CHG~0.00%
Published-03 Oct, 2023 | 05:00
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in WLAN Host

Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqcs410_firmwaresa6150p_firmwaresd865_5gipq9574qcn9000_firmwareqca6595qcn9022qcs610_firmwarewcd9335ipq6028_firmwareimmersive_home_214_platformqca8081_firmwareqca6696wcd9340_firmwarewcd9341_firmwareipq5028_firmwareqcn6024ar9380qcc2073_firmwareqcc710_firmwareipq8076qca6426ipq6018_firmwareqca9984_firmwareqcn6023qcn5124_firmwareimmersive_home_216_platformqca8337qca9994_firmwareqca6426_firmwareipq6000snapdragon_auto_4g_modemqca6574au_firmwareipq8078aipq8078a_firmwareqam8295pwcd9341qca6574auwsa8810_firmwareqcn9100_firmwaresnapdragon_835_mobile_pc_platform_firmwareqcn5122qca6554afastconnect_6800_firmwaresd835_firmwareqcn6024_firmwareqca9886_firmwarevideo_collaboration_vc1_platform_firmwareqca9880qcn9000qcc710qcn6132_firmwarefastconnect_6900video_collaboration_vc1_platformqcn5052qca9980qfw7114wcd9385_firmwareqca6421snapdragon_x55_5g_modem-rf_systemipq9574_firmwareqca6310qam8255p_firmwareipq8064ipq8074a_firmwareipq8076aqcn5164immersive_home_3210_platform_firmwaresa6155pqca6421_firmwareqca6564au_firmwarecsr8811_firmwarewsa8810qca8075qca8085qca6595ausa6155p_firmwaresd835qfw7124_firmwareqca6436_firmwareqcn9012ipq8070a_firmwareqcn9070qca8084sm8250-ac_firmwaresdx65mcsrb31024snapdragon_x55_5g_modem-rf_system_firmwareqcc2076qca6574asa8195pqca9898_firmwarewcd9340immersive_home_316_platform_firmwareqcn6122_firmwareqcn5154_firmwareqca7500immersive_home_3210_platformwcn3988ipq4019qcn5122_firmwareqcn9274qcn9024ipq8076a_firmwareqca6574snapdragon_x75_5g_modem-rf_systemar9380_firmwareipq4029_firmwareqcn9011qcn9024_firmwareqca8082sa6150pqcs410sa8155p_firmwaresa8155pwsa8830sa6145pqcn9074_firmwareipq8174qcn6122sa8255p_firmwareflight_rb5_5g_platform_firmwareqcc2073ipq8174_firmwarear8035ipq8072aqrb5165m_firmwareqca9985robotics_rb5_platformqcn6224ipq8071aqcn6112qca6698aqwcn3950_firmwareqrb5165nsa8145p_firmwaresa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformvideo_collaboration_vc3_platform_firmwarewcn3990qcn6023_firmwareqcn5164_firmwareipq8078immersive_home_326_platform_firmwareqcn9072wsa8830_firmwareqcn6224_firmwareipq4028_firmwareqca6431qca6678aq_firmwareqca8386_firmwareqca8082_firmwaresnapdragon_auto_4g_modem_firmwareqcc2076_firmwareqca9880_firmwaresxr2130_firmwareqca6678aqar8035_firmwareqcn5022_firmwareqca9992qrb5165msnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320sm8250-ab_firmwareqca4024_firmwareqca9898ipq9008qca6564auqca9992_firmwareqca9990ipq9008_firmwareqcn9074immersive_home_214_platform_firmwarewsa8815_firmwaresm8250-absa8195p_firmwareqca8337_firmwareqca9888ipq8173ipq8072a_firmwareipq6010_firmwarewcn3950flight_rb5_5g_platformsnapdragon_xr2_5g_platformqcn6112_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwareipq5028qca8085_firmwareqcn9070_firmwaresa8295p_firmwareqca9984ipq5010_firmwareqcn9022_firmwareqca9886qcn6132csrb31024_firmwareipq6018qca6584auqca6320_firmwareqcn6274_firmwareqcn9011_firmwaresw5100_firmwareipq8065qca6310_firmwarefastconnect_6800qfw7114_firmwareqca4024qca6595_firmwaresm8250-acfastconnect_7800_firmwareimmersive_home_216_platform_firmwareipq8070afastconnect_6900_firmwarewcd9380ipq4028qam8255psa6145p_firmwareqca9990_firmwaresnapdragon_xr2_5g_platform_firmwareqca7500_firmwaresa8150pqca8075_firmwareqcn5052_firmwaresnapdragon_835_mobile_pc_platformsnapdragon_auto_5g_modem-rf_firmwareipq6010sdx65m_firmwarevideo_collaboration_vc3_platformsw5100snapdragon_865_5g_mobile_platform_firmwareqca9980_firmwareqca9985_firmwareqam8295p_firmwareqca6431_firmwarewcn3990_firmwareqca6175a_firmwareqca6698aq_firmwarewcd9385qca9994qca8084_firmwaresa8255pimmersive_home_318_platform_firmwareqcn5024sdx55_firmwareipq8071a_firmwaresnapdragon_auto_5g_modem-rfipq4019_firmwareqca6554a_firmwaresxr2130ipq6028qcn9100immersive_home_326_platformipq4029snapdragon_x65_5g_modem-rf_systemipq8076_firmwarewcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6436qca6584au_firmwareqcn5152_firmwarewsa8835qcn6274qca6391_firmwareqfw7124qca6595au_firmwaresw5100p_firmwareipq8068qca6696_firmwaresnapdragon_865_5g_mobile_platformwcd9380_firmwareqca6574_firmwareqca8081wsa8815qcn5124ipq8064_firmwareqca6797aqqcn5152ipq8065_firmwareqca6574a_firmwaresdx55qcn9072_firmwareqca9888_firmwareipq8074aimmersive_home_318_platformqca9889qca6175aqcn5024_firmwareqca8386qca6391ipq5010qcn9274_firmwareipq8173_firmwareqcn9012_firmwaresa8295probotics_rb5_platform_firmwareipq8068_firmwareipq6000_firmwarefastconnect_7800sd865_5g_firmwareipq8078_firmwareqca9889_firmwarewcn3988_firmwareqcn5154sa8145pimmersive_home_316_platformwsa8835_firmwarecsr8811qcn5022snapdragon_x75_5g_modem-rf_system_firmwarewcn3980qcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-1100
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.68%
||
7 Day CHG~0.00%
Published-11 Apr, 2018 | 19:00
Updated-05 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.

Action-Not Available
Vendor-zshzshCanonical Ltd.Red Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxenterprise_linux_workstationzshenterprise_linux_desktopzsh
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-27957
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.39%
||
7 Day CHG~0.00%
Published-08 May, 2023 | 00:00
Updated-29 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28544
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 6.73%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 06:24
Updated-27 Feb, 2025 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy without Checking the Size of Input in WLAN Firmware

Memory corruption in WLAN while sending transmit command from HLOS to UTF handlers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_850_mobile_compute_platform_firmwaresa6150p_firmwaresm6250p_firmwareqcs610ipq4028_firmwareqcn5550ar9380ipq8173_firmwarewcd9360_firmwareqcn5124qca4024_firmwarewcn3950_firmwareimmersive_home_318_platform_firmwaresc8180x\+sdx55ipq8078aipq5028_firmwaresm4450_firmwaresa8150p_firmwareqca6595au_firmwareqcs2290sa6155snapdragon_480_5g_mobile_platformqca6335qcn5064sd_455_firmwarecsra6620_firmwaresd_675_firmwarecsra6640_firmwaresnapdragon_460_mobile_platform_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca9987_firmwareqca6554a_firmwarewcd9371_firmwarewcn3950qcn6024_firmwaresm4125ipq8076aimmersive_home_316_platform_firmwaresnapdragon_460_mobile_platformsnapdragon_660_mobile_platform_firmwaresd460_firmwareqca6428qualcomm_robotics_rb3_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwareqcn5164_firmwaresnapdragon_636_mobile_platformipq8071wcd9375_firmwareqca8081_firmwaresa6155_firmwareqca6420wcd9360qca6438_firmwareqca9986snapdragon_auto_5g_modem-rf_firmwareipq8070_firmwareipq8065ipq8078a_firmwaresmart_audio_400_platform_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwareqcs6125sa8155_firmwareipq6010sd662_firmwaresnapdragon_855\+860_mobile_platform_firmwareipq8068snapdragon_765g_5g_mobile_platformqca6430snapdragon_630_mobile_platformsnapdragon_678_mobile_platform_firmwarewcd9340snapdragon_8cx_compute_platformsnapdragon_720g_mobile_platformqcn6132sw5100sa6155psnapdragon_765_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca6696_firmwarewcd9371qcn5154_firmwarewcn3910_firmwaresd_8cxsnapdragon_855_mobile_platform_firmwaresa8150pwsa8830_firmwareqca9992_firmwaresd660sd855_firmwarewcn3988qca6438sd660_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwarefastconnect_6800_firmwareqcn5022_firmwareqcn7606_firmwaresnapdragon_7c_gen_2_compute_platform_firmwareqca9898immersive_home_216_platform_firmwareipq4028snapdragon_730_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_675_mobile_platform_firmwareqca6428_firmwareqca9985_firmwareipq4018_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwaresw5100psnapdragon_8cx_gen_2_5g_compute_platformipq8076a_firmwaresnapdragon_w5\+_gen_1_wearable_platformipq8078qca6564auipq8173snapdragon_670_mobile_platform_firmwareqcn5164sd670_firmwareqca6574csr8811_firmwarewcd9380fastconnect_6700qcs410qcn5024ipq4019_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980snapdragon_732g_mobile_platform_firmwareqca6335_firmwareipq6018_firmwareqcm4325_firmwarewcd9340_firmwarewsa8815wcn3910qca6320snapdragon_630_mobile_platform_firmwareqca9986_firmwaresnapdragon_4_gen_1_mobile_platformsm4450qca9984ipq6028ipq8064sd835snapdragon_670_mobile_platformqcn9024wcn3980_firmwaresd730qcn5550_firmwareipq8064_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresnapdragon_8cx_compute_platform_firmwareqcn5064_firmwareqcs4490_firmwareipq8078_firmwarefastconnect_6900fastconnect_6900_firmwareipq8070snapdragon_660_mobile_platformqca9994qca9980sd670qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwarewsa8832qcn7605_firmwaresw5100p_firmwareqcs610_firmwareipq6018snapdragon_730_mobile_platformqca9886_firmwareimmersive_home_214_platformqcs4490qca6595_firmwaresa8145psnapdragon_750g_5g_mobile_platformqca6391_firmwaresnapdragon_710_mobile_platform_firmwareimmersive_home_214_platform_firmwareqca4024wcd9370_firmwaresdx55sa8155pcsra6640sd675snapdragon_695_5g_mobile_platformsnapdragon_720g_mobile_platform_firmwaresnapdragon_855_mobile_platformqcm2290snapdragon_480\+_5g_mobile_platformqcn7606qcn5024_firmwarewsa8830snapdragon_662_mobile_platform_firmwareqcn9070sa8145p_firmwaresnapdragon_850_mobile_compute_platformqcs2290_firmwarecsra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290qca6420_firmwareipq8069_firmwareipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwaresnapdragon_480\+_5g_mobile_platform_firmwareqca6584au_firmwarewcn3990_firmwareqcn9000_firmwareqca9984_firmwarequalcomm_robotics_rb3_platformsd_8cx_firmwarewcd9385_firmwareqcn7605wcd9326_firmwarefastconnect_6200immersive_home_216_platformimmersive_home_316_platformsnapdragon_7c_gen_2_compute_platformipq8074aimmersive_home_318_platformsd662qcn5124_firmwaresa8155snapdragon_x55_5g_modem-rf_systemqca6320_firmwaresnapdragon_835_mobile_pc_platform_firmwareqcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwaresm7250p_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareipq5010qca6564au_firmwareqca6584ausa6155p_firmwareqca6310ipq8174qca9990qcn5052vision_intelligence_300_platform_firmwarewcn3988_firmwareqcn9074sm6250fastconnect_6700_firmwaresa8195psxr1120wsa8810_firmwarevision_intelligence_400_platformwcd9326wcd9335sg4150pqca8081qcm4490qcn6023ipq8071aipq8071a_firmwareqcs4290_firmwarewcd9385snapdragon_665_mobile_platform_firmwareqca9898_firmwarewcd9375csr8811aqt1000ipq4019sc8180x\+sdx55_firmwaresm6250_firmwaresnapdragon_712_mobile_platform_firmwareqcn9100_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformvision_intelligence_400_platform_firmwaresnapdragon_768g_5g_mobile_platform_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarewsa8835_firmwaresnapdragon_636_mobile_platform_firmwaresxr1120_firmwareqca6564asg4150p_firmwareqcm6125_firmwareqcm4325qcm2290_firmwaresnapdragon_845_mobile_platformwcn3990qcn9000sd_675qca6554afastconnect_6800qca6595ar9380_firmwaresnapdragon_835_mobile_pc_platformqcn9012snapdragon_8c_compute_platformqcn6122_firmwareipq8065_firmwarewsa8835snapdragon_auto_5g_modem-rfsm6250psnapdragon_678_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwareqcn5154qca8075_firmwareipq4018smart_audio_400_platformqca6574aqca9889qcn6132_firmwareqca9888qca6310_firmwareipq8074qca9994_firmwareipq8070a_firmwareipq8076_firmwareqca6574_firmwareqca9886sd855sm4125_firmwareipq8076qca6574a_firmwaresnapdragon_665_mobile_platformsnapdragon_730g_mobile_platformfastconnect_6200_firmwareipq8069qcn5152vision_intelligence_300_platformsnapdragon_x55_5g_modem-rf_system_firmwaresd460qca6391snapdragon_710_mobile_platformsnapdragon_7c_compute_platform_firmwareaqt1000_firmwareqcn9100snapdragon_855\+860_mobile_platformqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwareqcm4290wsa8832_firmwaresnapdragon_xr1_platformqcn9070_firmwareipq6028_firmwareipq8072a_firmwaresd_455ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwareqcn5122wcd9341_firmwareqcm6125wsa8810snapdragon_765g_5g_mobile_platform_firmwaresnapdragon_712_mobile_platformsnapdragon_730g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformqcn5022snapdragon_8c_compute_platform_firmwaresd835_firmwaresnapdragon_675_mobile_platformipq6010_firmwareqca6696snapdragon_732g_mobile_platformsnapdragon_x50_5g_modem-rf_systemsa6150pqca8075qcn9022_firmwaresnapdragon_768g_5g_mobile_platformqcn6024qcn9022qca9990_firmwareipq8070asnapdragon_765_5g_mobile_platformqcn9072_firmwaresm7250pipq6000_firmwareipq8071_firmwareqcn9074_firmwareqcs410_firmwaresw5100_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_firmwareipq4029snapdragon_7c_compute_platformsnapdragon_xr1_platform_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30309
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.54%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper size validation of QXDM commands can lead to memory corruption in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewcn3991wsa8830wcd9380_firmwarewcn3990qcs610sd865_5gsdx55m_firmwaremdm9650wsa8835wcn3950_firmwaresd665_firmwarewcd9380sd765g_firmwareqca6390_firmwareqcs410sd690_5gsd730_firmwarewcd9370qcs605_firmwaresd690_5g_firmwareqcs6125_firmwareqca6174awcn3990_firmwarewcd9335_firmwareqca9377wcn3980wcn3998wcd9385_firmwarewcn3950wcd9326_firmwareqcs605wsa8815wcn6850sd665mdm9650_firmwaresd765sd768g_firmwarewcd9375_firmwaresdx12_firmwarewcn3998_firmwarewcn3980_firmwaresm7250p_firmwaresd730sdxr1_firmwareqca6391sdx55mqcs6125wcn6851_firmwareqcs603wcn3988_firmwarewsa8810_firmwaresd765gwcd9341_firmwareqcm6125wsa8810sd765_firmwaresd870wcd9326wcd9335wcn6851qcs603_firmwareqcs610_firmwareqca6174a_firmwarewcd9385wcd9341sdxr1sd768gsd870_firmwareqca6391_firmwareqca6390wcd9375wcd9370_firmwarewsa8830_firmwaresd660sd865_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwaresd660_firmwarewsa8835_firmwaresm7250psdx12qcs410_firmwareqcm6125_firmwareSnapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-29540
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.5||LOW
EPSS-0.03% / 9.09%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 19:11
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in `Conv2DBackpropFilter`

TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L495-L497) computes the size of the filter tensor but does not validate that it matches the number of elements in `filter_sizes`. Later, when reading/writing to this buffer, code uses the value computed here, instead of the number of elements in the tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-29612
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.6||LOW
EPSS-0.03% / 7.44%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 19:20
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in `BandedTriangularSolve`

TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a heap buffer overflow in Eigen implementation of `tf.raw_ops.BandedTriangularSolve`. The implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L269-L278) calls `ValidateInputTensors` for input validation but fails to validate that the two tensors are not empty. Furthermore, since `OP_REQUIRES` macro only stops execution of current function after setting `ctx->status()` to a non-OK value, callers of helper functions that use `OP_REQUIRES` must check value of `ctx->status()` before continuing. This doesn't happen in this op's implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc#L219), hence the validation that is present is also not effective. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-28546
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.53%
||
7 Day CHG~0.00%
Published-05 Dec, 2023 | 03:03
Updated-25 Feb, 2026 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in SPS Applications

Memory Corruption in SPS Application while exporting public key in sorter TA.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresdm429w_firmwaresd865_5gqcs8155_firmwareqca6595snapdragon_xr1_platformqca8081_firmwaresnapdragon_x50_5g_modem-rf_systemwcd9340_firmwarewcd9395_firmwaresnapdragon_730_mobile_platformqcn6024snapdragon_sc8180xp-aa_firmwareqcc710_firmwareqca6426fastconnect_6700wcn3610snapdragon_768g_5g_mobile_platform_firmwaresa4150pwsa8832_firmwareqca8337qca6426_firmwarewcd9395snapdragon_460_mobile_platformsmart_display_200_platformqca6574au_firmwareqcn7606_firmwareqam8295pwcd9341sd626_firmwaresnapdragon_435_mobile_platformwsa8810_firmwaresd730_firmwarewsa8845h_firmwaresa9000p_firmwarewcn3660_firmwaresnapdragon_835_mobile_pc_platform_firmwarefastconnect_6800_firmwareqcs5430sd835_firmwaresnapdragon_4_gen_2_mobile_platform_firmwareqcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_778g\+_5g_mobile_platformsa8770psd821sa8540psnapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqsm8250_firmwareqsm8350_firmwaresnapdragon_427_mobile_platformsnapdragon_765g_5g_mobile_platformvideo_collaboration_vc1_platformwcd9385_firmwareqca6421qca6310snapdragon_630_mobile_platformwcd9360snapdragon_ar2_gen_1_platform_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_7c_compute_platformsd821_firmwaresnapdragon_685_4g_mobile_platformsa6155psnapdragon_sc8180x-aaqca6564au_firmwaresd820snapdragon_768g_5g_mobile_platformqam8650pvideo_collaboration_vc5_platform_firmwaresa9000psa6155p_firmwaremdm9640_firmwaresd835snapdragon_632_mobile_platform_firmwaresnapdragon_870_5g_mobile_platform_firmwareqca6436_firmwaresnapdragon_8\+_gen_1_mobile_platformsnapdragon_7c_compute_platform_firmwaresnapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwareqts110sm4125_firmwareqca6420snapdragon_7c_gen_2_compute_platform_firmwarewcn3910apq8064au_firmwaremdm9205s_firmwaresnapdragon_845_mobile_platformsnapdragon_x55_5g_modem-rf_system_firmwaresnapdragon_660_mobile_platformwcn3660bqca6574awcn3620_firmwareqca6174awcd9340qcs8250_firmwareqcm2290qdu1210snapdragon_630_mobile_platform_firmwaresnapdragon_820_automotive_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm8550p_firmwareqcm8550wcn3988snapdragon_450_mobile_platform_firmwareqcn9024snapdragon_460_mobile_platform_firmwareqca6574snapdragon_x75_5g_modem-rf_systemhome_hub_100_platformqcs410qcm2290_firmwaresa8155pwsa8830sm8550psa6145psnapdragon_8\+_gen_1_mobile_platform_firmwaresa8255p_firmwaremsm8996ausnapdragon_626_mobile_platformqrb5165m_firmwarewcn3620snapdragon_678_mobile_platform_firmwaresnapdragon_427_mobile_platform_firmwareapq8064auwcn3950_firmwaresnapdragon_632_mobile_platformqrb5165nmdm9205ssnapdragon_8_gen_1_mobile_platformfastconnect_6200snapdragon_710_mobile_platformsm7325p_firmwaresd460snapdragon_730g_mobile_platformwcd9360_firmwaresnapdragon_sc8280xp-ab_firmwareqdx1011smart_audio_400_platformsnapdragon_855\+\/860_mobile_platformvideo_collaboration_vc3_platform_firmwaresd670_firmwaresnapdragon_750g_5g_mobile_platformqcn6224_firmwareqca6431sd660_firmwarevision_intelligence_200_platformqca9379_firmwaresxr2130_firmwarear8035_firmwaresnapdragon_730_mobile_platform_firmwareqrb5165msnapdragon_888_5g_mobile_platformsc8380xpsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6320sd888_firmwaresnapdragon_712_mobile_platformsnapdragon_662_mobile_platform_firmwarewcd9306qcs6125_firmwareqcn9074wsa8815_firmwareqca8337_firmwaresm7250p_firmwarewcn3680_firmwarewcn3999wcn3950snapