| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Transient DOS while parse fils IE with length equal to 1. |
| Information disclosure while handling T2LM Action Frame in WLAN Host. |
| Information disclosure in WLAN HAL while handling command through WMI interfaces. |
| Information disclosure in Video while parsing mp2 clip with invalid section length. |
| Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. |
| Memory corruption when the captureRead QDCM command is invoked from user-space. |
| Transient DOS during hypervisor virtual I/O operation in a virtual machine. |
| Memory corruption during management frame processing due to mismatch in T2LM info element. |
| Information disclosure in Audio while accessing AVCS services from ADSP payload. |
| Transient DOS in WLAN Firmware while parsing a NAN management frame. |
| Transient DOS in WLAN Firmware while parsing rsn ies. |
| Transient DOS in WLAN Firmware while parsing no-inherit IES. |
| Transient DOS while parsing a vender specific IE (Information Element) of reassociation response management frame. |
| Transient DOS in WLAN Firmware while parsing a BTM request. |
| Transient DOS in Audio when invoking callback function of ASM driver. |
| A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service. |
| The openssl crate before 0.10.55 for Rust allows an out-of-bounds read via an empty string to X509VerifyParamRef::set_host. |
| Buffer Over-read vulnerability in ABB AC500 V2.This issue affects AC500 V2: through 2.5.2. |
| ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow
an attacker with privileged logical access to the host or physical access to server internals to modify or disable Intel Boot Guard firmware integrity, SPS security, and other SPS configuration setting. The server’s NIST SP
800-193-compliant Platform Firmware Resiliency (PFR) security subsystem
significantly mitigates this issue. |
| A vulnerability was found in i-Drive i11 and i12 up to 20250227. It has been rated as critical. Affected by this issue is some unknown functionality of the component Device Setting Handler. The manipulation leads to improper access control for register interface. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life. |