Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-3686PUBLISHED: 2021-01-21
Possible memory out of bound issue during music playback when an incorrect bit stream content is copied into array without checking the length of array in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobi...
CVE-2020-3687PUBLISHED: 2021-01-21Local privilege escalation in admin services in Windows environment can occur due to an arbitrary read issue in XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
CVE-2020-3691PUBLISHED: 2021-01-21
Possible out of bound memory access in audio due to integer underflow while processing modified contents in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon We...
CVE-2020-11167PUBLISHED: 2021-01-21
Memory corruption while calculating L2CAP packet length in reassembly logic when remote sends more data than expected in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Weara...
CVE-2020-11179PUBLISHED: 2021-01-21
Arbitrary read and write to kernel addresses by temporarily overwriting ring buffer pointer and creating a race condition. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon ...
User Rank: Apprentice
12/24/2020 | 1:44:19 PM
Inasmuch as there are frauds that occur within supply chains, such as theft and asset mismanagement, supply chain fraud has more to do with the falsification of transactional data and the representative "stuff" as it enters and passes through the two primary supply chain cycles: order-to-cash and procure-to-pay.
Transactions generated by traditional supply chain systems - Enterprise Resource Planning (ERP), Electronic Data Interchange (EDI), and Automatic Identification (e.g. barcode labeling & scanning) - that are used to grade supply chain performance can also be used to ascertain supply chain risk and to detect and therefore reduce fraud, both at the source and in the aggregate.