Vulnerabilities > Qualcomm > Immersive Home 216 Platform Firmware > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-10-07 | CVE-2024-33049 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame. | 7.5 |
2024-10-07 | CVE-2024-33073 | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. | 8.2 |
2024-08-05 | CVE-2024-33014 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing ESP IE from beacon/probe response frame. | 7.5 |
2024-08-05 | CVE-2024-33015 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report. | 7.5 |
2024-08-05 | CVE-2024-33019 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing the received TID-to-link mapping action frame. | 7.5 |
2024-08-05 | CVE-2024-33024 | Integer Overflow or Wraparound vulnerability in Qualcomm products Transient DOS while parsing the ML IE when a beacon with length field inside the common info of ML IE greater than the ML IE length. | 7.5 |
2024-08-05 | CVE-2024-33025 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. | 7.5 |
2024-07-01 | CVE-2024-21457 | Out-of-bounds Read vulnerability in Qualcomm products INformation disclosure while handling Multi-link IE in beacon frame. | 7.5 |
2024-07-01 | CVE-2024-21458 | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure while handling SA query action frame. | 7.5 |
2024-07-01 | CVE-2024-21482 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products Memory corruption during the secure boot process, when the `bootm` command is used, it bypasses the authentication of the kernel/rootfs image. | 7.8 |