Vulnerabilities > Qualcomm > Snapdragon XR2 5G Firmware > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-03-04 | CVE-2023-33066 | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption in Audio while processing RT proxy port register driver. | 7.8 |
2024-03-04 | CVE-2023-43549 | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption while processing TPC target power table in FTM TPC. | 7.8 |
2023-09-05 | CVE-2023-28567 | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption in WLAN HAL while handling command through WMI interfaces. | 7.8 |
2023-09-05 | CVE-2023-28573 | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption in WLAN HAL while parsing WMI command parameters. | 7.8 |
2023-09-05 | CVE-2023-33015 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame. | 7.5 |
2023-09-05 | CVE-2023-33021 | Use After Free vulnerability in Qualcomm products Memory corruption in Graphics while processing user packets for command submission. | 7.8 |
2023-08-08 | CVE-2023-28575 | Type Confusion vulnerability in Qualcomm products The cam_get_device_priv function does not check the type of handle being returned (device/session/link). | 7.8 |
2023-08-08 | CVE-2023-28576 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Qualcomm products The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. | 7.0 |
2023-08-08 | CVE-2023-28577 | Use After Free vulnerability in Qualcomm products In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. | 7.8 |
2023-07-04 | CVE-2023-21633 | Out-of-bounds Write vulnerability in Qualcomm products Memory Corruption in Linux while processing QcRilRequestImsRegisterMultiIdentityMessage request. | 7.8 |