Search Results (Refine Search)
- Keyword (text search): cpe:2.3:h:qualcomm:ipq5332:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-33081 |
Transient DOS while converting TWT (Target Wake Time) frame parameters in the OTA broadcast. Published: December 04, 2023; 10:15:12 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33080 |
Transient DOS while parsing a vender specific IE (Information Element) of reassociation response management frame. Published: December 04, 2023; 10:15:12 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33053 |
Memory corruption in Kernel while parsing metadata. Published: December 04, 2023; 10:15:11 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-33041 |
Under certain scenarios the WLAN Firmware will reach an assertion due to state confusion while looking up peer ids. Published: December 04, 2023; 10:15:11 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-28586 |
Information disclosure when the trusted application metadata symbol addresses are accessed while loading an ELF in TEE. Published: December 04, 2023; 10:15:09 PM -0500 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-28585 |
Memory corruption while loading an ELF segment in TEE Kernel. Published: December 04, 2023; 10:15:09 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-33061 |
Transient DOS in WLAN Firmware while parsing WLAN beacon or probe-response frame. Published: November 07, 2023; 1:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33056 |
Transient DOS in WLAN Firmware when firmware receives beacon including T2LM IE. Published: November 07, 2023; 1:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33048 |
Transient DOS in WLAN Firmware while parsing t2lm buffers. Published: November 07, 2023; 1:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33047 |
Transient DOS in WLAN Firmware while parsing no-inherit IES. Published: November 07, 2023; 1:15:10 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33045 |
Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute. Published: November 07, 2023; 1:15:10 AM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-24852 |
Memory Corruption in Core due to secure memory access by user while loading modem image. Published: November 07, 2023; 1:15:08 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-33028 |
Memory corruption in WLAN Firmware while doing a memory copy of pmk cache. Published: October 03, 2023; 2:15:27 AM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-33027 |
Transient DOS in WLAN Firmware while parsing rsn ies. Published: October 03, 2023; 2:15:26 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33026 |
Transient DOS in WLAN Firmware while parsing a NAN management frame. Published: October 03, 2023; 2:15:26 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |