Page 9 of 315 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 34EXPL: 0

An integer underflow may occur due to lack of check when received data length from font_mgr_qsee_request_service is bigger than the minimal value of the segment header, which may result in a buffer overflow, in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850. Puede producirse un subdesbordamiento de enteros debido a la falta de comprobación cuando la longitud de los datos recibidos de font_mgr_qsee_request_service es mayor que el valor mínimo de la cabecera de segmento, lo que puede dar lugar a un desbordamiento del búfer, en Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear en MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850. • https://www.qualcomm.com/company/product-security/bulletins • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 5.5EPSS: 0%CPEs: 42EXPL: 0

A new account can be inserted into simContacts service using Android command line tool in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845. Se puede insertar una nueva cuenta en el servicio simContacts utilizando la herramienta de línea de comandos Android en Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear en MDM9206, MDM9607, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845. • https://www.qualcomm.com/company/product-security/bulletins •

CVSS: 7.8EPSS: 0%CPEs: 32EXPL: 0

While iterating through the models contained in a fixed-size array in the actData structure, which also stores an incorrect number of models that is greater than the size of the array, a buffer overflow occurs in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835 Al iterar a través de los modelos contenidos en un array de tamaño fijo en la estructura actData, que también almacena un número incorrecto de modelos mayor que el tamaño del array, se produce un desbordamiento de búfer en Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear en MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835 • https://www.qualcomm.com/company/product-security/bulletins • CWE-129: Improper Validation of Array Index •

CVSS: 7.8EPSS: 0%CPEs: 42EXPL: 0

A Use After Free Condition can occur in Thermal Engine in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDX20. Una condición de uso después de liberar la memoria puede ocurrir en Thermal Engine en Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear en MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDX20. • https://www.qualcomm.com/company/product-security/bulletins • CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 32EXPL: 0

When HOST sends a Special command ID packet, Controller triggers a RAM Dump and FW reset in Snapdragon Mobile in version SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, Snapdragon_High_Med_2016. Cuando HOST envía un paquete de ID de comando especial, el controlador activa un volcado de RAM y un restablecimiento de FW en Snapdragon Mobile en las versiones SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, Snapdragon_High_Med_2016. • https://www.qualcomm.com/company/product-security/bulletins •