| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Information disclosure while decoding RTP packet received by UE from the network, when payload length mentioned is greater than the available buffer length. |
| Transient DOS while parsing the EPTM test control message to get the test pattern. |
| Information disclosure while decoding this RTP packet headers received by UE from the network when the padding bit is set. |
| Memory handling issue in editcap could cause denial of service via crafted capture file |
| PerfreeBlog v4.0.11 has an arbitrary file read vulnerability in the validThemeFilePath function |
| Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability |
| Transient DOS when processing the non-transmitted BSSID profile sub-elements present within the MBSSID Information Element (IE) of a beacon frame that is received from over-the-air (OTA). |
| Transient DOS when registration accept OTA is received with incorrect ciphering key data IE in Modem. |
| Information disclosure while decoding Tracking Area Update Accept or Attach Accept message received from network. |
| Transient DOS while processing power control requests with invalid antenna or stream values. |
| Transient DOS while handling command data during power control processing. |
| A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read. |
| A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read. |
| Transient DOS while handling beacon frames with invalid IE header length. |
| information disclosure while invoking calibration data from user space to update firmware size. |
| Information disclosure while running video usecase having rogue firmware. |
| Information disclosure when Video engine escape input data is less than expected minimum size. |
| Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally. |
| A buffer overread can occur in the CPC application when operating in full duplex SPI upon receiving an invalid packet over the SPI interface. |
| Securing externally available CAN wires can easily allow physical access to the CAN bus, allowing possible injection of specially formed CAN messages to control remote start functions of the vehicle. Testing completed on Tesla Model 3 vehicles with software version v11.1 (2023.20.9 ee6de92ddac5). This issue affects Model 3: With software versions from 2023.Xx before 2023.44. |