CVE-2025-10457
- EPSS 0.04%
- Veröffentlicht 19.09.2025 05:17:40
- Zuletzt bearbeitet 29.10.2025 18:52:28
The function responsible for handling BLE connection responses does not verify whether a response is expected—that is, whether the device has initiated a connection request. Instead, it relies solely on identifier matching.
CVE-2025-20696
- EPSS 0.02%
- Veröffentlicht 04.08.2025 01:49:46
- Zuletzt bearbeitet 18.08.2025 15:42:28
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is need...
CVE-2025-2962
- EPSS 0.15%
- Veröffentlicht 24.06.2025 05:32:11
- Zuletzt bearbeitet 30.10.2025 15:50:09
A denial-of-service issue in the dns implemenation could cause an infinite loop.
CVE-2025-1675
- EPSS 0.4%
- Veröffentlicht 25.02.2025 08:15:30
- Zuletzt bearbeitet 28.02.2025 01:30:32
The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data.
CVE-2025-1674
- EPSS 0.3%
- Veröffentlicht 25.02.2025 08:15:29
- Zuletzt bearbeitet 28.02.2025 01:30:32
A lack of input validation allows for out of bounds reads caused by malicious or malformed packets.
CVE-2025-1673
- EPSS 0.4%
- Veröffentlicht 25.02.2025 07:15:18
- Zuletzt bearbeitet 28.02.2025 01:30:32
A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation.
CVE-2024-10395
- EPSS 0.28%
- Veröffentlicht 03.02.2025 07:15:09
- Zuletzt bearbeitet 29.10.2025 15:19:30
No proper validation of the length of user input in http_server_get_content_type_from_extension.
CVE-2024-8798
- EPSS 0.25%
- Veröffentlicht 16.12.2024 00:15:05
- Zuletzt bearbeitet 17.09.2025 06:15:41
No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.
CVE-2024-11263
- EPSS 0.16%
- Veröffentlicht 15.11.2024 23:15:10
- Zuletzt bearbeitet 03.02.2025 20:09:54
When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols.
CVE-2024-6444
- EPSS 0.09%
- Veröffentlicht 04.10.2024 07:15:02
- Zuletzt bearbeitet 13.11.2024 15:24:28
No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.