Page 57 of 10540 results (0.066 seconds)

CVSS: 6.0EPSS: 0%CPEs: -EXPL: 0

Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption. • https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

Information disclosure while handling beacon probe frame during scan entry generation in client side. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

Information disclosure while handling beacon or probe response frame in STA. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

oFono AT CMT Command Uninitialized Variable Information Disclosure Vulnerability. • https://www.zerodayinitiative.com/advisories/ZDI-24-1081 • CWE-457: Use of Uninitialized Variable •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. •