| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and earlier, 6.4 all versions, version 6.3.19 and earlier may allow a privileged attacker to execute arbitrary code or commands via specifically crafted CLI `execute backup-local rename` and `execute backup-local show` operations. |
| A missing input validation before memory read in SEM TA prior to SMR Aug-2022 Release 1 allows local attackers to read out of bound memory. |
| Transient DOS due to buffer over-read in WLAN Firmware while parsing secure FTMR frame with size lesser than 39 Bytes. |
| Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs. |
| Memory corruption due to improper validation of array index in User Identity Module when APN TLV length is greater than command length. |
| Information disclosure due to buffer overread in Linux sensors |
| Information disclosure in Modem due to buffer over-read while parsing the wms message received given the buffer and its length. |
| Information disclosure in Modem due to buffer over-read while receiving a IP header with malformed length. |
| Memory corruption occurs in Modem due to improper validation of array index when malformed APDU is sent from card. |
| Memory corruption due to buffer copy without checking the size of input in Core while sending SCM command to get write protection information. |
| Information disclosure in Modem due to buffer over-read while getting length of Unfragmented headers in an IPv6 packet. |
| Memory corruption due to improper validation of array index in computer vision while testing EVA kernel without sending any frames. |
| Memory corruption due to stack based buffer overflow in WLAN having invalid WNM frame length. |
| Memory corruption due to buffer copy without checking the size of input in HLOS when input message size is larger than the buffer capacity. |
| Memory corruption in modem due to buffer copy without checking size of input while receiving WMI command. |
| Information disclosure due to buffer over-read in Trusted Execution Environment while QRKS report generation. |
| Information disclosure due to buffer over-read in WLAN while parsing NMF frame. |
| Memory corruption in modem due to stack based buffer overflow while parsing OTASP Key Generation Request Message. |
| Memory corruption due to stack based buffer overflow in core while sending command from USB of large size. |
| Memory corruption due to buffer copy without checking the size of input in modem while decoding raw SMS received. |