Show filters
858 Total Results
Displaying 131-140 of 858
Sort by:
Attacker Value
Unknown

CVE-2023-43556

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption in Hypervisor when platform information mentioned is not aligned.
Attacker Value
Unknown

CVE-2023-43555

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Information disclosure in Video while parsing mp2 clip with invalid section length.
Attacker Value
Unknown

CVE-2023-43551

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Attacker Value
Unknown

CVE-2023-43544

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption when IPC callback handle is used after it has been released during register callback by another thread.
Attacker Value
Unknown

CVE-2023-43543

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object.
Attacker Value
Unknown

CVE-2023-43542

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.
0
Attacker Value
Unknown

CVE-2023-43538

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
Attacker Value
Unknown

CVE-2023-43537

Disclosure Date: June 03, 2024 (last updated January 28, 2025)
Information disclosure while handling T2LM Action Frame in WLAN Host.
Attacker Value
Unknown

CVE-2024-23354

Disclosure Date: May 06, 2024 (last updated January 16, 2025)
Memory corruption when the IOCTL call is interrupted by a signal.
Attacker Value
Unknown

CVE-2024-23351

Disclosure Date: May 06, 2024 (last updated January 16, 2025)
Memory corruption as GPU registers beyond the last protected range can be accessed through LPAC submissions.