{"uuid": "65dc1ab2-211f-4100-a76d-11c9a0c172f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43047", "type": "exploited", "source": "https://t.me/KomunitiSiber/2683", "content": "Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits\nhttps://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html\n\nQualcomm has rolled out security updates to address nearly two dozen flaws spanning proprietary and open-source components, including one that has come under active exploitation in the wild.\nThe high-severity vulnerability, tracked as CVE-2024-43047 (CVSS score: 7.8), has been described as a user-after-free bug in the Digital Signal Processor (DSP) Service that could lead to \"memory corruption", "creation_timestamp": "2024-10-08T09:24:03.000000Z"}