cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-27360,https://securityvulnerability.io/vulnerability/CVE-2024-27360,Denial of Service Vulnerability in Samsung Exynos Mobile Processors,"Samsung has identified a critical vulnerability within several of its Exynos mobile processors including the Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, and Exynos W930. This vulnerability arises due to inadequate validation of data length, which could be exploited to cause a Denial of Service (DoS), potentially disrupting the functionality of affected devices. Users of these processors should be aware of the implications for system stability and security, and follow recommended security practices to mitigate risks.",Samsung,Exynos 850 Firmware,7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-07-09T18:15:00.000Z,0 CVE-2024-32504,https://securityvulnerability.io/vulnerability/CVE-2024-32504,Out-of-Bounds Write Vulnerability in Samsung Exynos Mobile and Wearable Processors,"A vulnerability has been identified in several Samsung Exynos mobile and wearable processors, specifically regarding inadequate length checking during processing. This flaw may permit an Out-of-Bounds Write scenario, potentially leading to unauthorized access or manipulation of memory, which can compromise device integrity and user data security. Products affected include the Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, and Exynos W930. Mitigation steps are currently under review, and users are encouraged to stay updated through Samsung's official product security updates.",Samsung,Exynos 850 Firmware,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-06-13T00:00:00.000Z,0 CVE-2024-32503,https://securityvulnerability.io/vulnerability/CVE-2024-32503,Use-After-Free Vulnerability in Samsung Exynos Mobile and Wearable Processors,"A vulnerability has been identified in Samsung's Exynos mobile and wearable processors, stemming from inadequate memory deallocation checking. This flaw could lead to a Use-After-Free (UAF) scenario, potentially allowing attackers to exploit the system and execute arbitrary code or cause unintended behavior. The affected models include Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, and Exynos W930. Users and developers are advised to explore available mitigations and security recommendations.",Samsung,Exynos 850 Firmware,7.8,HIGH,0.01,false,,false,false,false,,,false,false,,2024-06-07T16:15:00.000Z,0 CVE-2023-26072,https://securityvulnerability.io/vulnerability/CVE-2023-26072,Heap-based Buffer Overflow in Samsung Exynos Mobile Chipsets,"An identified issue in Samsung Mobile Chipsets entails a heap-based buffer overflow occurring in the 5G MM message codec, attributable to inadequate validation of parameters when decoding the Emergency number list. This vulnerability potentially exposes devices to manipulation and remote exploitation, impacting the overall integrity and security of data transmission in mobile networks.",Samsung,Exynos 850 Firmware,9.8,CRITICAL,0.005200000014156103,false,,false,false,false,,,false,false,,2023-03-13T00:00:00.000Z,0 CVE-2023-26073,https://securityvulnerability.io/vulnerability/CVE-2023-26073,Heap-Based Buffer Overflow in Samsung Mobile Chipset and Baseband Modem,"A vulnerability has been identified in Samsung's Exynos mobile chipset and baseband modem systems, where a heap-based buffer overflow may occur. This issue arises from inadequate parameter validation during the decoding of the extended emergency number list in the 5G MM message codec, potentially leading to data corruption or other unforeseen behavior. The affected products include several Exynos chipsets ranging from the Exynos 850 to the Exynos 2200, as well as multiple modem variants. This flaw emphasizes the importance of stringent validation protocols in mobile communication systems to safeguard against exploitation.",Samsung,Exynos 850 Firmware,9.8,CRITICAL,0.005200000014156103,false,,false,false,false,,,false,false,,2023-03-13T00:00:00.000Z,0 CVE-2023-26074,https://securityvulnerability.io/vulnerability/CVE-2023-26074,Heap-based Buffer Overflow Vulnerability in Samsung Mobile Chipset Products,"A heap-based buffer overflow vulnerability has been identified in Samsung's Mobile Chipset, specifically within the 5G MM message codec. This issue arises due to inadequate parameter validation when decoding operator-defined access category definitions across several Exynos chipsets, including the Exynos 850, 980, 1080, 1280, 2200, and their corresponding modem chipsets. Exploitation of this flaw could potentially allow unauthorized access or remote code execution, posing significant risks to device security.",Samsung,Exynos 850 Firmware,9.8,CRITICAL,0.005200000014156103,false,,false,false,false,,,false,false,,2023-03-13T00:00:00.000Z,0 CVE-2023-26075,https://securityvulnerability.io/vulnerability/CVE-2023-26075,Intra-Object Overflow in Samsung Mobile and Baseband Modem Chipsets,"A notable vulnerability has been identified in Samsung's Mobile Chipset and Baseband Modem Chipset that affects several models, including Exynos 850 and Exynos 980, among others. This vulnerability can lead to an intra-object overflow due to inadequate parameter validation during the decoding process of the Service Area List within the 5G MM message codec. Such overflow issues can potentially allow attackers to exploit affected systems, creating security risks. Users and organizations utilizing these chipsets should remain vigilant and apply any offered security updates.",Samsung,Exynos 850 Firmware,9.8,CRITICAL,0.005410000216215849,false,,false,false,false,,,false,false,,2023-03-10T00:00:00.000Z,0