Vulnerabilities (CVE)

Filtered by vendor Qualcomm Subscribe
Filtered by product Wcd9380 Firmware
Total 992 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-23372 1 Qualcomm 222 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 219 more 2024-07-02 N/A 7.8 HIGH
Memory corruption while invoking IOCTL call for GPU memory allocation and size param is greater than expected size.
CVE-2024-23368 1 Qualcomm 686 Apq8064au, Apq8064au Firmware, Aqt1000 and 683 more 2024-07-02 N/A 7.8 HIGH
Memory corruption when allocating and accessing an entry in an SMEM partition.
CVE-2024-23380 1 Qualcomm 212 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6700 and 209 more 2024-07-02 N/A 7.8 HIGH
Memory corruption while handling user packets during VBO bind operation.
CVE-2024-23373 1 Qualcomm 444 205 Mobile Platform, 205 Mobile Platform Firmware, 215 Mobile Platform and 441 more 2024-07-02 N/A 7.8 HIGH
Memory corruption when IOMMU unmap operation fails, the DMA and anon buffers are getting released.
CVE-2023-33016 1 Qualcomm 132 Csr8811, Csr8811 Firmware, Fastconnect 6900 and 129 more 2024-04-12 N/A 7.5 HIGH
Transient DOS in WLAN firmware while parsing MLO (multi-link operation).
CVE-2023-28568 1 Qualcomm 176 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 173 more 2024-04-12 N/A 5.5 MEDIUM
Information disclosure in WLAN HAL when reception status handler is called.
CVE-2023-28558 1 Qualcomm 398 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 395 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN handler while processing PhyID in Tx status handler.
CVE-2023-28562 1 Qualcomm 136 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 133 more 2024-04-12 N/A 9.8 CRITICAL
Memory corruption while handling payloads from remote ESL.
CVE-2023-28574 1 Qualcomm 156 Ar8035, Ar8035 Firmware, Qam8255p and 153 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in core services when Diag handler receives a command to configure event listeners.
CVE-2023-28559 1 Qualcomm 426 Aqt1000, Aqt1000 Firmware, Ar8031 and 423 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN FW while processing command parameters from untrusted WMI payload.
CVE-2023-33061 1 Qualcomm 230 Ar8035, Ar8035 Firmware, Csr8811 and 227 more 2024-04-12 N/A 7.5 HIGH
Transient DOS in WLAN Firmware while parsing WLAN beacon or probe-response frame.
CVE-2023-28584 1 Qualcomm 144 Aqt1000, Aqt1000 Firmware, Csrb31024 and 141 more 2024-04-12 N/A 7.5 HIGH
Transient DOS in WLAN Host when a mobile station receives invalid channel in CSA IE while doing channel switch announcement (CSA).
CVE-2023-33021 1 Qualcomm 336 Apq8064au, Apq8064au Firmware, Aqt1000 and 333 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in Graphics while processing user packets for command submission.
CVE-2023-33056 1 Qualcomm 232 Ar8035, Ar8035 Firmware, Csr8811 and 229 more 2024-04-12 N/A 7.5 HIGH
Transient DOS in WLAN Firmware when firmware receives beacon including T2LM IE.
CVE-2023-28573 1 Qualcomm 398 315 5g Iot, 315 5g Iot Firmware, Aqt1000 and 395 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN HAL while parsing WMI command parameters.
CVE-2023-28548 1 Qualcomm 366 Aqt1000, Aqt1000 Firmware, Ar8035 and 363 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART.
CVE-2023-28555 1 Qualcomm 142 Ar8035, Ar8035 Firmware, Mdm9628 and 139 more 2024-04-12 N/A 7.5 HIGH
Transient DOS in Audio while remapping channel buffer in media codec decoding.
CVE-2023-28567 1 Qualcomm 582 315 5g Iot, 315 5g Iot Firmware, Aqt1000 and 579 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN HAL while handling command through WMI interfaces.
CVE-2023-28564 1 Qualcomm 498 Aqt1000, Aqt1000 Firmware, Ar8031 and 495 more 2024-04-12 N/A 7.8 HIGH
Memory corruption in WLAN HAL while passing command parameters through WMI interfaces.
CVE-2023-28576 1 Qualcomm 62 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 59 more 2024-04-12 N/A 7.0 HIGH
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.