Show filters
487 Total Results
Displaying 181-190 of 487
Sort by:
Attacker Value
Unknown
CVE-2023-21644
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Memory corruption in RIL due to Integer Overflow while triggering qcril_uim_request_apdu request.
0
Attacker Value
Unknown
CVE-2023-21636
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Memory Corruption due to improper validation of array index in Linux while updating adn record.
0
Attacker Value
Unknown
CVE-2022-40524
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.
0
Attacker Value
Unknown
CVE-2022-33275
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Memory corruption due to improper validation of array index in WLAN HAL when received lm_itemNum is out of range.
0
Attacker Value
Unknown
CVE-2022-33220
Disclosure Date: September 05, 2023 (last updated February 25, 2025)
Information disclosure in Automotive multimedia due to buffer over-read.
0
Attacker Value
Unknown
CVE-2023-28575
Disclosure Date: August 08, 2023 (last updated February 25, 2025)
The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it.
0
Attacker Value
Unknown
CVE-2023-28555
Disclosure Date: August 08, 2023 (last updated February 25, 2025)
Transient DOS in Audio while remapping channel buffer in media codec decoding.
0
Attacker Value
Unknown
CVE-2023-28537
Disclosure Date: August 08, 2023 (last updated February 25, 2025)
Memory corruption while allocating memory in COmxApeDec module in Audio.
0
Attacker Value
Unknown
CVE-2023-22666
Disclosure Date: August 08, 2023 (last updated February 25, 2025)
Memory Corruption in Audio while playing amrwbplus clips with modified content.
0
Attacker Value
Unknown
CVE-2023-21652
Disclosure Date: August 08, 2023 (last updated February 25, 2025)
Cryptographic issue in HLOS as derived keys used to encrypt/decrypt information is present on stack after use.
0