Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-33021 |
Memory corruption in Graphics while processing user packets for command submission. Published: September 05, 2023; 3:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-33016 |
Transient DOS in WLAN firmware while parsing MLO (multi-link operation). Published: September 05, 2023; 3:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33015 |
Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame. Published: September 05, 2023; 3:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-28584 |
Transient DOS in WLAN Host when a mobile station receives invalid channel in CSA IE while doing channel switch announcement (CSA). Published: September 05, 2023; 3:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-28581 |
Memory corruption in WLAN Firmware while parsing receieved GTK Keys in GTK KDE. Published: September 05, 2023; 3:15:14 AM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-28573 |
Memory corruption in WLAN HAL while parsing WMI command parameters. Published: September 05, 2023; 3:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28567 |
Memory corruption in WLAN HAL while handling command through WMI interfaces. Published: September 05, 2023; 3:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28558 |
Memory corruption in WLAN handler while processing PhyID in Tx status handler. Published: September 05, 2023; 3:15:13 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28557 |
Memory corruption in WLAN HAL while processing command parameters from untrusted WMI payload. Published: September 05, 2023; 3:15:13 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28549 |
Memory corruption in WLAN HAL while parsing Rx buffer in processing TLV payload. Published: September 05, 2023; 3:15:13 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28548 |
Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART. Published: September 05, 2023; 3:15:13 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28538 |
Memory corruption in WIN Product while invoking WinAcpi update driver in the UEFI region. Published: September 05, 2023; 3:15:13 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28577 |
In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address. Published: August 08, 2023; 6:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28576 |
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues. Published: August 08, 2023; 6:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2023-28575 |
The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it. Published: August 08, 2023; 6:15:14 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28542 |
Memory Corruption in WLAN HOST while fetching TX status information. Published: July 04, 2023; 1:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28541 |
Memory Corruption in Data Modem while processing DMA buffer release event about CFR data. Published: July 04, 2023; 1:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-24854 |
Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message. Published: July 04, 2023; 1:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-24851 |
Memory Corruption in WLAN HOST while parsing QMI response message from firmware. Published: July 04, 2023; 1:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-22387 |
Arbitrary memory overwrite when VM gets compromised in TX write leading to Memory Corruption. Published: July 04, 2023; 1:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |