Page 43 of 572 results (0.008 seconds)

CVSS: 8.1EPSS: 0%CPEs: 196EXPL: 0

Memory corruption in kernel due to missing checks when updating the access rights of a memextent mapping. • https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.2EPSS: 0%CPEs: 134EXPL: 0

Denial of service in MODEM due to improper pointer handling • https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin • CWE-763: Release of Invalid Pointer or Reference •

CVSS: 9.8EPSS: 0%CPEs: 300EXPL: 0

Memory corruption in Bluetooth HOST due to buffer overflow while parsing the command response received from remote • https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin • CWE-787: Out-of-bounds Write •

CVSS: 8.4EPSS: 0%CPEs: 196EXPL: 0

Possible memory corruption in kernel while performing memory access due to hypervisor not correctly invalidated the processor translation caches in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile Posible corrupción de la memoria en el kernel al realizar el acceso a la memoria debido a que el hipervisor no invalidó correctamente las cachés de traducción del procesador en Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile • https://www.qualcomm.com/company/product-security/bulletins/december-2022-bulletin •

CVSS: 7.8EPSS: 0%CPEs: 92EXPL: 0

Memory corruption in camera due to buffer copy without checking size of input in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Wearables Corrupción de la memoria en la cámara debido a una copia del búfer sin verificar el tamaño de la entrada en Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Wearables • https://www.qualcomm.com/company/product-security/bulletins/december-2022-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •