Vulnerabilities > Qualcomm > Qca6574 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-02-06 | CVE-2023-33072 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption in Core while processing control functions. | 7.8 |
2024-02-06 | CVE-2023-33076 | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption in Core when updating rollback version for TA and OTA feature is enabled. | 7.8 |
2024-02-06 | CVE-2023-43513 | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption while processing the event ring, the context read pointer is untrusted to HLOS and when it is passed with arbitrary values, may point to address in the middle of ring element. | 7.8 |
2024-02-06 | CVE-2023-43518 | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption in video while parsing invalid mp2 clip. | 9.8 |
2024-02-06 | CVE-2023-43519 | Classic Buffer Overflow vulnerability in Qualcomm products Memory corruption in video while parsing the Videoinfo, when the size of atom is greater than the videoinfo size. | 9.8 |
2024-02-06 | CVE-2023-43520 | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption when AP includes TID to link mapping IE in the beacons and STA is parsing the beacon TID to link mapping IE. | 9.8 |
2024-02-06 | CVE-2023-43522 | NULL Pointer Dereference vulnerability in Qualcomm products Transient DOS while key unwrapping process, when the given encrypted key is empty or NULL. | 7.5 |
2024-02-06 | CVE-2023-43523 | Reachable Assertion vulnerability in Qualcomm products Transient DOS while processing 11AZ RTT management action frame received through OTA. | 7.5 |
2024-02-06 | CVE-2023-43533 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS in WLAN Firmware when the length of received beacon is less than length of ieee802.11 beacon frame. | 7.5 |
2024-02-06 | CVE-2023-43534 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products Memory corruption while validating the TID to Link Mapping action request frame, when a station connects to an access point. | 9.8 |