Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2021-10-20 CVE-2021-30305 Improper Input Validation vulnerability in Qualcomm products
Possible out of bound access due to lack of validation of page offset before page is inserted in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
local
low complexity
qualcomm CWE-20
7.8
2021-10-20 CVE-2021-30306 Out-of-bounds Read vulnerability in Qualcomm products
Possible buffer over read due to improper buffer allocation for file length passed from user space in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
local
low complexity
qualcomm CWE-125
7.1
2021-10-20 CVE-2021-30315 Use After Free vulnerability in Qualcomm products
Improper handling of sensor HAL structure in absence of sensor can lead to use after free in Snapdragon Auto
local
low complexity
qualcomm CWE-416
7.8
2021-10-20 CVE-2021-30316 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products
Possible out of bound memory access due to improper boundary check while creating HSYNC fence in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
local
low complexity
qualcomm CWE-119
7.8
2021-10-19 CVE-2021-3454 Reachable Assertion vulnerability in Zephyrproject Zephyr 2.4.0/2.5.0/2.5.1
Truncated L2CAP K-frame causes assertion failure.
network
low complexity
zephyrproject CWE-617
7.5
2021-10-19 CVE-2021-3455 Use After Free vulnerability in Zephyrproject Zephyr 2.4.0/2.5.0/2.5.1
Disconnecting L2CAP channel right after invalid ATT request leads freeze.
network
low complexity
zephyrproject CWE-416
7.5
2021-10-19 CVE-2021-31350 Improper Privilege Management vulnerability in Juniper Junos and Junos OS Evolved
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the targeted system.
network
low complexity
juniper CWE-269
8.8
2021-10-19 CVE-2021-31354 Out-of-bounds Read vulnerability in Juniper Junos and Junos OS Evolved
An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacker to cause a partial Denial of Service (DoS), or lead to remote code execution (RCE).
low complexity
juniper CWE-125
8.8
2021-10-19 CVE-2021-31357 OS Command Injection vulnerability in Juniper Junos OS Evolved
A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user.
local
low complexity
juniper CWE-78
7.8
2021-10-19 CVE-2021-31378 Missing Release of Resource after Effective Lifetime vulnerability in Juniper Junos
In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and then requests to logout, the subscriber may be forced into a "Terminating" state by an attacker who is able to send spoofed messages appearing to originate from trusted RADIUS server(s) destined to the device in response to the subscriber's request.
network
low complexity
juniper CWE-772
7.5