Known Vulnerabilities for Smb1390 Firmware by Qualcomm

Listed below are 10 of the newest known vulnerabilities associated with "Smb1390 Firmware" by "Qualcomm".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-1927 Possible use after free due to lack of null check while memory is being freed in FastRPC driver in Snapdragon Auto, Snapdrago... 7.8 - HIGH 2021-05-07 2021-05-12
CVE-2021-1925 Possible denial of service scenario due to improper handling of group management action frame in Snapdragon Auto, Snapdragon ... 7.5 - HIGH 2021-05-07 2021-05-12
CVE-2021-1915 Buffer overflow can occur due to improper validation of NDP application information length in Snapdragon Auto, Snapdragon Com... 7.8 - HIGH 2021-05-07 2021-05-12
CVE-2021-1910 Double free in video due to lack of input buffer length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity... 9.8 - CRITICAL 2021-05-07 2021-05-12
CVE-2021-1906 Improper handling of address deregistration on failure can lead to new GPU address allocation failure. in Snapdragon Auto, Sn... 5.5 - MEDIUM 2021-05-07 2021-05-12
CVE-2021-1905 Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, ... 7.8 - HIGH 2021-05-07 2021-05-12
CVE-2021-1895 Possible integer overflow due to improper length check while flashing an image in Snapdragon Consumer IOT, Snapdragon Industr... 7.8 - HIGH 2021-05-07 2021-05-12
CVE-2021-1892 Memory corruption due to improper input validation while processing IO control which is nonstandard in Snapdragon Compute, Sn... 7.8 - HIGH 2021-04-07 2022-06-28
CVE-2021-1891 A possible use-after-free occurrence in audio driver can happen when pointers are not properly handled in Snapdragon Auto, Sn... 7.8 - HIGH 2021-05-07 2021-05-21
CVE-2020-3664 Out of bound read access in hypervisor due to an invalid read access attempt by passing invalid addresses in Snapdragon Auto,... 6 - MEDIUM 2021-02-22 2021-03-02

Popular searches for Smb1390 Firmware

Microsoft Launches Secured-Core PC Initiative To Boost Firmware Security

www.crn.com/news/applications-os/microsoft-launches-secured-core-pc-initiative-to-boost-firmware-security

L HMicrosoft Launches Secured-Core PC Initiative To Boost Firmware Security Windows 10 PCs will now feature enhanced firmware # ! Microsoft announced.

Microsoft Personal computer Firmware Computer security Transport Layer Security Boost (C libraries) Windows 10 Intel Core Computer hardware Security Dell Technologies Operating system Multi-core processor CRN (magazine) Microsoft Windows Peripheral Solution Cyberattack Cloud computing Booting

Slow SMB/Local Network speed

superuser.com/questions/1221577/slow-smb-local-network-speed

Slow SMB/Local Network speed This is going to sound crazy. I did some additional searching and found a post. one person suggested to disable windows defender's anti-malware. At first, I disregarded it because it seemed like a long shot and kind of shady... but for the heck of it, I decided to actually try it. After rebooting, I ran another iperf3 test... It's not the full 433mbps, but since I have walls between me and my router, it is much better.

superuser.com/q/1221577 Laptop Computer network Router (computing) Desktop computer Stack Exchange Server Message Block Wi-Fi Local area network Wireless LAN Stack Overflow Antivirus software Received signal strength indication Booting Window (computing) Qualcomm Atheros TCP tuning Software testing Gigabit Ethernet Programmer Desktop environment

© CVE.report 2024 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report