9.1
CVE-2023-43551 - Improper Authentication in Multi-Mode Call Processor
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
6.7
CVE-2023-43545 - Integer Overflow or Wraparound in WLAN HOST
Memory corruption when more scan frequency list or channels are sent from the user space.
6.7
CVE-2023-43544 - Use After Free in Audio
Memory corruption when IPC callback handle is used after it has been released during register callback by another thread.
6.7
CVE-2023-43543 - Use After Free in Audio
Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object.
7.8
CVE-2023-43542 - Buffer Copy Without Checking Size of Input in Trusted Execution Environment
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.
9.3
CVE-2023-43538 - Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in TZ Secure OS
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
6.5
CVE-2023-43537 - Buffer Over-read in WLAN Host
Information disclosure while handling T2LM Action Frame in WLAN Host.
4.4
CVE-2024-35633 - WordPress Blocksy Companion plugin <= 2.0.42 - Server Side Request Forgery (SSRF) vulnerability
Server-Side Request Forgery (SSRF) vulnerability in Creative Themes Blocksy Companion blocksy-companion.This issue affects Blocksy Companion: from n/a through <= 2.0.42.
4.4
CVE-2024-35635 - WordPress Ninja Tables plugin <= 5.0.9 - Server Side Request Forgery (SSRF) vulnerability
Server-Side Request Forgery (SSRF) vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.9.
5.6
CVE-2024-23665 -
Multiple improper authorization vulnerabilities [CWE-285] in FortiWeb version 7.4.2 and below, version 7.2.7 and below, version 7.0.10 and below, version 6.4.3 and below, version 6.3.23 and below may allow an authenticated attacker to perform unauthorized ADOM operations via crafted requests.