Vulnerabilities (CVE)

Filtered by CWE-823
Total 37 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-43534 1 Qualcomm 132 Ar8035, Ar8035 Firmware, Fastconnect 6900 and 129 more 2024-04-12 N/A 9.8 CRITICAL
Memory corruption while validating the TID to Link Mapping action request frame, when a station connects to an access point.
CVE-2023-43516 1 Qualcomm 16 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 13 more 2024-04-12 N/A 7.8 HIGH
Memory corruption when malformed message payload is received from firmware.
CVE-2023-43513 1 Qualcomm 534 315 5g Iot Modem, 315 5g Iot Modem Firmware, Apq8017 and 531 more 2024-04-12 N/A 7.8 HIGH
Memory corruption while processing the event ring, the context read pointer is untrusted to HLOS and when it is passed with arbitrary values, may point to address in the middle of ring element.
CVE-2023-33110 2024-04-12 N/A 7.0 HIGH
The session index variable in PCM host voice audio driver initialized before PCM open, accessed during event callback from ADSP and reset during PCM close may lead to race condition between event callback - PCM close and reset session index causing memory corruption.
CVE-2023-33079 1 Qualcomm 288 Apq5053-aa, Apq5053-aa Firmware, Ar8035 and 285 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in Audio while running invalid audio recording from ADSP.
CVE-2023-33067 1 Qualcomm 226 9206 Lte Modem, 9206 Lte Modem Firmware, Aqt1000 and 223 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points.
CVE-2023-33033 2024-04-12 N/A 7.8 HIGH
Memory corruption in Audio during playback with speaker protection.
CVE-2023-43553 2024-04-12 N/A 9.8 CRITICAL
Memory corruption while parsing beacon/probe response frame when AP sends more supported links in MLIE.
CVE-2023-33066 2024-04-12 N/A 8.4 HIGH
Memory corruption in Audio while processing RT proxy port register driver.
CVE-2024-1013 2024-03-18 N/A 7.1 HIGH
An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.
CVE-2023-2426 1 Vim 1 Vim 2024-02-04 N/A 5.5 MEDIUM
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 9.0.1499.
CVE-2022-32142 1 Codesys 2 Plcwinnt, Runtime Toolkit 2024-02-04 5.5 MEDIUM 8.1 HIGH
Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required.
CVE-2022-0554 4 Apple, Debian, Fedoraproject and 1 more 4 Macos, Debian Linux, Fedora and 1 more 2024-02-04 6.8 MEDIUM 7.8 HIGH
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.
CVE-2022-0685 4 Apple, Debian, Fedoraproject and 1 more 4 Macos, Debian Linux, Fedora and 1 more 2024-02-04 6.8 MEDIUM 7.8 HIGH
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.
CVE-2022-1420 3 Apple, Fedoraproject, Vim 3 Macos, Fedora, Vim 2024-02-04 4.3 MEDIUM 5.5 MEDIUM
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.
CVE-2022-0729 4 Apple, Debian, Fedoraproject and 1 more 4 Macos, Debian Linux, Fedora and 1 more 2024-02-04 6.5 MEDIUM 8.8 HIGH
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.
CVE-2021-1352 1 Cisco 1 Ios Xe 2024-02-04 2.9 LOW 6.5 MEDIUM
A vulnerability in the DECnet Phase IV and DECnet/OSI protocol processing of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation of DECnet traffic that is received by an affected device. An attacker could exploit this vulnerability by sending DECnet traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.