Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linuxfoundation yocto 4.0 vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv3
CVE-2023-32807
In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588360; Issue ID: ALPS07588360.
Linuxfoundation Yocto 4.0
Mediatek Iot Yocto 23.0
Google Android 13.0
6.5
CVSSv3
CVE-2023-20800
In imgsys, there is a possible system crash due to a mssing ptr check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420955.
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.4
CVSSv3
CVE-2023-20801
In imgsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420968.
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
6.5
CVSSv3
CVE-2023-20802
In imgsys, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420976.
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
7.5
CVSSv3
CVE-2023-20690
In wlan firmware, there is possible system crash due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664735; Issue ID: ALPS07664735.
Linuxfoundation Yocto 4.0
Google Android 11.0
Google Android 12.0
7.5
CVSSv3
CVE-2023-20691
In wlan firmware, there is possible system crash due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664731; Issue ID: ALPS07664731.
Linuxfoundation Yocto 4.0
Google Android 11.0
Google Android 12.0
7.5
CVSSv3
CVE-2023-20693
In wlan firmware, there is possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664711; Issue ID: ALPS07664711.
Linuxfoundation Yocto 4.0
Google Android 11.0
Google Android 12.0
6.4
CVSSv3
CVE-2023-20835
In camsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07341261; Issue ID: ALPS07326570.
Linuxfoundation Yocto 4.0
Mediatek Iot Yocto 23.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-32811
In connectivity system driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929848; Issue ID: AL...
Linuxfoundation Yocto 4.0
Mediatek Iot Yocto 23.0
Google Android 12.0
Google Android 13.0
6.7
CVSSv3
CVE-2023-32806
In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441589; Issue ID: ALPS07441589.
Linuxfoundation Yocto 4.0
Mediatek Iot Yocto 23.0
Google Android 12.0
Google Android 13.0
Openwrt Openwrt 21.02.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
CVE-2024-20360
CVE-2021-47559
XXE
CVE-2024-5229
CVE-2021-47543
CVE-2021-47571
SSTI
CVE-2024-4978
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »