| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Vulnerabilities in Qualcomm Eudora WorldMail Server may allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, as demonstrated by the PROTOS LDAPv3 test suite. |
| Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment." |
| Untrusted search path vulnerability in Qualcomm qpopper 4.0 through 4.05 allows local users to execute arbitrary code by modifying the PATH environment variable to reference a malicious smbpasswd program. |
| Denial of service in modem due to missing null check while processing IP packets with padding |
| Memory corruption occurs during an Escape call if an invalid Kernel Mode CPU event and sync object handle are passed with the DriverKnownEscape flag reset. |
| Memory corruption while reading a type value from a buffer controlled by the Guest Virtual Machine. |
| Memory corruption may occur in keyboard virtual device due to guest VM interaction. |
| Memory corruption while doing Escape call when user provides valid kernel address in the place of valid user buffer address. |
| Memory corruption while processing input message passed from FE driver. |
| Memory corruption may occur during communication between primary and guest VM. |
| Transient DOS can occur while processing UCI command. |
| Memory corruption due to improper validation of array index in Multi-mode call processor. |
| Memory corruption in Modem due to usage of Out-of-range pointer offset in UIM |
| Memory corruption in modem due to use of out of range pointer offset while processing qmi msg |
| Memory corruption while reading CPU state data during guest VM suspend. |
| Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. |
| Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image. |
| Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU. |
| Memory corruption while parsing the ML IE due to invalid frame content. |
| Memory corruption due to improper validation of array index in WLAN HAL when received lm_itemNum is out of range. |