Total
332 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-11294 | 1 Qualcomm | 488 Ar8035, Ar8035 Firmware, Pm215 and 485 more | 2021-05-12 | 4.6 MEDIUM | 7.8 HIGH |
Out of bound write in logger due to prefix size is not validated while prepended to logging string in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | |||||
CVE-2020-11308 | 1 Qualcomm | 666 Apq8009, Apq8009 Firmware, Aqt1000 and 663 more | 2021-03-25 | 7.2 HIGH | 6.8 MEDIUM |
Buffer overflow occurs when trying to convert ASCII string to Unicode string if the actual size is more than required in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music | |||||
CVE-2020-25241 | 1 Siemens | 14 Simatic Mv420 Sr-b, Simatic Mv420 Sr-b Body, Simatic Mv420 Sr-b Body Firmware and 11 more | 2021-03-18 | 5.0 MEDIUM | 7.5 HIGH |
A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions. | |||||
CVE-2020-11271 | 1 Qualcomm | 680 Aqt1000, Aqt1000 Firmware, Ar8031 and 677 more | 2021-03-03 | 7.2 HIGH | 7.8 HIGH |
Possible out of bounds while accessing global control elements due to race condition in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | |||||
CVE-2020-11187 | 1 Qualcomm | 196 Aqt1000, Aqt1000 Firmware, Csrb31024 and 193 more | 2021-02-26 | 7.2 HIGH | 7.8 HIGH |
Possible memory corruption in BSI module due to improper validation of parameter count in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile | |||||
CVE-2020-11163 | 1 Qualcomm | 500 Apq8017, Apq8017 Firmware, Aqt1000 and 497 more | 2021-02-26 | 10.0 HIGH | 9.8 CRITICAL |
Possible buffer overflow while updating ikev2 parameters due to lack of check of input validation for certain parameters received from the ePDG server in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile | |||||
CVE-2020-28851 | 1 Golang | 1 Go | 2021-02-22 | 5.0 MEDIUM | 7.5 HIGH |
In x/text in Go 1.15.4, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.) | |||||
CVE-2020-11146 | 1 Qualcomm | 314 Apq8076, Aqt1000, Ar8031 and 311 more | 2021-01-29 | 4.6 MEDIUM | 7.8 HIGH |
Out of bound write while copying data using IOCTL due to lack of check of array index received from user in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | |||||
CVE-2020-25791 | 1 Sized-chunks Project | 1 Sized-chunks | 2021-01-12 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit(). | |||||
CVE-2020-25793 | 1 Sized-chunks Project | 1 Sized-chunks | 2021-01-12 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>. | |||||
CVE-2020-25796 | 1 Sized-chunks Project | 1 Sized-chunks | 2021-01-12 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the InlineArray implementation, an unaligned reference may be generated for a type that has a large alignment requirement. | |||||
CVE-2020-36067 | 1 Gjson Project | 1 Gjson | 2021-01-07 | 5.0 MEDIUM | 7.5 HIGH |
GJSON <=v1.6.5 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via a crafted GET call. | |||||
CVE-2020-29245 | 1 Tag Project | 1 Tag | 2020-12-29 | 4.3 MEDIUM | 6.5 MEDIUM |
dhowden tag before 2020-11-19 allows "panic: runtime error: slice bounds out of range" via readAtomData. | |||||
CVE-2020-29244 | 1 Tag Project | 1 Tag | 2020-12-29 | 4.3 MEDIUM | 6.5 MEDIUM |
dhowden tag before 2020-11-19 allows "panic: runtime error: slice bounds out of range" via readTextWithDescrFrame. | |||||
CVE-2020-29243 | 1 Tag Project | 1 Tag | 2020-12-29 | 4.3 MEDIUM | 6.5 MEDIUM |
dhowden tag before 2020-11-19 allows "panic: runtime error: index out of range" via readAPICFrame. | |||||
CVE-2020-29242 | 1 Tag Project | 1 Tag | 2020-12-29 | 4.3 MEDIUM | 6.5 MEDIUM |
dhowden tag before 2020-11-19 allows "panic: runtime error: index out of range" via readPICFrame. | |||||
CVE-2020-27485 | 1 Garmin | 2 Forerunner 235, Forerunner 235 Firmware | 2020-12-02 | 6.5 MEDIUM | 9.9 CRITICAL |
Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check the index provided when accessing the local variable in the LGETV and LPUTV instructions. This provides the ability to both read and write memory outside the bounds of the TVM context allocation. It can be leveraged to construct a use-after-free scenario, leading to a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment. | |||||
CVE-2020-27483 | 1 Garmin | 2 Forerunner 235, Forerunner 235 Firmware | 2020-12-02 | 6.5 MEDIUM | 9.9 CRITICAL |
Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the offset provided for the stack value duplication instruction, DUP. The offset is unchecked and memory prior to the start of the execution stack can be read and treated as a TVM object. A successful exploit could use the vulnerability to leak runtime information such as the heap handle or pointer for a number of TVM context variables. Some reachable values may be controlled enough to forge a TVM object on the stack, leading to possible remote code execution. | |||||
CVE-2020-3632 | 1 Qualcomm | 38 Qsm8350, Qsm8350 Firmware, Sc7180 and 35 more | 2020-11-19 | 7.2 HIGH | 7.8 HIGH |
u'Incorrect validation of ring context fetched from host memory can lead to memory overflow' in Snapdragon Compute, Snapdragon Mobile in QSM8350, SC7180, SDX55, SDX55M, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P | |||||
CVE-2020-3639 | 1 Qualcomm | 178 Apq8009, Apq8009 Firmware, Apq8017 and 175 more | 2020-11-19 | 10.0 HIGH | 9.8 CRITICAL |
u'When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130 |