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platformapq8037snapdragon_710_mobile_platform_firmwaresa8295p_firmwaresd_675_firmwaresa4155p_firmwaresnapdragon_720g_mobile_platformsm7250psa8155snapdragon_845_mobile_platform_firmwaresd888qru1062_firmwaresd460_firmwaresnapdragon_4_gen_2_mobile_platformsc8380xp_firmwareqru1062qca6310_firmwaresd626fastconnect_6800qcs7230snapdragon_685_4g_mobile_platform_firmwarepm8937wcd9371snapdragon_782g_mobile_platform_firmwarefastconnect_6900_firmwaresnapdragon_732g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_sc8280xp-abhome_hub_100_platform_firmwarevision_intelligence_300_platform_firmwaresnapdragon_835_mobile_pc_platformsnapdragon_865\+_5g_mobile_platformsnapdragon_sc8180x-ad_firmwarevideo_collaboration_vc3_platformsnapdragon_sc8180xp-ad_firmwaresnapdragon_865_5g_mobile_platform_firmwareqca6431_firmware9205_lte_modem_firmwareqca6698aq_firmwareqcs2290qcn7606qcs2290_firmwarewcn3615wcn3999_firmwarewcn3680snapdragon_678_mobile_platformsa8255pqcs7230_firmwaresnapdragon_720g_mobile_platform_firmwarewcd9390_firmwaresnapdragon_690_5g_mobile_platformqca6430mdm9650qdx1011_firmwaresnapdragon_auto_5g_modem-rfssg2125pqru1052csra6640_firmwaresnapdragon_435_mobile_platform_firmwarevision_intelligence_100_platform_firmwareqam8650p_firmwarevideo_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemsd855_firmwarewcd9335_firmwaremdm9640qca6436qrb5165n_firmwaresnapdragon_sc8180x-aa_firmwarewcn3980_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqdu1010_firmwaresnapdragon_732g_mobile_platformqcs4290_firmwaresnapdragon_865_5g_mobile_platformcsra6620qca8081sd660wsa8815qam8775pqcm4325_firmwaresnapdragon_430_mobile_platformqcm4290_firmwaresnapdragon_425_mobile_platform_firmwaresmart_audio_400_platform_firmwareqcs5430_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresg4150p_firmwaresnapdragon_480_5g_mobile_platformqru1052_firmwaresnapdragon_670_mobile_platformcsra6620_firmwaresnapdragon_820_mobile_platform_firmwareqcs8550qam8775p_firmwaresd865_5g_firmwarewcd9375sa8145psd_675snapdragon_888\+_5g_mobile_platform_firmwareqdx1010wcn3680b_firmwareqcm8550_firmwareapq8017qcs410_firmwaresa6150p_firmwaresnapdragon_429_mobile_platform_firmwaresw5100psxr1120vision_intelligence_300_platformqcs610_firmwarewcd9335wcd9370qca4004qca6696wcd9341_firmwaresnapdragon_626_mobile_platform_firmwarewcn6740_firmwareqdu1110snapdragon_auto_4g_modem9205_lte_modemqca6574auwcd9390pm8937_firmwarecsra6640wcn3660b_firmwaresd730snapdragon_730g_mobile_platform_firmwareqcn6024_firmwareqcm5430snapdragon_695_5g_mobile_platformqcm6125_firmwarec-v2x_9150ssg2115pqcc710snapdragon_625_mobile_platform_firmwaresxr1120_firmwarerobotics_rb3_platform315_5g_iot_modem_firmwarefastconnect_6900qru1032_firmwareqfw7114315_5g_iot_modemsnapdragon_x55_5g_modem-rf_systemsnapdragon_450_mobile_platformqam8255p_firmwaresnapdragon_821_mobile_platform_firmwaresa8155_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_wear_1300_platform_firmwareqca6335qcs4490snapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qca6421_firmwareqcm6125snapdragon_sc8180xp-aawsa8810qdu1000_firmwareqsm8250snapdragon_8\+_gen_2_mobile_platformqca6595ausm7315_firmwareqdu1010wcd9326_firmwarewsa8840qcs8550_firmwareqdu1210_firmwareqfw7124_firmwareqcn9012snapdragon_sc8180x-admdm9650_firmwaresnapdragon_821_mobile_platformwcd9371_firmwareqcs4490_firmwarewcn3910_firmwaresnapdragon_855\+\/860_mobile_platform_firmwarewcd9370_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqdu1110_firmwareqdu1000sa8195pqca6335_firmwareqcm6490sa8540p_firmwareqca9379sa8775psxr2230p_firmwaresd675_firmwareqca6430_firmwaresnapdragon_870_5g_mobile_platformqcn9011sa8775p_firmwareqcn9024_firmwarewsa8845hsa6150pwcd9326sa8155p_firmwareqca6564asnapdragon_675_mobile_platformsnapdragon_sc8180x-acsnapdragon_wear_1300_platformsnapdragon_662_mobile_platformqcn9074_firmwarevision_intelligence_400_platform_firmwaresnapdragon_765_5g_mobile_platformsc8180x\+sdx55_firmwareflight_rb5_5g_platform_firmwaresnapdragon_665_mobile_platformar8035sa6155qcm4325robotics_rb5_platformqcn6224smart_display_200_platform_firmwaresc8180x\+sdx55qca6698aqsm6250snapdragon_7c_gen_2_compute_platformssg2125p_firmwaresd670wcn3680bsa8145p_firmwareqcs8155snapdragon_888\+_5g_mobile_platformsnapdragon_820_mobile_platformsa8150p_firmwaresnapdragon_w5\+_gen_1_wearable_platformfastconnect_6700_firmwaresnapdragon_636_mobile_platform_firmwarewcn3990snapdragon_680_4g_mobile_platform_firmwareqcs6490qcs8250snapdragon_712_mobile_platform_firmwarefastconnect_6200_firmwarear8031_firmwaresnapdragon_sc8180xp-acwsa8830_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwaresnapdragon_675_mobile_platform_firmwaresa4150p_firmwareqca6564ausm6250p_firmwaresa8195p_firmwareqcm4290vision_intelligence_100_platformsnapdragon_680_4g_mobile_platformsd_455_firmwarear8031sg8275p_firmwareqcm6490_firmwaresm4125qcm4490_firmwaresnapdragon_855_mobile_platformqru1032robotics_rb3_platform_firmwareflight_rb5_5g_platformsnapdragon_xr2_5g_platformsnapdragon_429_mobile_platformqcs6125snapdragon_7c\+_gen_3_computesnapdragon_xr2\+_gen_1_platform_firmwaresnapdragon_670_mobile_platform_firmwaresnapdragon_439_mobile_platformqca4004_firmwaresd_455vision_intelligence_200_platform_firmwaresm6250_firmwaresnapdragon_780g_5g_mobile_platform_firmwareqca6584auqca6320_firmwareqcn6274_firmwareqcn9011_firmwaresw5100_firmwaresnapdragon_439_mobile_platform_firmwaresnapdragon_425_mobile_platformsnapdragon_765_5g_mobile_platform_firmwarewcn6740qfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwareapq8017_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_4_gen_1_mobile_platformsa8150psnapdragon_778g_5g_mobile_platformsnapdragon_665_mobile_platform_firmwaremsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresxr1230psd662_firmwarewcn3660sw5100snapdragon_430_mobile_platform_firmwareaqt1000wcd9306_firmwareqca6234c-v2x_9150_firmwareqam8295p_firmwaresd855wcn3990_firmwaresm7315qca6564a_firmwarewcd9385qsm8350qca6234_firmwaresd662wcn3610_firmwareqcs4290sxr1230p_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresd820_firmwaresg8275psm6250psdx55_firmwarewcn3615_firmwaresnapdragon_sc8180x-ac_firmwaresxr2130qcm4490snapdragon_636_mobile_platformsnapdragon_xr2\+_gen_1_platformqca6174a_firmwaresm7325papq8037_firmwaresnapdragon_855_mobile_platform_firmwareaqt1000_firmwaresdm429wqca6584au_firmwareqcn6274snapdragon_480_5g_mobile_platform_firmwareqfw7124qca6595au_firmwaresw5100p_firmwaresnapdragon_sc8180xp-ac_firmwaresnapdragon_ar2_gen_1_platformsnapdragon_782g_mobile_platformqca6696_firmwarewcd9380_firmwareqca6574_firmwaresg4150psd_8_gen1_5gqca6797aqvision_intelligence_400_platformqca6574a_firmwaresdx55snapdragon_480\+_5g_mobile_platformsd675sd_8_gen1_5g_firmwarewcd9375_firmwaresnapdragon_sc8180xp-adqca6391qts110_firmwareqcn9012_firmwarequalcomm_215_mobile_platformsa8770p_firmwaresa8295psnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_xr1_platform_firmwarerobotics_rb5_platform_firmwaresnapdragon_625_mobile_platformsnapdragon_x50_5g_modem-rf_system_firmwarefastconnect_7800qualcomm_215_mobile_platform_firmwarewcn3988_firmwarewsa8835_firmwaressg2115p_firmwaresnapdragon_660_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewcn3980snapdragon_820_automotive_platformsnapdragon_690_5g_mobile_platform_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30318
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.05% / 15.54%
||
7 Day CHG-0.07%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of input when provisioning the HDCP key can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055qca9377_firmwaresa6150p_firmwaresm6250p_firmwareqcs610qca8337wcd9360_firmwaresdx65wcn3950_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcn3950mdm9628sd720gmdm9206_firmwareqsw8573_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6574au_firmwarewcd9375_firmwarewcn3998_firmwareqca8081_firmwaresa6155_firmwaresdx12_firmwaremsm8909wapq8009w_firmwarewcd9360qca9367_firmwarewcn3999qrb5165_firmwareqrb5165m_firmwareqcs6125sa8155_firmwaresd662_firmwareqcs405qualcomm215_firmwaresd765gfsm10056_firmwareqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca6696_firmwaresd750gsd870_firmwarewcn3910_firmwaresa8150pwsa8830_firmwaresd855_firmwaresd660sd865_5g_firmwarewcn3988sd660_firmwaresa8195p_firmwaresm8475wcn6750_firmwarewcn3610sm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwarewcd9330qca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qualcomm215qcs410sd690_5g_firmwaresdx24_firmwareqcn9012_firmwaresd439_firmwareqsw8573qcs605wcn6850wcn3910qca6426_firmwarewcn3660b_firmwaresd730wcd9330_firmwaresdx55mwcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqcs603qca6564a_firmwareapq8009wqcm4290_firmwaresd480sd870wcn6855sd210_firmwareqcs610_firmwaresa6145psdxr1apq8096auar8031qcs405_firmwaresa8145pqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675sd439qcs8155_firmwarear8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678sa8145p_firmwareqcs2290_firmwarefsm10056csrb31024mdm9628_firmwarecsra6620fsm10055_firmwareqcs4290mdm9250sd765g_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426qca6584au_firmwareqrb5165n_firmwareqca9377sdw2500_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd662qcn9011_firmwaresa8155sdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nqca6564au_firmwareqca6584ausa6155p_firmwaresd778gqcs8155sm6225sa515m_firmwareqcs6490sd429sdxr2_5gqca9367mdm9607_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresd205sd429_firmwaresd778g_firmwaresm6250sa8195papq8017_firmwaresd765_firmwareqca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwarear8035qca6390sd750g_firmwareaqt1000wcd9375sm6250_firmwaresda429wsd210wcn3620_firmwaresdx20_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareapq8017qcx315qca6564aqcm6125_firmwareqcm2290_firmwaresd_675sd780gsd865_5gsdx24qcn9012sd888msm8909w_firmwareqcx315_firmwaremsm8996ausdm429w_firmwarewsa8835sd665_firmwaresd888_5gsm6250pqca6574amdm9206wcn6855_firmwareqca6174asm7325pwcn6750sa515mqca6574_firmwaresd855sm7325p_firmwaresd665sd765qca6574a_firmwaresd768g_firmwareqrb5165msm7315sd460qca6391sdxr1_firmwareaqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx20sd480_firmwareqcn9011sm6225_firmwareqca6574ausa8155p_firmwaremdm9607sd205_firmwareqcm6125mdm9150wcn6856qca6564_firmwaresd768gwcn6740qca6696sa6150psdw2500apq8096au_firmwaresm7250psd720g_firmwaresdx12qcs410_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-29520
