Show filters
87 Total Results
Displaying 31-40 of 87
Sort by:
Attacker Value
Unknown

CVE-2023-28578

Disclosure Date: March 04, 2024 (last updated January 12, 2025)
Memory corruption in Core Services while executing the command for removing a single event listener.
Attacker Value
Unknown

CVE-2023-43536

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Transient DOS while parse fils IE with length equal to 1.
Attacker Value
Unknown

CVE-2023-43535

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Memory corruption when negative display IDs are sent as input while processing DISPLAYESCAPE event trigger.
Attacker Value
Unknown

CVE-2023-43533

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Transient DOS in WLAN Firmware when the length of received beacon is less than length of ieee802.11 beacon frame.
Attacker Value
Unknown

CVE-2023-43532

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Memory corruption while reading ACPI config through the user mode app.
Attacker Value
Unknown

CVE-2023-43522

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Transient DOS while key unwrapping process, when the given encrypted key is empty or NULL.
Attacker Value
Unknown

CVE-2023-33076

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Memory corruption in Core when updating rollback version for TA and OTA feature is enabled.
Attacker Value
Unknown

CVE-2023-33072

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Memory corruption in Core while processing control functions.
Attacker Value
Unknown

CVE-2023-33046

Disclosure Date: February 06, 2024 (last updated February 09, 2024)
Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation.
Attacker Value
Unknown

CVE-2023-43511

Disclosure Date: January 02, 2024 (last updated January 09, 2024)
Transient DOS while parsing IPv6 extension header when WLAN firmware receives an IPv6 packet that contains `IPPROTO_NONE` as the next header.