Total
37 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-43534 | 1 Qualcomm | 132 Ar8035, Ar8035 Firmware, Fastconnect 6900 and 129 more | 2024-04-12 | N/A | 9.8 CRITICAL |
Memory corruption while validating the TID to Link Mapping action request frame, when a station connects to an access point. | |||||
CVE-2023-43516 | 1 Qualcomm | 16 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 13 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory corruption when malformed message payload is received from firmware. | |||||
CVE-2023-43513 | 1 Qualcomm | 534 315 5g Iot Modem, 315 5g Iot Modem Firmware, Apq8017 and 531 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory corruption while processing the event ring, the context read pointer is untrusted to HLOS and when it is passed with arbitrary values, may point to address in the middle of ring element. | |||||
CVE-2023-33110 | 2024-04-12 | N/A | 7.0 HIGH | ||
The session index variable in PCM host voice audio driver initialized before PCM open, accessed during event callback from ADSP and reset during PCM close may lead to race condition between event callback - PCM close and reset session index causing memory corruption. | |||||
CVE-2023-33079 | 1 Qualcomm | 288 Apq5053-aa, Apq5053-aa Firmware, Ar8035 and 285 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory corruption in Audio while running invalid audio recording from ADSP. | |||||
CVE-2023-33067 | 1 Qualcomm | 226 9206 Lte Modem, 9206 Lte Modem Firmware, Aqt1000 and 223 more | 2024-04-12 | N/A | 7.8 HIGH |
Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points. | |||||
CVE-2023-33033 | 2024-04-12 | N/A | 7.8 HIGH | ||
Memory corruption in Audio during playback with speaker protection. | |||||
CVE-2023-43553 | 2024-04-12 | N/A | 9.8 CRITICAL | ||
Memory corruption while parsing beacon/probe response frame when AP sends more supported links in MLIE. | |||||
CVE-2023-33066 | 2024-04-12 | N/A | 8.4 HIGH | ||
Memory corruption in Audio while processing RT proxy port register driver. | |||||
CVE-2024-1013 | 2024-03-18 | N/A | 7.1 HIGH | ||
An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken. | |||||
CVE-2023-2426 | 1 Vim | 1 Vim | 2024-02-04 | N/A | 5.5 MEDIUM |
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 9.0.1499. | |||||
CVE-2022-32142 | 1 Codesys | 2 Plcwinnt, Runtime Toolkit | 2024-02-04 | 5.5 MEDIUM | 8.1 HIGH |
Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required. | |||||
CVE-2022-0554 | 4 Apple, Debian, Fedoraproject and 1 more | 4 Macos, Debian Linux, Fedora and 1 more | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2. | |||||
CVE-2022-0685 | 4 Apple, Debian, Fedoraproject and 1 more | 4 Macos, Debian Linux, Fedora and 1 more | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418. | |||||
CVE-2022-1420 | 3 Apple, Fedoraproject, Vim | 3 Macos, Fedora, Vim | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774. | |||||
CVE-2022-0729 | 4 Apple, Debian, Fedoraproject and 1 more | 4 Macos, Debian Linux, Fedora and 1 more | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440. | |||||
CVE-2021-1352 | 1 Cisco | 1 Ios Xe | 2024-02-04 | 2.9 LOW | 6.5 MEDIUM |
A vulnerability in the DECnet Phase IV and DECnet/OSI protocol processing of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation of DECnet traffic that is received by an affected device. An attacker could exploit this vulnerability by sending DECnet traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. |