Filter

Google AndroidBuffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN Host

First published (updated )

Qualcomm Apq8053 FirmwareLast updated 29 November 2024

First published (updated )

Google AndroidUse of Out-of-range Pointer Offset in WLAN HAL

7.8
First published (updated )

Google AndroidBuffer Copy Without Checking Size of Input in WLAN HAL

7.8
First published (updated )

Qualcomm 9205 Lte FirmwareImproper Validation of Array Index in WLAN HAL

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Google AndroidStack out-of-bounds write occurs while setting up a cipher device if the provided IV length exceeds …

8.4
First published (updated )

Google AndroidInteger Overflow

7.8
First published (updated )

Google AndroidBuffer Overflow, Input Validation

7.8
First published (updated )

Google AndroidInformation disclosure through timing and power side-channels during mod exponentiation for RSA-CRT …

First published (updated )

Google AndroidOut of bound access in WLAN driver due to lack of validation of array length before copying into arr…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Google Androidu'Out of bound access can happen in MHI command process due to lack of check of channel id value rec…

7.8
First published (updated )

Google AndroidOut-of-bounds Read

7.8
First published (updated )

Google AndroidInteger Overflow, Buffer Overflow

7.8
First published (updated )

Google AndroidBuffer copy without checking the size of input in WLAN HAL.

8.4
First published (updated )

Google AndroidDenial of service while processing fine timing measurement request (FTMR) frame with reserved bits s…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Google AndroidArithmetic overflow can happen while processing NOA IE due to improper error handling in Snapdragon …

7.5
First published (updated )

Google AndroidPossible denial of service due to RTT responder consistently rejects all FTMR by transmitting FTM1 w…

7.8
First published (updated )

Google AndroidInteger Overflow, Buffer Overflow

8.8
First published (updated )

Google AndroidBuffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN HAL

8.4
First published (updated )

Google AndroidOut of bounds memcpy can occur by providing the embedded NULL character string and length greater th…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Qualcomm Ipq4019 FirmwareUse After Free

7.8
First published (updated )

Google AndroidWhile sending the rendered surface content to the screen, Error handling is not properly checked res…

First published (updated )

Qualcomm Ipq4019 Firmwareu'fscanf reads a string from a file and stores its contents on a statically allocated stack memory w…

First published (updated )

Google AndroidInteger Overflow, Buffer Overflow

7.8
First published (updated )

Google AndroidImproper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to i…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Qualcomm Ipq4019 FirmwareCommand Injection

First published (updated )

Google AndroidUse After Free

7.8
First published (updated )

Google AndroidBuffer Overflow

7.8
First published (updated )

Google AndroidPossible out of bounds read due to a missing bounds check and could lead to local information disclo…

7.5
First published (updated )

Google AndroidRace Condition, Use After Free

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203