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.5||LOW
EPSS-0.01% / 1.76%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 19:35
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in `Conv3DBackprop*`

TensorFlow is an end-to-end open source platform for machine learning. Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/4814fafb0ca6b5ab58a09411523b2193fed23fed/tensorflow/core/kernels/conv_grad_shape_utils.cc#L94-L153) assumes that the `input`, `filter_sizes` and `out_backprop` tensors have the same shape, as they are accessed in parallel. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30298
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.03%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible out of bound access due to improper validation of item size and DIAG memory pools data while switching between USB and PCIE interface in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fsm10055wcn3991_firmwaremdm9150_firmwarewsa8830wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwareqcs610qcn9000ipq8072afsm10056qca8337ipq8076a_firmwaresd865_5gsdx55m_firmwarecsra6620fsm10055_firmwarewsa8835wcn3950_firmwaresd665_firmwarewcd9380sd765g_firmwareqca6595au_firmwareqca6390_firmwarequalcomm215qcs410wcd9370csra6620_firmwarecsra6640_firmwareqrb5165n_firmwareqcn9000_firmwarewcd9335_firmwarewcn3980wcn3998wcd9385_firmwarewcn3950ipq8076awcd9340_firmwarewcn3660bwsa8815wcn6850sd665ipq8074asd662sd460_firmwaresd765wcn3660b_firmwareqca6574au_firmwaresdx55_firmwaresd768g_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwarewcn3980_firmwarewcn3610_firmwaresd460qca6391sdx55mqrb5165nwcn3999ar8031_firmwareqrb5165_firmwareqrb5165wcn6851_firmwaresd662_firmwareipq8072a_firmwareqcs405wcn3988_firmwareqca6574auqcn9074sd205sa8155p_firmwaresd205_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwarefsm10056_firmwaresd870wcn6851wcd9335sd210_firmwareqcs610_firmwaremdm9150wcd9385wcd9341sd768gar8031qca6696_firmwareqcs405_firmwaresd870_firmwareqca6696qca6391_firmwarear8035qca6390wcd9375wcd9370_firmwaresdx55sa8155pwsa8830_firmwaresda429wsd210csra6640sd865_5g_firmwarewcn3620_firmwareipq8074a_firmwarewcn3988wcn6850_firmwarewcn3620wsa8815_firmwarewsa8835_firmwaresm7250pqcn9074_firmwareqcs410_firmwarear8035_firmwarewcn3610Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-29512
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.5||LOW
EPSS-0.01% / 1.57%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 18:55
Updated-03 Aug, 2024 | 22:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Heap buffer overflow in `RaggedBinCount`

TensorFlow is an end-to-end open source platform for machine learning. If the `splits` argument of `RaggedBincount` does not specify a valid `SparseTensor`(https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow. This will cause a read from outside the bounds of the `splits` tensor buffer in the implementation of the `RaggedBincount` op(https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L433). Before the `for` loop, `batch_idx` is set to 0. The user controls the `splits` array, making it contain only one element, 0. Thus, the code in the `while` loop would increment `batch_idx` and then try to read `splits(1)`, which is outside of bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-30303
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.33%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 07:26
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible buffer overflow due to lack of buffer length check when segmented WMI command is received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwareqca2066mdm9640_firmwaresm6250p_firmwaresa6150p_firmwareqcs610ipq4028_firmwareqcn5550qca1023qca8337ar9380ipq8173_firmwarewcd9360_firmwareqca9561_firmwaresdx65qcn5124qca4024_firmwarewcn3950_firmwareipq8078aipq5028_firmwaresa8150p_firmwareqcs2290qca6595au_firmwaresa6155qca2062qcn5064csra6620_firmwareqcs605_firmwaresd_675_firmwarecsra6640_firmwareqca9987_firmwaresa415mwcn3998wcn3950qcn6024_firmwaresd720gipq8076amdm9206_firmwaremdm9628sm6375_firmwarewcn3660bsd460_firmwaresm7315_firmwareqca6428qca6574au_firmwareqcn5164_firmwareipq8071wcd9375_firmwareqca8081_firmwarewcn3998_firmwaresa6155_firmwaresdx12_firmwareqca6420wcd9360qca6438_firmwareqca9986ipq8070_firmwareqca9367_firmwareipq8065ipq8078a_firmwarewcn3999qrb5165_firmwareipq5028qca7500ipq8072_firmwareipq4029_firmwaresa8155_firmwareipq6010sd662_firmwareipq8068qcs405qca6430sc8280xp_firmwarewcd9340qcn6132sd765gqca6436wcn6851sa6155pqcs603_firmwaremdm9250_firmwareqca9888_firmwareqcn6122wcd9341ipq8068_firmwareqca2066_firmwareqca6696_firmwaresd870_firmwaresd750gqca9988_firmwareqcn5154_firmwarewcn3910_firmwaresd_8cxqcn5501_firmwaresa8150par7420_firmwarewsa8830_firmwareqca9992_firmwaresd660sd865_5g_firmwaresd855_firmwarewcn3988qca6438sd660_firmwaresa8195p_firmwareqcn5121qcn5022_firmwareqcn7606_firmwarewcn6750_firmwareqca9898ipq4028wcn3610mdm9640qca6428_firmwareipq5018_firmwaresm6375qca9985_firmwarewcn3991ipq4018_firmwareqca4531_firmwareqca8337_firmwarewcd9380_firmwareipq8072aqca7500_firmwareqca9980_firmwarewcd9330msm8996au_firmwareipq8076a_firmwareqca7550_firmwareipq8078qca6564ausdx55m_firmwareipq8173wcn6856_firmwareqcn5164qca9558qca6574csr8811_firmwareqca7520_firmwarewcd9380qcn5054_firmwareqcs410qcn5024sd690_5g_firmwareipq4019_firmwareqca9379_firmwaresdx24_firmwareqca8072_firmwareqca9985qcn9012_firmwareqca6430_firmwareqcn5052_firmwarewcd9335_firmwarewcn3980ipq6018_firmwareqcs605wcd9340_firmwarewsa8815wcn6850sd7cpmp8074_firmwarewcn3910qca6584_firmwareqca6320mdm9650_firmwareqca9986_firmwareqca6426_firmwarewcn3660b_firmwareqca9984ipq6028ipq8064qcn9024pmp8074wcn3980_firmwaresd730qcn5550_firmwarewcd9330_firmwaresdx55mipq8064_firmwareqca2062_firmwarewcn6740_firmwareqcn5064_firmwaresd678_firmwareapq8064au_firmwarear8031_firmwareipq8078_firmwareqcn5054qrb5165wcn6851_firmwareqcs603ipq8070qca9896qcn5502qca9994qca9887_firmwareqca9980qcn9024_firmwareipq8174_firmwareqca6564a_firmwareqca9880qcm4290_firmwaresd480sd870wcn6855qcn7605_firmwareqcn5121_firmwareqcs610_firmwaresa6145pipq6018qca9886_firmwaresdxr1ar8031qca1023_firmwareapq8096auqcs405_firmwaresa8145pqca6391_firmwareqca4024wcd9370_firmwareqca2064sd780g_firmwaresdx55sd888_firmwaresc8280xpqcn5021_firmwaresa8155pcsra6640sd675qca9531_firmwareqca9379ar8035_firmwareqcm2290qcn7606qcn5024_firmwarewcn3991_firmwarewsa8830sd678qca9561qcn9070sa8145p_firmwareqca7520qcs2290_firmwaresd7c_firmwarecsrb31024qca9563_firmwaremdm9628_firmwareqca9378mdm9650csra6620qca9987qcn9072qca9880_firmwareqca9992qcs4290mdm9250sd765g_firmwareqca6420_firmwareipq8069_firmwareapq8009_firmwareqca2064_firmwareqca6390_firmwaresd690_5gipq6000sd730_firmwarewcd9370sd675_firmwareipq8072qcn5152_firmwareqca6564qca6426qca6584au_firmwarewcn3990_firmwareqrb5165n_firmwareqcn9000_firmwareqca9984_firmwareqca9377sm8450qca4531ipq5018sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwareqcn7605wcd9326_firmwareqca9563ipq8074aqca2065sd662qcn5124_firmwaresa8155qca6320_firmwareqca6584qcn5122_firmwaresdx55_firmwareqca6595auqcn6023_firmwarewcn3999_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwareqrb5165nipq5010qca6564au_firmwareqca6584ausd778gsa6155p_firmwaresm6225ipq8174sa515m_firmwareqca9990qcs6490sdxr2_5gqcn5052qca9367qcn5501mdm9607_firmwaresa415m_firmwarewcn3988_firmwareqcn9074sa6145p_firmwaresm6250sd778g_firmwaresa8195papq8017_firmwarewsa8810_firmwareqca7550sm8450_firmwaresd765_firmwarewcd9326wcd9335qca8081qcn6023ipq8071aqca6174a_firmwareipq8071a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwareqca2065_firmwareqca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375ar8035sm6250_firmwarecsr8811apq8064auipq4019qcn9100_firmwareipq5010_firmwareipq8074a_firmwaresd888_5g_firmwaresdx20_firmwarewsa8815_firmwareqcm6490wcn6850_firmwarewsa8835_firmwareapq8017qcx315qca6564aqca9988qca9882qca8072qcm2290_firmwarewcn3990qcn9000sd_675sd780gsd865_5gar9380_firmwaresdx24sm8450p_firmwareqcn9012sd888qca9558_firmwareqca9896_firmwareqcn6122_firmwareipq8065_firmwareqcx315_firmwarewsa8835msm8996ausd665_firmwaresd888_5gsm6250pqcn5154qca8075_firmwareipq4018qca6574aipq6005_firmwaremdm9206wcn6855_firmwareqca9889qca6174asm7325pqcn6132_firmwareqca9888ipq8074qca9994_firmwarewcn6750ipq8070a_firmwareipq8076_firmwaresa515mqca6574_firmwareqca9886qcn5502_firmwarear7420sd855sm7325p_firmwaresd665ipq8076qca6175asd765qca9887qca9378_firmwareqca6574a_firmwareqcn5021ipq8069qcn5152sd768g_firmwaresd850_firmwaresm7315apq8009sd460qca6391sdxr1_firmwareipq6005aqt1000_firmwareqcn9100sdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwareqca9882_firmwareqcn9070_firmwaresdx20sd480_firmwareipq6028_firmwareipq8072a_firmwaresm6225_firmwareqca9531ipq8074_firmwareqca6574auqca9889_firmwaresa8155p_firmwaremdm9607qcn5122wcd9341_firmwarewsa8810sm8450pwcn6856qcn5022qca6564_firmwaresd768gipq6010_firmwarewcn6740qca6696sd845_firmwaresa6150pqca8075qcn9022_firmwareapq8096au_firmwareqcn6024qcn9022sd845qca9990_firmwareipq8070aqcn9072_firmwaresm7250pipq6000_firmwaresd720g_firmwaresdx12ipq8071_firmwareqcs410_firmwareqcn9074_firmwareipq4029qca6175a_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-30323
