Qualcomm

Sda660 Firmware

410 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 08.09.2020 10:15:15
  • Zuletzt bearbeitet 21.11.2024 05:31:25

u'Channel name string which has been read from shared memory is potentially subjected to string manipulations but not validated for NULL termination can results into memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, ...

  • EPSS 0.05%
  • Veröffentlicht 08.09.2020 10:15:15
  • Zuletzt bearbeitet 21.11.2024 05:31:25

u'A potential buffer overflow exists due to integer overflow when parsing handler options due to wrong data type usage in operation' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdr...

  • EPSS 0.05%
  • Veröffentlicht 08.09.2020 10:15:15
  • Zuletzt bearbeitet 21.11.2024 05:31:28

u'Information disclosure issue can occur due to partial secure display-touch session tear-down' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &...

  • EPSS 0.05%
  • Veröffentlicht 08.09.2020 10:15:15
  • Zuletzt bearbeitet 21.11.2024 05:31:28

u'Information disclosure issue occurs as in current logic Secure Touch session is released without terminating display session' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapd...

  • EPSS 0.04%
  • Veröffentlicht 08.09.2020 10:15:14
  • Zuletzt bearbeitet 21.11.2024 05:31:24

u'XBL SEC clears only ZI region when loading Qualcomm-signed segments can lead to improper access issue' in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in A...

  • EPSS 0.03%
  • Veröffentlicht 08.09.2020 10:15:14
  • Zuletzt bearbeitet 21.11.2024 05:31:25

u'Non-secure memory is touched multiple times during TrustZone\u2019s execution and can lead to privilege escalation or memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial...

  • EPSS 0.05%
  • Veröffentlicht 08.09.2020 10:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:07

u'Information disclosure issue occurs as in current logic as secure touch is released without clearing the display session which can result in user reading the secure input while touch is in non-secure domain as secure display is active' in Snapdrago...

  • EPSS 0.04%
  • Veröffentlicht 08.09.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 04:19:21

u'SMEM partition can be manipulated in case of any compromise on HLOS, thus resulting in access to memory outside of SMEM address range which could lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon...

  • EPSS 0.02%
  • Veröffentlicht 08.09.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 04:19:27

u'Improper authentication and signature verification of debug polices in secure boot loader will allow unverified debug policies to be loaded into secure memory and leads to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connec...

  • EPSS 0.04%
  • Veröffentlicht 08.09.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 04:19:35

u'Possibility of integer overflow in keymaster 4 while allocating memory due to multiplication of large numcerts value and size of keymaster bob which can lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Sna...