112 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 274EXPL: 0

Memory Corruption in Core Platform while printing the response buffer in log. Corrupción de la memoria en Core Platform al imprimir el búfer de respuesta en el registro. • https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 272EXPL: 0

Memory corruption in Core Platform while printing the response buffer in log. Corrupción de la memoria en Core Platform al imprimir el búfer de respuesta en el registro. • https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 8.4EPSS: 0%CPEs: 568EXPL: 0

Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-704: Incorrect Type Conversion or Cast •

CVSS: 8.4EPSS: 0%CPEs: 378EXPL: 0

Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVSS: 7.5EPSS: 0%CPEs: 198EXPL: 0

Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •