| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22. |
| An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, callback function SmmCreateVariableLockList () calls CreateVariableLockListInSmm (). In CreateVariableLockListInSmm (), it uses StrSize () to get variable name size and it could lead to a buffer over-read. |
| An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, VariableServicesSetVariable () can be called by gRT_>SetVariable () or the SmmSetSensitiveVariable () or SmmInternalSetVariable () from SMM. In VariableServicesSetVariable (), it uses StrSize () to get variable name size, uses StrLen () to get variable name length and uses StrCmp () to compare strings. These actions may cause a buffer over-read. |
| An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, SmmUpdateVariablePropertySmi () is a SMM callback function and it uses StrCmp () to compare variable names. This action may cause a buffer over-read. |
| A vulnerability was found in INSTAR 2K+ and 4K 3.11.1 Build 1124. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper physical access control. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. |
| Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. |
| Memory Corruption in Data Modem while processing DMA buffer release event about CFR data. |
| Information Disclosure in Qualcomm IPC while reading values from shared memory in VM. |
| Transient DOS while parsing a vender specific IE (Information Element) of reassociation response management frame. |
| Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network. |
| Information disclosure in WLAN HOST while processing the WLAN scan descriptor list during roaming scan. |
| Transient DOS while parsing probe response and assoc response frame. |
| Information disclosure in WLAN HAL while handling the WMI state info command. |
| Memory Corruption in WLAN HOST while fetching TX status information. |
| Memory corruption during management frame processing due to mismatch in T2LM info element. |
| Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location. |
| Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value. |
| Transient DOS while parsing the received TID-to-link mapping element of beacon/probe response frame. |
| Information disclosure while parsing dts header atom in Video. |
| Memory corruption while processing buffer initialization, when trusted report for certain report types are generated. |