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.58%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 10:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of maximum size of data write to EFS file can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwaresd678mdm9640_firmwaresa6150p_firmwaresa8145p_firmwareqcs610sm6250p_firmwareqcs2290_firmwaresd7c_firmwarecsrb31024mdm9628_firmwaremdm9650qcs4290wcn3950_firmwaremdm9250sa8150p_firmwareqca6420_firmwareqca6595au_firmwareqcs2290sd730_firmwarewcd9370sd_675_firmwaresd675_firmwareqcs6125_firmwareqca6584au_firmwarewcn3990_firmwareqca9377sa415mwcn3998sdw2500_firmwaresd_8cx_gen2_firmwarewcd9326_firmwaremdm9628sd720gmdm9206_firmwareqsw8573_firmwarewcn3615_firmwarewcn3950wcn3660bqca6574au_firmwarewcn3680b_firmwareqca6595ausdx12_firmwarewcd9375_firmwarewcn3615msm8909wwcn3998_firmwareapq8009w_firmwareqca6420apq8053_firmwarewcn3610_firmwaremdm9207qca6564au_firmwareqca6584ausa6155p_firmwareqca9367_firmwarewcd9306mdm8207sd_8cx_gen2sd429qca9367qcs6125qca4004_firmwaremdm9607_firmwaremdm9655_firmwaresa415m_firmwarewcn3988_firmwareqca6430sa6145p_firmwaresd205sd429_firmwaresm6250wcd9306_firmwarewcd9340sa8195papq8017_firmwarewsa8810_firmwarequalcomm215_firmwarewcd9326wcd9335sa6155pqca6174a_firmwaremdm9250_firmwareqcs4290_firmwarewcd9341mdm9655qca6696_firmwarewcn3910_firmwarewcd9375aqt1000sa8150psm6250_firmwaremdm9207_firmwaremsm8953_firmwareqca4004sda429wsd210sd855_firmwaresd660wcn3620_firmwaresdx20_firmwarewcn3988wsa8815_firmwaresd660_firmwarewcn3620sa8195p_firmwareapq8017qca6564awcn3610qcm6125_firmwaremdm9640qcm2290_firmwarewcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd_675sdm429wmsm8996au_firmwarewcd9330qca6564ausdx24qet4101_firmwaremsm8909w_firmwareqca6574msm8996ausdm429w_firmwaresd665_firmwarewcd9380sd850sm6250pqualcomm215qcs410qca6574amdm9206qca6174asdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sd439_firmwareqsw8573mdm9205qca6574_firmwarewcd9340_firmwaresd855wsa8815sd665sd7cwcn3910mdm9650_firmwarewcn3660b_firmwareqca6574a_firmwaresd850_firmwarewcn3980_firmwaresd730sdxr1_firmwarewcd9330_firmwareaqt1000_firmwaremsm8953sd678_firmwareqcm4290csrb31024_firmwaresdx20qca6574ausa8155p_firmwaremdm9607sd205_firmwareqca6564a_firmwareapq8009wwcd9341_firmwareqcm6125qcm4290_firmwarewsa8810sd210_firmwareqcs610_firmwaremdm9150sa6145pwcn3680bsdxr1apq8096ausa8145pmdm8207_firmwareqca6696mdm9205_firmwaresd845_firmwarewcd9370_firmwaresa6150psdw2500apq8053apq8096au_firmwaresa8155psd675sd845sd439qet4101sd720g_firmwaresdx12qcs410_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-57509
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 37.15%
||
7 Day CHG~0.00%
Published-29 Jan, 2025 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-28547
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.08% / 23.12%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:05
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in SPS Applications

Memory corruption in SPS Application while requesting for public key in sorter TA.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qdx1010_firmwaresdm429w_firmwaresd865_5gqcs8155_firmwaresnapdragon_632_mobileqca6595qca8081_firmwaresnapdragon_670_mobilewcd9340_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilefastconnect_6700wcn3610sa4150psnapdragon_427_mobile_firmwaresnapdragon_782g_mobile_firmwaresnapdragon_wear_4100\+_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395snapdragon_665_mobile_firmwaresc8180xp-aaabqca6574au_firmwareqcn7606_firmwareqca6564_firmwaresm6370qam8295pwcd9341sd626_firmwaresnapdragon_820_automotivesnapdragon_888\+_5g_mobile_firmware315_5g_iot_firmwaresd730_firmwarewsa8810_firmwarewsa8845h_firmwaresa9000p_firmwaresc8180xp-acafwcn3660_firmwaresnapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430sd835_firmwareqcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770psnapdragon_678_mobile_firmwaresnapdragon_425_mobilesd821snapdragon_632_mobile_firmwaresa8540pqsm8250_firmwareqsm8350_firmwarevideo_collaboration_vc1_platformqep8111sa7255psnapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200qca6310wcd9360sd821_firmwaresnapdragon_680_4g_mobilesa6155pqca6564au_firmwaresd820snapdragon_429_mobile_firmwareqam8650pvideo_collaboration_vc5_platform_firmwaresa9000psnapdragon_888_5g_mobile_firmwaresxr2250p_firmwaresnapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwaremdm9640_firmwaresd835snapdragon_x55_5g_modem-rfsnapdragon_4_gen_2_mobile_firmwareqca6436_firmwaresnapdragon_695_5g_mobile_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqts110sm4125_firmwareqca6420wcn3910apq8064au_firmwaremdm9205s_firmwarecsrb31024snapdragon_712_mobilewcn3660bqca6574awcn3620_firmwareqca6174awcd9340qcs8250_firmwareqcm2290qdu1210talynplussnapdragon_auto_5g_modem-rf_gen_2snapdragon_835_mobile_pc_firmwaresm8550p_firmwaresxr2250pqcm8550wcn3988snapdragon_765_5g_mobile_firmwareqcn9024vision_intelligence_300_firmwareqca6574215_mobileqamsrv1hqcs410qcm2290_firmwarevision_intelligence_100sa8155phome_hub_100snapdragon_765g_5g_mobile_firmwarewsa8830smart_display_200_firmwaresm8550psa6145psnapdragon_625_mobile_firmwaresa8255p_firmwaremsm8996ausnapdragon_4_gen_2_mobilesnapdragon_7c_compute_firmwareqrb5165m_firmwaresa8650p_firmwaresnapdragon_820_mobile_firmwarewcn3620snapdragon_865\+_5g_mobile_firmwaresnapdragon_429_mobileapq8064auwcn3950_firmwareqrb5165nmdm9205sfastconnect_6200sm7325p_firmwaresd460wcd9360_firmwaresc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_660_mobile_firmwareqdx1011snapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarerobotics_rb3_firmwaresd670_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobilesc8180xp-acaf_firmwareqcn6224_firmwarevision_intelligence_100_firmwareqca6431sd660_firmwaresnapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwareqca9379_firmwaresxr2130_firmwaresrv1msnapdragon_860_mobile_firmwarear8035_firmwaresnapdragon_778g\+_5g_mobileqrb5165msc8380xpqca6320sd888_firmwarewcd9306qcs6125_firmwaresnapdragon_wear_1300_firmwareqcn9074wsa8815_firmwareqca8337_firmwaresnapdragon_665_mobilesm7250p_firmwarewcn3680_firmwarewcn3999wcn3950snapdragon_730g_mobile_firmwareqca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaretalynplus_firmwaresnapdragon_778g\+_5g_mobile_firmwareapq8037sa8295p_firmwaresmart_audio_400_firmwaresd_675_firmwaresa4155p_firmwaresnapdragon_720g_mobilesm7250pcsrb31024_firmwaresa8155sc8180x-acafsd888qru1062_firmwarefsm10056sd460_firmwaresnapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobilesc8380xp_firmwareqru1062qca6310_firmwaresd626fastconnect_6800qcs7230pm8937snapdragon_865_5g_mobile_firmwarewcd9371fastconnect_6900_firmwarerobotics_rb5_firmwaresc8180x-aaab_firmwarevideo_collaboration_vc3_platformqcm2150_firmware215_mobile_firmwareqca6431_firmwareqca6698aq_firmwareqcs2290qcn7606qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615wcn3999_firmwarewcn3680sa8255pqcs7230_firmwarewcd9390_firmwareqep8111_firmwareqca6430snapdragon_855\+_mobilemdm9650qdx1011_firmwaresnapdragon_765_5g_mobilesnapdragon_860_mobilesc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfflight_rb5_5g_firmwaressg2125pqru1052snapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwareqamsrv1mqam8650p_firmwarevideo_collaboration_vc5_platformqca6420_firmwareqcs6490_firmwaresd855_firmwarewcd9335_firmwaremdm9640qca6436qrb5165n_firmwarewcn3980_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmware9205_lte_firmwareqdu1010_firmwareqcs4290_firmwaresnapdragon_430_mobile_firmwarecsra6620qca8081sd660wsa8815qam8775pqca9377snapdragon_ar2_gen_1_firmwareqcm4325_firmwaresnapdragon_439_mobile_firmwareqcm4290_firmwaresnapdragon_720g_mobile_firmwaresnapdragon_821_mobile_firmwaresnapdragon_710_mobileqcs5430_firmwaresg4150p_firmwareqru1052_firmwarecsra6620_firmwareqcs8550sa8650psnapdragon_626_mobileqam8775p_firmwaresd865_5g_firmwaresnapdragon_xr1wcd9375snapdragon_ar2_gen_1snapdragon_636_mobilesa8145psd_675snapdragon_8\+_gen_1_mobile_firmwaresmart_display_200qdx1010wcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwareqcm8550_firmwareapq8017qcs410_firmwarerobotics_rb3sa6150p_firmwaresw5100psxr1120qcs610_firmwarewcd9335wcd9370snapdragon_7c_gen_2_compute_firmwareqca4004qca6696wcd9341_firmwarewcn6740_firmwaresnapdragon_780g_5g_mobilesnapdragon_750g_5g_mobilevision_intelligence_200_firmwaresnapdragon_685_4g_mobilesnapdragon_x50_5g_modem-rf_firmwareqdu1110snapdragon_auto_4g_modemsnapdragon_690_5g_mobile_firmwaresnapdragon_wear_1300qca6574auwcd9390sa8620p_firmwarepm8937_firmwarecsra6640snapdragon_778g_5g_mobile_firmwaresrv1hwcn3660b_firmwaresd730snapdragon_690_5g_mobileqcn6024_firmwaresnapdragon_636_mobile_firmwareqcm5430snapdragon_712_mobile_firmwaresnapdragon_625_mobileqcm6125_firmwarec-v2x_9150ssg2115pqcc710snapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaresxr1120_firmwaresnapdragon_wear_4100\+fastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwareqru1032_firmwarefsm10056_firmwareqfw7114qam8255p_firmwaresa8155_firmwareqca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_730_mobilewsa8845snapdragon_626_mobile_firmwareqca6421_firmwareqcm6125sc8180x-adwsa8810qdu1000_firmwareqsm8250srv1h_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwareqdu1010wcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840srv1m_firmwareqcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesnapdragon_x35_5g_modem-rf_firmwareqdu1210_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwareqcn9012mdm9650_firmwarewcd9371_firmwareqcs4490_firmwarewcn3910_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobilewcd9370_firmwareqdu1110_firmwareqdu1000sa7255p_firmwaresnapdragon_8\+_gen_2_mobilesa8195p9205_lteqca6335_firmwareqcm6490sa8540p_firmwaresm6370_firmwaresnapdragon_662_mobileqca9379sa8775psxr2230p_firmwaresd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwareqcn9011sa8775p_firmwaresmart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326sa8155p_firmwaresnapdragon_630_mobileqca6564aqcn9074_firmwaresnapdragon_768g_5g_mobile_firmwaresnapdragon_7c_gen_2_computesc8180x\+sdx55_firmwarear8035qamsrv1m_firmwareqca6564sa6155qcm4325qcn6224snapdragon_435_mobile_firmwaresc8180x\+sdx55qca6698aqssg2125p_firmwaresm6250snapdragon_480\+_5g_mobilesd670wcn3680bsa8145p_firmwareqcs8155sa8150p_firmwarefastconnect_6700_firmwarewcn3990snapdragon_x75_5g_modem-rf_firmwareqcs6490qcs8250snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarehome_hub_100_firmwaresnapdragon_460_mobile_firmwarewsa8830_firmwareqca6678aq_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwareqca6678aqsnapdragon_x35_5g_modem-rfsc8180xp-aaab_firmwaresa4150p_firmwareqca6564ausnapdragon_820_mobilesnapdragon_425_mobile_firmwaresm6250p_firmwaresc8180xp-adsc8280xp-abbbsa8195p_firmwareqcm4290sd_455_firmwarear8031sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_xr2\+_gen_1sm4125qcm4490_firmwareqru1032vision_intelligence_400_firmwareqcs6125flight_rb5_5gsnapdragon_870_5g_mobile_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobileqca4004_firmwaresnapdragon_870_5g_mobilesnapdragon_678_mobilesd_455sm6250_firmwaresc8180x-ad_firmwaresnapdragon_7c_computeqca6584auqca6320_firmwareqcn6274_firmwaresnapdragon_435_mobileqcn9011_firmwaresw5100_firmwarewcn6740snapdragon_780g_5g_mobile_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwareqfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobileapq8017_firmwarewcd9380sa6145p_firmwareqam8255psa6155_firmwaresxr2230psnapdragon_450_mobile_firmwaresnapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresc8180x-aaabsxr1230psd662_firmwarewcn3660sw5100aqt1000wcd9306_firmwaresnapdragon_4_gen_1_mobile_firmwareqca6234c-v2x_9150_firmwareqam8295p_firmwaresd855wcn3990_firmwaresm7315snapdragon_660_mobileqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqsm8350qca6234_firmwaresnapdragon_8_gen_1_mobilesnapdragon_630_mobile_firmwaresd662snapdragon_680_4g_mobile_firmwarewcn3610_firmwareqcs4290sxr1230p_firmwaresnapdragon_821_mobilesnapdragon_865\+_5g_mobilesd820_firmwaresg8275psm6250psdx55_firmwarewcn3615_firmwaresxr2130qcm4490snapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfapq8037_firmwaresnapdragon_670_mobile_firmwareaqt1000_firmwaresdm429wqca6584au_firmwareqcn6274qfw7124qca6595au_firmwaresw5100p_firmwareqca6696_firmwarewcd9380_firmwareqca6574_firmwaresg4150psd_8_gen1_5gqca6797aqsnapdragon_x75_5g_modem-rfsnapdragon_427_mobilesa8620pqca6574a_firmwaresdx55snapdragon_4_gen_1_mobilesnapdragon_450_mobilesnapdragon_865_5g_mobilesnapdragon_835_mobile_pcsd675snapdragon_855\+_mobile_firmwaresd_8_gen1_5g_firmwarewcd9375_firmwareqca6391qts110_firmwareqcn9012_firmwaresnapdragon_439_mobilesa8770p_firmwaresa8295psc8280xp-abbb_firmwarefastconnect_7800snapdragon_8\+_gen_2_mobile_firmwarevision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmware315_5g_iotqamsrv1h_firmwaresnapdragon_430_mobilevision_intelligence_400wsa8835_firmwaressg2115p_firmwarewcn3980qcm2150snapdragon_w5\+_gen_1_wearableqcs610Snapdragonsnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_720g_mobile_platform_firmwarequalcomm_video_collaboration_vc1_platform_firmwarewsa8832_firmwareqca6431_firmwaresnapdragon_x35_5g_modem-rf_system_firmwareflight_rb5_5g_platform_firmwaresd888_firmwareqcn9024_firmwareqca6234_firmwaresd820_firmwaresd821_firmwarewcn3660_firmwarewsa8835_firmwaresd670_firmwarefastconnect_6700_firmwaresa8155p_firmwareqcn6224_firmwareqca6420_firmwarecsrb31024_firmwaresd626_firmwareqca9377_firmwaresm7315_firmwaresnapdragon_820_automotive_platform_firmwarevision_intelligence_400_platform_firmwaresd835_firmwarewcd9385_firmwarewcn3610_firmwarefastconnect_7800_firmwaressg2125p_firmwarewcd9360_firmwarecsra6620_firmwaresa8155_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcn6024_firmwareqamsrv1m_firmwaresa8620p_firmwareqcn6274_firmwarewcd9306_firmwareqam8650p_firmwarec-v2x_9150_firmwareqsm8250_firmwarewcn3950_firmwaresnapdragon_670_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresrv1m_firmwareqrb5165n_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresa8195p_firmwarewcn3910_firmwareqcn9012_firmwareqcs5430_firmwareqdx1011_firmwaresw5100_firmwaresa9000p_firmwarear8035_firmwaresnapdragon_695_5g_mobile_platform_firmware315_5g_iot_modem_firmwarewsa8845_firmwaresd660_firmwaresnapdragon_429_mobile_platform_firmwaremdm9640_firmwareqca6574au_firmwareapq8017_firmwareqca6678aq_firmwaresm4125_firmwaresnapdragon_425_mobile_platform_firmwarewcn3980_firmwarewcn3680_firmwaresnapdragon_626_mobile_platform_firmwareqcm6125_firmwarewcn3660b_firmwareqca6696_firmwaresnapdragon_430_mobile_platform_firmwareqsm8350_firmwareapq8064au_firmwaresnapdragon_xr1_platform_firmwareqca8337_firmwarefsm10056_firmwareqca6595au_firmwareqamsrv1h_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_ar2_gen_1_platform_firmwarepm8937_firmwarewcd9395_firmwareqdu1010_firmwaresg4150p_firmwareqca6174a_firmwareqca6391_firmwarewcd9370_firmwarewsa8840_firmwaretalynplus_firmwaresnapdragon_427_mobile_platform_firmwareqam8775p_firmwarewcd9371_firmwarerobotics_rb3_platform_firmwaresw5100p_firmwareqcm4325_firmwaresnapdragon_865_5g_mobile_platform_firmwarewsa8830_firmwaremsm8996au_firmwareqam8295p_firmwareqca6320_firmwareqca6574_firmwaresd_675_firmwarewcd9335_firmwaresnapdragon_630_mobile_platform_firmwarear8031_firmwareqcm4490_firmwarequalcomm_215_mobile_platform_firmwareqcm2290_firmwaresnapdragon_480_5g_mobile_platform_firmwaresnapdragon_662_mobile_platform_firmwareqdx1010_firmwareqcs610_firmwarewsa8815_firmwarewcn3990_firmwareapq8037_firmwaresm6370_firmwaresnapdragon_450_mobile_platform_firmwareqca9379_firmwareqrb5165m_firmwareqca6430_firmware9205_lte_modem_firmwaresd865_5g_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqca6426_firmwaresnapdragon_auto_4g_modem_firmwaresc8380xp_firmwaresdx55_firmwaresmart_audio_400_platform_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca6421_firmwareqam8255p_firmwareqca6310_firmwaresa8650p_firmwaresnapdragon_435_mobile_platform_firmwareqca6574a_firmwaresd_455_firmwareqcs4490_firmwaresa8150p_firmwareqcs7230_firmwaresrv1h_firmwaresd855_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8255p_firmwaresm7325p_firmwarewcn3988_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresnapdragon_660_mobile_platform_firmwaresnapdragon_855_mobile_platform_firmwareqcm6490_firmwaresxr2250p_firmwarefastconnect_6200_firmwaresnapdragon_820_mobile_platform_firmwaresa4155p_firmwaresm6250_firmwaresa6155_firmwaresm7250p_firmwaresnapdragon_675_mobile_platform_firmwareqca6698aq_firmwareqca8081_firmwaresnapdragon_680_4g_mobile_platform_firmwaresa8770p_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_636_mobile_platform_firmwarecsra6640_firmwaresxr1120_firmwarewcd9341_firmwarewsa8845h_firmwareqcm8550_firmwareqdu1110_firmwareqca6436_firmwaresd662_firmwareqca6595_firmwaresa7255p_firmwarewcd9326_firmwareqcn9011_firmwaremdm9650_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresnapdragon_439_mobile_platform_firmwarevision_intelligence_300_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6564a_firmwareqca6335_firmwareqcn7606_firmwaresnapdragon_625_mobile_platform_firmwaresnapdragon_690_5g_mobile_platform_firmwarewcd9340_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6800_firmwareqcs6125_firmwareqcc710_firmwaresa6155p_firmwareqcn9074_firmwarewcn6740_firmwaresd_8_gen1_5g_firmwareqcs8550_firmwaresa8540p_firmwareqca6564au_firmwaresnapdragon_xr2_5g_platform_firmwareqca6564_firmwaresm6250p_firmwareqep8111_firmwaresa8775p_firmwaresnapdragon_wear_1300_platform_firmwarewcn3615_firmwareqcs8155_firmwarewcd9390_firmwareaqt1000_firmwaresm8550p_firmwaresdm429w_firmwarewcn3999_firmwareqcs6490_firmwaresnapdragon_632_mobile_platform_firmwareqcm5430_firmwaresnapdragon_821_mobile_platform_firmwaresd675_firmwaresa6145p_firmwaresnapdragon_835_mobile_pc_platform_firmwaresa8295p_firmwaresnapdragon_845_mobile_platform_firmwaresa4150p_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa6150p_firmwaresxr1230p_firmwareqfw7124_firmwaremdm9205s_firmwarefastconnect_6900_firmwareqdu1000_firmwaresxr2130_firmwarewcd9380_firmwareqca6584au_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarewsa8810_firmwareqfw7114_firmwaresd730_firmwaresxr2230p_firmwaressg2115p_firmwaresg8275p_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresa8145p_firmwaresd460_firmwareqru1052_firmwarequalcomm_video_collaboration_vc3_platform_firmwarerobotics_rb5_platform_firmwareqdu1210_firmwareqcs4290_firmwarehome_hub_100_platform_firmwareqru1062_firmwareqcs2290_firmwaresnapdragon_460_mobile_platform_firmwareqca6797aq_firmwarewcn3680b_firmwaresnapdragon_712_mobile_platform_firmwareqcm2150_firmwarewcn3620_firmwaresnapdragon_665_mobile_platform_firmwareqru1032_firmwareqcs410_firmwareqts110_firmwareqcm4290_firmwareqca4004_firmwareqcs8250_firmwarewcd9375_firmware
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-28952
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.18% / 38.82%
||
7 Day CHG~0.00%
Published-20 Mar, 2021 | 20:05
