Search Results (Refine Search)
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-23354 |
Memory corruption when the IOCTL call is interrupted by a signal. Published: May 06, 2024; 11:15:22 AM -0400 |
V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2024-23351 |
Memory corruption as GPU registers beyond the last protected range can be accessed through LPAC submissions. Published: May 06, 2024; 11:15:22 AM -0400 |
V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2024-21480 |
Memory corruption while playing audio file having large-sized input buffer. Published: May 06, 2024; 11:15:22 AM -0400 |
V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2024-21477 |
Transient DOS while parsing a protected 802.11az Fine Time Measurement (FTM) frame. Published: May 06, 2024; 11:15:22 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-21476 |
Memory corruption when the channel ID passed by user is not validated and further used. Published: May 06, 2024; 11:15:22 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-21475 |
Memory corruption when the payload received from firmware is not as per the expected protocol size. Published: May 06, 2024; 11:15:21 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2024-21474 |
Memory corruption when size of buffer from previous call is used without validation or re-initialization. Published: May 06, 2024; 11:15:21 AM -0400 |
V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2024-21471 |
Memory corruption when IOMMU unmap of a GPU buffer fails in Linux. Published: May 06, 2024; 11:15:21 AM -0400 |
V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2023-43531 |
Memory corruption while verifying the serialized header when the key pairs are generated. Published: May 06, 2024; 11:15:21 AM -0400 |
V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2023-43530 |
Memory corruption in HLOS while checking for the storage type. Published: May 06, 2024; 11:15:21 AM -0400 |
V3.1: 5.9 MEDIUM V2.0:(not available) |
CVE-2023-43529 |
Transient DOS while processing IKEv2 Informational request messages, when a malformed fragment packet is received. Published: May 06, 2024; 11:15:20 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-43528 |
Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size. Published: May 06, 2024; 11:15:20 AM -0400 |
V3.1: 6.1 MEDIUM V2.0:(not available) |
CVE-2023-43527 |
Information disclosure while parsing dts header atom in Video. Published: May 06, 2024; 11:15:20 AM -0400 |
V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2023-43526 |
Memory corruption while querying module parameters from Listen Sound model client in kernel from user space. Published: May 06, 2024; 11:15:20 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2023-43525 |
Memory corruption while copying the sound model data from user to kernel buffer during sound model register. Published: May 06, 2024; 11:15:20 AM -0400 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2023-43524 |
Memory corruption when the bandpass filter order received from AHAL is not within the expected range. Published: May 06, 2024; 11:15:20 AM -0400 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2023-43521 |
Memory corruption when multiple listeners are being registered with the same file descriptor. Published: May 06, 2024; 11:15:19 AM -0400 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2023-33119 |
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache. Published: May 06, 2024; 11:15:19 AM -0400 |
V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2024-4549 |
A denial of service vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior. When processing an 'ICS Restart!' message, CEBC.exe restarts the system. Published: May 06, 2024; 10:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-4548 |
An SQLi vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior when CEBC.exe processes a 'RecalculateHDMWYC' message, which is split into 4 fields using the '~' character as the separator. An unauthenticated remote attacker can perform SQLi via the fourth field. Published: May 06, 2024; 10:15:08 AM -0400 |
V3.x:(not available) V2.0:(not available) |