Show filters
47 Total Results
Displaying 21-30 of 47
Sort by:
Attacker Value
Unknown
CVE-2024-33049
Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame.
0
Attacker Value
Unknown
CVE-2024-23369
Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Memory corruption when invalid length is provided from HLOS for FRS/UDS request/response buffers.
0
Attacker Value
Unknown
CVE-2024-33057
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location.
0
Attacker Value
Unknown
CVE-2024-33050
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper.
0
Attacker Value
Unknown
CVE-2024-33045
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Memory corruption when BTFM client sends new messages over Slimbus to ADSP.
0
Attacker Value
Unknown
CVE-2024-33028
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption as fence object may still be accessed in timeline destruct after isync fence is released.
0
Attacker Value
Unknown
CVE-2024-33023
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events.
0
Attacker Value
Unknown
CVE-2024-33021
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while processing IOCTL call to set metainfo.
0
Attacker Value
Unknown
CVE-2024-33018
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Transient DOS while parsing the received TID-to-link mapping element of the TID-to-link mapping action frame.
0
Attacker Value
Unknown
CVE-2024-33015
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report.
0