Show filters
334 Total Results
Displaying 101-110 of 334
Sort by:
Attacker Value
Unknown

CVE-2024-21456

Disclosure Date: July 01, 2024 (last updated August 22, 2024)
Information Disclosure while parsing beacon frame in STA.
Attacker Value
Unknown

CVE-2024-23363

Disclosure Date: June 03, 2024 (last updated January 13, 2025)
Transient DOS while processing an improperly formatted Fine Time Measurement (FTM) management frame.
0
Attacker Value
Unknown

CVE-2023-43556

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption in Hypervisor when platform information mentioned is not aligned.
Attacker Value
Unknown

CVE-2023-43551

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Attacker Value
Unknown

CVE-2023-43544

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption when IPC callback handle is used after it has been released during register callback by another thread.
Attacker Value
Unknown

CVE-2023-43543

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object.
Attacker Value
Unknown

CVE-2023-43542

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.
0
Attacker Value
Unknown

CVE-2023-43538

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
Attacker Value
Unknown

CVE-2024-23354

Disclosure Date: May 06, 2024 (last updated January 16, 2025)
Memory corruption when the IOCTL call is interrupted by a signal.
Attacker Value
Unknown

CVE-2024-23351

Disclosure Date: May 06, 2024 (last updated January 16, 2025)
Memory corruption as GPU registers beyond the last protected range can be accessed through LPAC submissions.