Updated-03 Aug, 2024 | 21:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectLinux Kernel Organization, Inc
Product-aff_500f_firmwarelinux_kernela250_firmwarecloud_backupfas_500f_firmwarefedoraa250aff_500ffas_500fsolidfire_baseboard_management_controller_firmwaresolidfire_baseboard_management_controllern/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-29219
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.07% / 19.92%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:29
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential local buffer overflow vulnerability has been identified in HPE FlexNetwork 5130 EL Switch Series version: Prior to 5130_EI_7.10.R3507P02. HPE has made the following software update to resolve the vulnerability in HPE FlexNetwork 5130 EL Switch Series version 5130_EL_7.10.R3507P02.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-flexnetwork_5130_jg940a_firmwareflexnetwork_5130_jg936aflexnetwork_5130_jg933a_firmwareflexnetwork_5130_jg940aflexnetwork_5130_jg934a_firmwareflexnetwork_5130_jg933aflexnetwork_5130_jg934aflexnetwork_5130_jg937aflexnetwork_5130_jg932a_firmwareflexnetwork_5130_jg937a_firmwareflexnetwork_5130_jg941aflexnetwork_5130_jg936a_firmwareflexnetwork_5130_jg932aflexnetwork_5130_jg941a_firmwareHPE FlexNetwork 5130 EI Switch Series
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-25505
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 28.73%
||
7 Day CHG+0.02%
Published-22 Apr, 2023 | 02:29
Updated-04 Feb, 2025 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler of the AMI MegaRAC BMC , where an attacker with the appropriate level of authorization can cause a buffer overflow, which may lead to denial of service, information disclosure, or arbitrary code execution.

Action-Not Available
Vendor-NVIDIA Corporation
Product-bmcdgx-1NVIDIA DGX servers
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-26572
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.19%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 18:50
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webgetactivexcfg function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-baseboard_management_controllerapollo_70_systemHPE Apollo 70 System
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-26570
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.14%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 18:47
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webifc_setadconfig function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-baseboard_management_controllerapollo_70_systemHPE Apollo 70 System
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-26571
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.19%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 18:43
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webgetactivexcfg function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-baseboard_management_controllerapollo_70_systemHPE Apollo 70 System
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-26409
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.51%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-09 Apr, 2025 | 14:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient bounds checking in SEV-ES may allow an attacker to corrupt Reverse Map table (RMP) memory, potentially resulting in a loss of SNP (Secure Nested Paging) memory integrity.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-milanpi_firmwaremilanpi3rd Gen EPYC
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-26573
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.19%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 19:05
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webgeneratesslcfg function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-baseboard_management_controllerapollo_70_systemHPE Apollo 70 System
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-26577
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.88%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 19:46
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so uploadsshkey function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-baseboard_management_controllerapollo_70_systemHPE Apollo 70 System
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25461
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.03% / 9.19%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 18:05
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper length check in APAService prior to SMR Sep-2021 Release 1 results in stack based Buffer Overflow.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-25498
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-7.3||HIGH
EPSS-0.08% / 22.87%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 17:11
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A possible buffer overflow vulnerability in maetd_eco_cb_mode of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25142
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.75%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 17:57
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webstartflash function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-baseboard_management_controllerapollo_70_systemHPE Apollo 70 System
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25496
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-7.3||HIGH
EPSS-0.08% / 22.87%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 17:11
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A possible buffer overflow vulnerability in maetd_dec_slice of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25169
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.19%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 18:06
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so websetservicecfg function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-baseboard_management_controllerapollo_70_systemHPE Apollo 70 System
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25494
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.06% / 17.83%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 17:11
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A possible buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows arbitrary code execution.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25408
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 14:33
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A possible buffer overflow vulnerability in NPU driver prior to SMR JUN-2021 Release 1 allows arbitrary memory write and code execution.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-androidexynos_2100exynos_9830exynos_980exynos_9820Samsung Mobile Devices
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25126
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 31.52%
||
7 Day CHG~0.00%
Published-29 Jan, 2021 | 18:08
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice downloadkvmjnlp_func function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-cloudline_cl5200_gen9_servercloudline_cl3100_gen10_server_firmwarecloudline_cl5800_gen10_servercloudline_cl3100_gen10_servercloudline_cl4100_gen10_servercloudline_cl5200_gen9_server_firmwarecloudline_cl5800_gen9_server_firmwarecloudline_cl5800_gen9_servercloudline_cl5800_gen10_server_firmwarecloudline_cl4100_gen10_server_firmwareHPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25134
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 31.52%
||
7 Day CHG~0.00%
Published-29 Jan, 2021 | 18:43
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setremoteimageinfo_func function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-cloudline_cl5200_gen9_servercloudline_cl3100_gen10_server_firmwarecloudline_cl5800_gen10_servercloudline_cl3100_gen10_servercloudline_cl4100_gen10_servercloudline_cl5200_gen9_server_firmwarecloudline_cl5800_gen9_server_firmwarecloudline_cl5800_gen9_servercloudline_cl5800_gen10_server_firmwarecloudline_cl4100_gen10_server_firmwareHPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25135
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 31.52%
||
7 Day CHG~0.00%
Published-29 Jan, 2021 | 18:45
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setsmtp_func function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-cloudline_cl5200_gen9_servercloudline_cl3100_gen10_server_firmwarecloudline_cl5800_gen10_servercloudline_cl3100_gen10_servercloudline_cl4100_gen10_servercloudline_cl5200_gen9_server_firmwarecloudline_cl5800_gen9_server_firmwarecloudline_cl5800_gen9_servercloudline_cl5800_gen10_server_firmwarecloudline_cl4100_gen10_server_firmwareHPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25138
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 31.52%
||
7 Day CHG~0.00%
Published-29 Jan, 2021 | 18:03
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice uploadsshkey function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-cloudline_cl5200_gen9_servercloudline_cl3100_gen10_server_firmwarecloudline_cl5800_gen10_servercloudline_cl3100_gen10_servercloudline_cl4100_gen10_servercloudline_cl5200_gen9_server_firmwarecloudline_cl5800_gen9_server_firmwarecloudline_cl5800_gen9_servercloudline_cl5800_gen10_server_firmwarecloudline_cl4100_gen10_server_firmwareHPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25136
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-7.8||HIGH
EPSS-0.13% / 31.52%
||
7 Day CHG~0.00%
Published-29 Jan, 2021 | 18:46
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setsolvideoremotestorage_func function.

