Page 4 of 384 results (0.002 seconds)

CVSS: 8.4EPSS: 0%CPEs: 32EXPL: 0

Memory corruption due to buffer copy without checking the size of input while loading firmware in Linux Kernel. • https://bugzilla.suse.com/show_bug.cgi?id=1209597 https://security.netapp.com/advisory/ntap-20230616-0001 https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 324EXPL: 0

Memory corruption in Bluetooth HOST while processing the AVRC_PDU_GET_PLAYER_APP_VALUE_TEXT AVRCP response. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-129: Improper Validation of Array Index •

CVSS: 8.4EPSS: 0%CPEs: 568EXPL: 0

Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-704: Incorrect Type Conversion or Cast •

CVSS: 8.4EPSS: 0%CPEs: 378EXPL: 0

Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVSS: 7.5EPSS: 0%CPEs: 198EXPL: 0

Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •