Show filters
60 Total Results
Displaying 51-60 of 60
Sort by:
Attacker Value
Unknown
CVE-2023-21628
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory corruption in WLAN HAL while processing WMI-UTF command or FTM TLV1 command.
0
Attacker Value
Unknown
CVE-2022-40529
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory corruption due to improper access control in kernel while processing a mapping request from root process.
0
Attacker Value
Unknown
CVE-2022-40523
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Information disclosure in Kernel due to indirect branch misprediction.
0
Attacker Value
Unknown
CVE-2022-40521
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Transient DOS due to improper authorization in Modem
0
Attacker Value
Unknown
CVE-2022-40507
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory corruption due to double free in Core while mapping HLOS address to the list.
0
Attacker Value
Unknown
CVE-2022-33307
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory Corruption due to double free in automotive when a bad HLOS address for one of the lists to be mapped is passed.
0
Attacker Value
Unknown
CVE-2022-33264
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
Memory corruption in modem due to stack based buffer overflow while parsing OTASP Key Generation Request Message.
0
Attacker Value
Unknown
CVE-2022-22076
Disclosure Date: June 06, 2023 (last updated February 25, 2025)
information disclosure due to cryptographic issue in Core during RPMB read request.
0
Attacker Value
Unknown
CVE-2020-7915
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
An issue was discovered on Eaton 5P 850 devices. The Ubicacion SAI field allows XSS attacks by an administrator.
0
Attacker Value
Unknown
CVE-2012-1239
Disclosure Date: April 06, 2012 (last updated October 04, 2023)
The TopAccess web-based management interface on TOSHIBA TEC e-Studio multi-function peripheral (MFP) devices with firmware 30x through 302, 35x through 354, and 4xx through 421 allows remote attackers to bypass authentication and obtain administrative privileges via unspecified vectors.
0