Action-Not Available
Vendor-n/aHewlett Packard Enterprise (HPE)
Product-cloudline_cl5200_gen9_servercloudline_cl3100_gen10_server_firmwarecloudline_cl5800_gen10_servercloudline_cl3100_gen10_servercloudline_cl4100_gen10_servercloudline_cl5200_gen9_server_firmwarecloudline_cl5800_gen9_server_firmwarecloudline_cl5800_gen9_servercloudline_cl5800_gen10_server_firmwarecloudline_cl4100_gen10_server_firmwareHPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-57510
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.37%
||
7 Day CHG~0.00%
Published-29 Jan, 2025 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-25497
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-7.3||HIGH
EPSS-0.08% / 22.87%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 17:11
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A possible buffer overflow vulnerability in maetd_cpy_slice of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-notesSamsung Notes
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-24851
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.84%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in WLAN HOST

Memory Corruption in WLAN HOST while parsing QMI response message from firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pimmersive_home_214qcs410_firmwaresd865_5gsa6150p_firmwareipq9574qcn9000_firmwareqca6595qcn9022qcs610_firmwaresnapdragon_8\+_gen_1ipq6028_firmwarewcd9335qca8081_firmwarewcd9370qcn9001qca8072qca6696wcd9340_firmwarewcd9341_firmwareipq5028_firmwareqcn6024qcn9003_firmwareipq8076wcn6740_firmwarefastconnect_6700ipq6018_firmwareqcn6023snapdragon_695_5gsa4150pqcn5124_firmwaresnapdragon_888_5gwsa8832_firmwareqca8337ipq6000snapdragon_4_gen_2_firmwareqca6574au_firmwareipq8078aipq8078a_firmwareqam8295psnapdragon_x12_lte_firmwarewcd9341qca6574auwsa8810_firmwarecsra6640snapdragon_690_5gsnapdragon_778g\+_5g_firmwaresnapdragon_865\+_5gqcn9100_firmwaresnapdragon_765_5gqcn5122qca6554afastconnect_6800_firmwaresnapdragon_865\+_5g_firmwaresd835_firmwareqcn6024_firmwaresnapdragon_x65_5gvideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_888\+_5g_firmwareqcn9000ssg2115pqcn6132_firmwaresnapdragon_xr2_5g_firmwareqsm8350_firmwareqcn5054snapdragon_765g_5g_firmwaresnapdragon_660_firmwaresnapdragon_4_gen_2fastconnect_6900video_collaboration_vc1_platformqcn5052wcd9385_firmwareipq9574_firmwareqca6310qam8255p_firmwaresnapdragon_778g_5gipq8074a_firmwareipq8076aqcn5164qcs4490sa6155pqca6564au_firmwarecsr8811_firmwarewsa8810qca8075qam8650pqca8085qca6595ausm7315_firmwaresnapdragon_865_5g_firmwarewcd9326_firmwaresa6155p_firmwaresd835snapdragon_835qcn9012ipq8070a_firmwareqcn9070qcs4490_firmwarewcn3910_firmwareqca8084snapdragon_680_4gwcn3910sdx65mwcd9370_firmwaresnapdragon_480\+_5g_firmwaresnapdragon_765_5g_firmwareqca6574aqca6174asnapdragon_695_5g_firmwaresa8195psnapdragon_750g_5g_firmwarewcd9340qcm2290qcm6490qcn6122_firmwareqcn5154_firmwaresnapdragon_x55_5g_firmwarewcn3988qcn5122_firmwareqcn9274qcn9024ipq8076a_firmwareqca6574sxr2230p_firmwareqcn9011snapdragon_439_firmwaresmart_audio_400qcn9024_firmwareqca8082sa6150pwcd9326qcs410qcm2290_firmwaresa8155p_firmwaresa8155pqca8072_firmwarewsa8830snapdragon_870_5g_firmwaresa6145psnapdragon_x65_5g_firmwareqcn9074_firmwareipq8174immersive_home_318_firmwareqcn6122sa8255p_firmwaresnapdragon_888\+_5gipq8174_firmwarear8035ipq8072aqrb5165m_firmwareimmersive_home_216_firmwareqcm4325immersive_home_316ipq8071asnapdragon_782gqca6698aqwcn3950_firmwaressg2125p_firmwareqrb5165nfastconnect_6200wcn3680bsm7325p_firmwaresa8145p_firmwaresa8150p_firmwaresnapdragon_835_firmwarefastconnect_6700_firmwaresnapdragon_768g_5gvideo_collaboration_vc3_platform_firmwarewcn3990qcn6023_firmwareqcn5164_firmwaresnapdragon_778g_5g_firmwaresnapdragon_780g_5gqcn9002ipq8078qcs6490snapdragon_778g\+_5gfastconnect_6200_firmwareqcn9072wsa8830_firmwareqca8386_firmwaresd660_firmwaresnapdragon_7c\+_gen_3wsa8832qca8082_firmwareimmersive_home_216ar8035_firmwareqcn5022_firmwareqrb5165msnapdragon_680_4g_firmwareqca6320sa4150p_firmwareqca4024_firmwaresd888_firmwareipq9008snapdragon_439qca6564ausnapdragon_460ipq9008_firmwareqcn9074wsa8815_firmwaresnapdragon_865_5gsa8195p_firmwareqca8337_firmwareqcm4290qcn5054_firmwareqca9888snapdragon_480_5g_firmwaresnapdragon_4_gen_1_firmwaresnapdragon_x12_ltesnapdragon_685_4gsnapdragon_xr2\+_gen_1qca9377_firmwareipq8173qcm6490_firmwareipq8072a_firmwaresnapdragon_w5\+_gen_1sm7250p_firmwareipq6010_firmwareqcm4490_firmwarewcn3950flight_rb5_5gsnapdragon_690_5g_firmwareqca6797aq_firmwareipq5028qca8085_firmwareqcn9070_firmwaresa8295p_firmwaresmart_audio_400_firmwaresnapdragon_460_firmwaresa4155p_firmwareqcn9022_firmwareipq5010_firmwareqcn6132snapdragon_auto_5g_firmwaresm7250psnapdragon_768g_5g_firmwareipq6018qca6584ausd888qca6320_firmwareqcn9011_firmwaresw5100_firmwarewcn6740qca6310_firmwarefastconnect_6800qca4024qca6595_firmwarefastconnect_7800_firmwareimmersive_home_214_firmwareqcn9001_firmwareipq8070afastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psxr2230psnapdragon_xr2_5gsa8150pqcn9003qca8075_firmwaresnapdragon_888_5g_firmwaresnapdragon_765g_5gqcn5052_firmwaresxr1230pipq6010sdx65m_firmwarevideo_collaboration_vc3_platformsw5100qam8295p_firmwaresnapdragon_8_gen_1_firmwarewcn3990_firmwaresm7315snapdragon_750g_5gqca6698aq_firmwareqcs2290wcd9385qsm8350qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615qca8084_firmwaresnapdragon_8_gen_1sa8255pqcs4290sxr1230p_firmwareqcn5024snapdragon_782g_firmwaresnapdragon_x55_5gipq8071a_firmwarewcn3615_firmwareflight_rb5_5g_firmwaressg2125pqca6554a_firmwareipq6028qcm4490snapdragon_4_gen_1snapdragon_870_5gcsra6640_firmwareqcn9100robotics_rb5snapdragon_480\+_5gqca6174a_firmwaresnapdragon_685_4g_firmwaresm7325pqam8650p_firmwareqcs6490_firmwaresnapdragon_480_5gipq8076_firmwarewcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6584au_firmwareqcn5152_firmwarewsa8835qca6595au_firmwareqca6391_firmwaresw5100p_firmwareqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarecsra6620sd660qca8081wsa8815sg4150psd_8_gen1_5gqam8775pqca9377snapdragon_ar2_gen_1_firmwaresnapdragon_auto_5gqcn5124qca6797aqqcn5152qcm4325_firmwaresnapdragon_660qca6574a_firmwareqcn9072_firmwareqcm4290_firmwareqca9888_firmwareipq8074aqca9889snapdragon_8\+_gen_1_firmwareqcn5024_firmwaresd_8_gen1_5g_firmwareqcn9002_firmwarewcd9375_firmwaresnapdragon_7c\+_gen_3_firmwareqca8386immersive_home_318ipq5010qcn9274_firmwareqca6391snapdragon_w5\+_gen_1_firmwareipq8173_firmwareqcn9012_firmwaresg4150p_firmwaresnapdragon_780g_5g_firmwarecsra6620_firmwaresa8295pipq6000_firmwarefastconnect_7800qam8775p_firmwaresd865_5g_firmwarewcd9375ipq8078_firmwareqca9889_firmwaresnapdragon_ar2_gen_1wcn3988_firmwareimmersive_home_316_firmwareqcn5154sa8145pwsa8835_firmwaressg2115p_firmwarecsr8811qcn5022wcn3980wcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-2241
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 34.82%
||
7 Day CHG+0.10%
Published-22 Apr, 2023 | 16:00
Updated-04 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PoDoFo PdfXRefStreamParserObject.cpp readXRefStreamEntry heap-based overflow

A vulnerability, which was classified as critical, was found in PoDoFo 0.10.0. Affected is the function readXRefStreamEntry of the file PdfXRefStreamParserObject.cpp. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 535a786f124b739e3c857529cecc29e4eeb79778. It is recommended to apply a patch to fix this issue. VDB-227226 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-podofo_projectn/a
Product-podofoPoDoFo
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 7
  • 8
  • Next
Details not found