Show filters
47 Total Results
Displaying 21-30 of 47
Sort by:
Attacker Value
Unknown

CVE-2024-33049

Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame.
Attacker Value
Unknown

CVE-2024-23369

Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Memory corruption when invalid length is provided from HLOS for FRS/UDS request/response buffers.
Attacker Value
Unknown

CVE-2024-33057

Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location.
Attacker Value
Unknown

CVE-2024-33050

Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper.
Attacker Value
Unknown

CVE-2024-33045

Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Memory corruption when BTFM client sends new messages over Slimbus to ADSP.
Attacker Value
Unknown

CVE-2024-33028

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption as fence object may still be accessed in timeline destruct after isync fence is released.
Attacker Value
Unknown

CVE-2024-33023

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events.
Attacker Value
Unknown

CVE-2024-33021

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while processing IOCTL call to set metainfo.
Attacker Value
Unknown

CVE-2024-33018

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Transient DOS while parsing the received TID-to-link mapping element of the TID-to-link mapping action frame.
Attacker Value
Unknown

CVE-2024-33015

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report.