Vulnerabilities (CVE)

Filtered by vendor Linuxfoundation Subscribe
Total 357 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-20054 5 Google, Linuxfoundation, Mediatek and 2 more 51 Android, Yocto, Mt2735 and 48 more 2025-04-23 N/A 6.6 MEDIUM
In gnss, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08580200; Issue ID: ALPS08580200.
CVE-2024-20055 3 Google, Linuxfoundation, Mediatek 19 Android, Yocto, Iot Yocto and 16 more 2025-04-23 N/A 6.3 MEDIUM
In imgsys, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation Patch ID: ALPS08518692; Issue ID: MSV-1012.
CVE-2024-20023 5 Google, Linuxfoundation, Mediatek and 2 more 27 Android, Yocto, Mt2713 and 24 more 2025-04-22 N/A 6.7 MEDIUM
In flashc, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541638; Issue ID: ALPS08541638.
CVE-2024-20147 4 Google, Linuxfoundation, Mediatek and 1 more 26 Android, Yocto, Mt2737 and 23 more 2025-04-22 N/A 5.3 MEDIUM
In Bluetooth FW, there is a possible reachable assertion due to improper exception handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389046 (Note: For MT79XX chipsets) / ALPS09136501 (Note: For MT2737, MT3603, MT6XXX, and MT8XXX chipsets); Issue ID: MSV-1797.
CVE-2024-20148 3 Google, Linuxfoundation, Mediatek 18 Android, Yocto, Mt3603 and 15 more 2025-04-22 N/A 9.8 CRITICAL
In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796.
CVE-2024-20146 4 Google, Linuxfoundation, Mediatek and 1 more 30 Android, Yocto, Mt2737 and 27 more 2025-04-22 N/A 8.1 HIGH
In wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389496 / ALPS09137491; Issue ID: MSV-1835.
CVE-2024-20145 5 Google, Linuxfoundation, Mediatek and 2 more 22 Android, Yocto, Mt2737 and 19 more 2025-04-22 N/A 6.6 MEDIUM
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09290940; Issue ID: MSV-2040.
CVE-2024-20144 5 Google, Linuxfoundation, Mediatek and 2 more 36 Android, Yocto, Mt2737 and 33 more 2025-04-22 N/A 6.6 MEDIUM
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2041.
CVE-2024-20143 5 Google, Linuxfoundation, Mediatek and 2 more 24 Android, Yocto, Mt2737 and 21 more 2025-04-22 N/A 6.6 MEDIUM
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069.
CVE-2024-20140 3 Google, Linuxfoundation, Mediatek 13 Android, Yocto, Mt6739 and 10 more 2025-04-22 N/A 6.7 MEDIUM
In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09270402; Issue ID: MSV-2020.
CVE-2025-20650 5 Google, Linuxfoundation, Mediatek and 2 more 25 Android, Yocto, Mt2737 and 22 more 2025-04-22 N/A 6.8 MEDIUM
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061.
CVE-2025-20651 5 Google, Linuxfoundation, Mediatek and 2 more 25 Android, Yocto, Mt2737 and 22 more 2025-04-22 N/A 4.1 MEDIUM
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062.
CVE-2025-2953 1 Linuxfoundation 1 Pytorch 2025-04-22 1.7 LOW 3.3 LOW
A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The security policy of the project warns to use unknown models which might establish malicious effects.
CVE-2024-20152 4 Google, Linuxfoundation, Mediatek and 1 more 24 Android, Yocto, Mt2737 and 21 more 2025-04-21 N/A 4.4 MEDIUM
In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.
CVE-2017-17697 1 Linuxfoundation 1 Harbor 2025-04-20 5.0 MEDIUM 8.6 HIGH
The Ping() function in ui/api/target.go in Harbor through 1.3.0-rc4 has SSRF via the endpoint parameter to /api/targets/ping.
CVE-2019-19030 1 Linuxfoundation 1 Harbor 2025-04-14 N/A 5.3 MEDIUM
Cloud Native Computing Foundation Harbor before 1.10.3 and 2.x before 2.0.1 allows resource enumeration because unauthenticated API calls reveal (via the HTTP status code) whether a resource exists.
CVE-2013-6474 4 Canonical, Debian, Fedoraproject and 1 more 4 Ubuntu Linux, Debian Linux, Fedora and 1 more 2025-04-12 6.8 MEDIUM N/A
Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.
CVE-2013-6475 4 Canonical, Debian, Fedoraproject and 1 more 4 Ubuntu Linux, Debian Linux, Fedora and 1 more 2025-04-12 6.8 MEDIUM N/A
Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
CVE-2014-4337 1 Linuxfoundation 1 Cups-filters 2025-04-12 4.3 MEDIUM N/A
The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.
CVE-2014-4338 1 Linuxfoundation 1 Cups-filters 2025-04-12 4.0 MEDIUM N/A
cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.