U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 250,171 matching records.
Displaying matches 23,741 through 23,760.
Vuln ID Summary CVSS Severity
CVE-2023-43549

Memory corruption while processing TPC target power table in FTM TPC.

Published: March 04, 2024; 6:15:13 AM -0500
V4.0:(not available)
V3.1: 8.4 HIGH
V2.0:(not available)
CVE-2023-43548

Memory corruption while parsing qcp clip with invalid chunk data size.

Published: March 04, 2024; 6:15:13 AM -0500
V4.0:(not available)
V3.1: 7.3 HIGH
V2.0:(not available)
CVE-2023-43547

Memory corruption while invoking IOCTLs calls in Automotive Multimedia.

Published: March 04, 2024; 6:15:12 AM -0500
V4.0:(not available)
V3.1: 8.4 HIGH
V2.0:(not available)
CVE-2023-43546

Memory corruption while invoking HGSL IOCTL context create.

Published: March 04, 2024; 6:15:12 AM -0500
V4.0:(not available)
V3.1: 8.4 HIGH
V2.0:(not available)
CVE-2023-43541

Memory corruption while invoking the SubmitCommands call on Gfx engine during the graphics render.

Published: March 04, 2024; 6:15:12 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2023-43540

Memory corruption while processing the IOCTL FM HCI WRITE request.

Published: March 04, 2024; 6:15:12 AM -0500
V4.0:(not available)
V3.1: 8.4 HIGH
V2.0:(not available)
CVE-2023-43539

Transient DOS while processing an improperly formatted 802.11az Fine Time Measurement protocol frame.

Published: March 04, 2024; 6:15:11 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33105

Transient DOS in WLAN Host and Firmware when large number of open authentication frames are sent with an invalid transaction sequence number.

Published: March 04, 2024; 6:15:11 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33104

Transient DOS while processing PDU Release command with a parameter PDU ID out of range.

Published: March 04, 2024; 6:15:11 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33103

Transient DOS while processing CAG info IE received from NW.

Published: March 04, 2024; 6:15:11 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33096

Transient DOS while processing DL NAS Transport message, as specified in 3GPP 24.501 v16.

Published: March 04, 2024; 6:15:10 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33095

Transient DOS while processing multiple payload container type with incorrect container length received in DL NAS transport OTA in NR.

Published: March 04, 2024; 6:15:10 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33090

Transient DOS while processing channel information for speaker protection v2 module in ADSP.

Published: March 04, 2024; 6:15:10 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-33086

Transient DOS while processing multiple IKEV2 Informational Request to device from IPSEC server with different identifiers.

Published: March 04, 2024; 6:15:10 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33084

Transient DOS while processing IE fragments from server during DTLS handshake.

Published: March 04, 2024; 6:15:10 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33078

Information Disclosure while processing IOCTL request in FastRPC.

Published: March 04, 2024; 6:15:09 AM -0500
V4.0:(not available)
V3.1: 5.1 MEDIUM
V2.0:(not available)
CVE-2023-33066

Memory corruption in Audio while processing RT proxy port register driver.

Published: March 04, 2024; 6:15:09 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2023-28582

Memory corruption in Data Modem while verifying hello-verify message during the DTLS handshake.

Published: March 04, 2024; 6:15:09 AM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-28578

Memory corruption in Core Services while executing the command for removing a single event listener.

Published: March 04, 2024; 6:15:08 AM -0500
V4.0:(not available)
V3.1: 9.3 CRITICAL
V2.0:(not available)
CVE-2023-6143

Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to exploit a software race condition to perform improper memory processing operations. If the system’s memory is carefully prepared by the user and the system is under heavy load, then this in turn cause a use-after-free.This issue affects Midgard GPU Kernel Driver: from r13p0 through r32p0; Bifrost GPU Kernel Driver: from r1p0 through r18p0; Valhall GPU Kernel Driver: from r37p0 through r46p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r46p0.

Published: March 04, 2024; 5:15:08 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)