Search Results (Refine Search)
- Keyword (text search): cpe:2.3:h:qualcomm:immersive_home_214_platform:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-33063 |
Memory corruption in DSP Services during a remote call from HLOS to DSP. Published: December 04, 2023; 10:15:12 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-33053 |
Memory corruption in Kernel while parsing metadata. Published: December 04, 2023; 10:15:11 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-33041 |
Under certain scenarios the WLAN Firmware will reach an assertion due to state confusion while looking up peer ids. Published: December 04, 2023; 10:15:11 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-28550 |
Memory corruption in MPP performance while accessing DSM watermark using external memory address. Published: December 04, 2023; 10:15:08 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-33061 |
Transient DOS in WLAN Firmware while parsing WLAN beacon or probe-response frame. Published: November 07, 2023; 1:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33056 |
Transient DOS in WLAN Firmware when firmware receives beacon including T2LM IE. Published: November 07, 2023; 1:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33048 |
Transient DOS in WLAN Firmware while parsing t2lm buffers. Published: November 07, 2023; 1:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33047 |
Transient DOS in WLAN Firmware while parsing no-inherit IES. Published: November 07, 2023; 1:15:10 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33045 |
Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute. Published: November 07, 2023; 1:15:10 AM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-28569 |
Information disclosure in WLAN HAL while handling command through WMI interfaces. Published: November 07, 2023; 1:15:10 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-28563 |
Information disclosure in IOE Firmware while handling WMI command. Published: November 07, 2023; 1:15:09 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-28554 |
Information Disclosure in Qualcomm IPC while reading values from shared memory in VM. Published: November 07, 2023; 1:15:09 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-28553 |
Information Disclosure in WLAN Host when processing WMI event command. Published: November 07, 2023; 1:15:08 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-33028 |
Memory corruption in WLAN Firmware while doing a memory copy of pmk cache. Published: October 03, 2023; 2:15:27 AM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-33027 |
Transient DOS in WLAN Firmware while parsing rsn ies. Published: October 03, 2023; 2:15:26 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33026 |
Transient DOS in WLAN Firmware while parsing a NAN management frame. Published: October 03, 2023; 2:15:26 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-28539 |
Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command. Published: October 03, 2023; 2:15:24 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-24847 |
Transient DOS in Modem while allocating DSM items. Published: October 03, 2023; 2:15:22 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-28560 |
Memory corruption in WLAN HAL while processing devIndex from untrusted WMI payload. Published: September 05, 2023; 3:15:13 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28559 |
Memory corruption in WLAN FW while processing command parameters from untrusted WMI payload. Published: September 05, 2023; 3:15:13 AM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |