Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-53023 |
Memory corruption may occur while accessing a variable during extended back to back tests. Published: March 03, 2025; 6:15:13 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-53014 |
Memory corruption may occur while validating ports and channels in Audio driver. Published: March 03, 2025; 6:15:13 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-53011 |
Information disclosure may occur due to improper permission and access controls to Video Analytics engine. Published: March 03, 2025; 6:15:13 AM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2024-43061 |
Memory corruption during voice activation, when sound model parameters are loaded from HLOS, and the received sound model list is empty in HLOS drive. Published: March 03, 2025; 6:15:12 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43060 |
Memory corruption during voice activation, when sound model parameters are loaded from HLOS to ADSP. Published: March 03, 2025; 6:15:12 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43057 |
Memory corruption while processing command in Glink linux. Published: March 03, 2025; 6:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-43056 |
Transient DOS during hypervisor virtual I/O operation in a virtual machine. Published: March 03, 2025; 6:15:11 AM -0500 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2024-43051 |
Information disclosure while deriving keys for a session for any Widevine use case. Published: March 03, 2025; 6:15:11 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-49839 |
Memory corruption during management frame processing due to mismatch in T2LM info element. Published: February 03, 2025; 12:15:20 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-49838 |
Information disclosure while parsing the OCI IE with invalid length. Published: February 03, 2025; 12:15:20 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-45584 |
Memory corruption can occur when a compat IOCTL call is followed by a normal IOCTL call from userspace. Published: February 03, 2025; 12:15:19 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-45571 |
Memory corruption may occour occur when stopping the WLAN interface after processing a WMI command from the interface. Published: February 03, 2025; 12:15:19 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-45569 |
Memory corruption while parsing the ML IE due to invalid frame content. Published: February 03, 2025; 12:15:19 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-38420 |
Memory corruption while configuring a Hypervisor based input virtual device. Published: February 03, 2025; 12:15:18 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-38418 |
Memory corruption while parsing the memory map info in IOCTL calls. Published: February 03, 2025; 12:15:17 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2024-38417 |
Information disclosure while processing IO control commands. Published: February 03, 2025; 12:15:17 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-38416 |
Information disclosure during audio playback. Published: February 03, 2025; 12:15:17 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-38414 |
Information disclosure while processing information on firmware image during core initialization. Published: February 03, 2025; 12:15:17 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2024-45558 |
Transient DOS can occur when the driver parses the per STA profile IE and tries to access the EXTN element ID without checking the IE length. Published: January 06, 2025; 6:15:10 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2024-45555 |
Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image. Published: January 06, 2025; 6:15:10 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |