Search Results (Refine Search)
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-43549 |
Memory corruption while processing TPC target power table in FTM TPC. Published: March 04, 2024; 6:15:13 AM -0500 |
V4.0:(not available) V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2023-43548 |
Memory corruption while parsing qcp clip with invalid chunk data size. Published: March 04, 2024; 6:15:13 AM -0500 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-43547 |
Memory corruption while invoking IOCTLs calls in Automotive Multimedia. Published: March 04, 2024; 6:15:12 AM -0500 |
V4.0:(not available) V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2023-43546 |
Memory corruption while invoking HGSL IOCTL context create. Published: March 04, 2024; 6:15:12 AM -0500 |
V4.0:(not available) V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2023-43541 |
Memory corruption while invoking the SubmitCommands call on Gfx engine during the graphics render. Published: March 04, 2024; 6:15:12 AM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2023-43540 |
Memory corruption while processing the IOCTL FM HCI WRITE request. Published: March 04, 2024; 6:15:12 AM -0500 |
V4.0:(not available) V3.1: 8.4 HIGH V2.0:(not available) |
CVE-2023-43539 |
Transient DOS while processing an improperly formatted 802.11az Fine Time Measurement protocol frame. Published: March 04, 2024; 6:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33105 |
Transient DOS in WLAN Host and Firmware when large number of open authentication frames are sent with an invalid transaction sequence number. Published: March 04, 2024; 6:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33104 |
Transient DOS while processing PDU Release command with a parameter PDU ID out of range. Published: March 04, 2024; 6:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33103 |
Transient DOS while processing CAG info IE received from NW. Published: March 04, 2024; 6:15:11 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33096 |
Transient DOS while processing DL NAS Transport message, as specified in 3GPP 24.501 v16. Published: March 04, 2024; 6:15:10 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33095 |
Transient DOS while processing multiple payload container type with incorrect container length received in DL NAS transport OTA in NR. Published: March 04, 2024; 6:15:10 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33090 |
Transient DOS while processing channel information for speaker protection v2 module in ADSP. Published: March 04, 2024; 6:15:10 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-33086 |
Transient DOS while processing multiple IKEV2 Informational Request to device from IPSEC server with different identifiers. Published: March 04, 2024; 6:15:10 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33084 |
Transient DOS while processing IE fragments from server during DTLS handshake. Published: March 04, 2024; 6:15:10 AM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-33078 |
Information Disclosure while processing IOCTL request in FastRPC. Published: March 04, 2024; 6:15:09 AM -0500 |
V4.0:(not available) V3.1: 5.1 MEDIUM V2.0:(not available) |
CVE-2023-33066 |
Memory corruption in Audio while processing RT proxy port register driver. Published: March 04, 2024; 6:15:09 AM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2023-28582 |
Memory corruption in Data Modem while verifying hello-verify message during the DTLS handshake. Published: March 04, 2024; 6:15:09 AM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-28578 |
Memory corruption in Core Services while executing the command for removing a single event listener. Published: March 04, 2024; 6:15:08 AM -0500 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0:(not available) |
CVE-2023-6143 |
Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to exploit a software race condition to perform improper memory processing operations. If the system’s memory is carefully prepared by the user and the system is under heavy load, then this in turn cause a use-after-free.This issue affects Midgard GPU Kernel Driver: from r13p0 through r32p0; Bifrost GPU Kernel Driver: from r1p0 through r18p0; Valhall GPU Kernel Driver: from r37p0 through r46p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r46p0. Published: March 04, 2024; 5:15:08 AM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |