Vulnerabilities > Qualcomm > Ar8035 Firmware > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-06-03 | CVE-2023-43545 | Integer Overflow or Wraparound vulnerability in Qualcomm products Memory corruption when more scan frequency list or channels are sent from the user space. | 7.8 |
2024-06-03 | CVE-2023-43551 | Improper Authentication vulnerability in Qualcomm products Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command. | 7.5 |
2024-06-03 | CVE-2023-43556 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption in Hypervisor when platform information mentioned is not aligned. | 8.8 |
2024-05-06 | CVE-2023-33119 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Qualcomm products Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache. | 7.0 |
2024-05-06 | CVE-2023-43521 | Use After Free vulnerability in Qualcomm products Memory corruption when multiple listeners are being registered with the same file descriptor. | 7.8 |
2024-05-06 | CVE-2023-43524 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption when the bandpass filter order received from AHAL is not within the expected range. | 7.8 |
2024-05-06 | CVE-2023-43525 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while copying the sound model data from user to kernel buffer during sound model register. | 7.8 |
2024-05-06 | CVE-2023-43526 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption while querying module parameters from Listen Sound model client in kernel from user space. | 7.8 |
2024-05-06 | CVE-2023-43530 | Integer Overflow or Wraparound vulnerability in Qualcomm products Memory corruption in HLOS while checking for the storage type. | 7.8 |
2024-05-06 | CVE-2023-43531 | Access of Uninitialized Pointer vulnerability in Qualcomm products Memory corruption while verifying the serialized header when the key pairs are generated. | 7.8 |