Qualcomm

Qca9377 Firmware

527 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 02.12.2024 11:15:09
  • Last modified 12.12.2024 15:28:32

Memory corruption while invoking IOCTL calls from user space to issue factory test command inside WLAN driver.

  • EPSS 0.04%
  • Published 02.12.2024 11:15:08
  • Last modified 12.12.2024 15:23:26

Memory corruption while Configuring the SMR/S2CR register in Bypass mode.

  • EPSS 0.04%
  • Published 04.11.2024 10:15:09
  • Last modified 07.11.2024 19:46:41

Memory corruption while processing GPU page table switch.

  • EPSS 0.04%
  • Published 04.11.2024 10:15:08
  • Last modified 07.11.2024 19:41:31

Memory corruption while handling session errors from firmware.

  • EPSS 0.04%
  • Published 04.11.2024 10:15:08
  • Last modified 07.11.2024 19:44:17

Memory corruption while invoking IOCTL calls from the use-space for HGSL memory node.

  • EPSS 0.04%
  • Published 04.11.2024 10:15:08
  • Last modified 07.11.2024 19:45:57

Memory corruption while processing voice packet with arbitrary data received from ADSP.

  • EPSS 0.03%
  • Published 04.11.2024 10:15:05
  • Last modified 07.11.2024 20:04:32

Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size.

  • EPSS 0.21%
  • Published 07.10.2024 13:15:12
  • Last modified 11.08.2025 15:06:17

Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame.

  • EPSS 0.03%
  • Published 07.10.2024 13:15:11
  • Last modified 16.10.2024 20:26:47

Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file.

  • EPSS 0.03%
  • Published 07.10.2024 13:15:10
  • Last modified 16.10.2024 20:27:07

Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same.