| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command. |
| The pop_msg function in qpopper 4.0.x before 4.0.5fc2 does not null terminate a message buffer after a call to Qvsnprintf, which could allow authenticated users to execute arbitrary code via a buffer overflow in a mdef command with a long macro name. |
| Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags. |
| Denial of service in modem due to missing null check while processing IP packets with padding |
| Memory corruption while reading a type value from a buffer controlled by the Guest Virtual Machine. |
| Memory corruption while processing input message passed from FE driver. |
| Memory corruption may occur in keyboard virtual device due to guest VM interaction. |
| Memory corruption occurs during an Escape call if an invalid Kernel Mode CPU event and sync object handle are passed with the DriverKnownEscape flag reset. |
| Memory corruption while doing Escape call when user provides valid kernel address in the place of valid user buffer address. |
| Memory corruption may occur during communication between primary and guest VM. |
| Transient DOS can occur while processing UCI command. |
| Memory corruption due to improper validation of array index in Multi-mode call processor. |
| Memory corruption in Modem due to usage of Out-of-range pointer offset in UIM |
| Memory corruption in modem due to use of out of range pointer offset while processing qmi msg |
| Memory corruption while reading CPU state data during guest VM suspend. |
| Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. |
| Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image. |
| Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU. |
| Memory corruption while parsing the ML IE due to invalid frame content. |
| Memory corruption due to improper validation of array index in WLAN HAL when received lm_itemNum is out of range. |