| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Transient DOS in WLAN firmware while parsing MLO (multi-link operation). |
| Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame. |
| Memory corruption in WLAN HOST while processing the WLAN scan descriptor list. |
| Information disclosure in WLAN HAL when reception status handler is called. |
| Transient DOS in Audio while remapping channel buffer in media codec decoding. |
| Information Disclosure in WLAN Host when processing WMI event command. |
| An access violation vulnerability exists in the eventcore functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to denial of service. An attacker can send a network request to trigger this vulnerability. |
| Information Disclosure in WLAN HOST while sending DPP action frame to peer with an invalid source address. |
| Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard. |
| Transient DOS while parsing WLAN beacon or probe-response frame. |
| Transient DOS in WLAN Firmware while parsing FT Information Elements. |
| Transient DOS in WLAN Firmware while processing frames with missing header fields. |
| Transient DOS in WLAN Firmware while processing the received beacon or probe response frame. |
| Information disclosure in Network Services due to buffer over-read while the device receives DNS response. |
| A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition. |
|
A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.
|
|
A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.
|
| Transient DOS due to buffer over-read in WLAN while sending a packet to device. |
| Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service. |
| Transient DOS in WLAN Firmware due to buffer over-read while processing probe response or beacon. |