Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon | AR8031 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2022-25729 | 9.8 CRITICAL | Improper Input Validation in MODEM |
| CVE-2022-40514 | 9.8 CRITICAL | Buffer copy without checking size of input in WLAN Firmware |
| CVE-2022-33279 | 9.8 CRITICAL | Stack based buffer overflow in WLAN |
| CVE-2022-33232 | 9.3 CRITICAL | Buffer copy without checking size of input in Hypervisor |
| CVE-2022-33243 | 8.4 HIGH | Improper access control in Qualcomm IPC |
| CVE-2022-33277 | 8.4 HIGH | Buffer copy without checking size of input in modem |
| CVE-2022-25732 | 8.2 HIGH | Buffer Over-read in MODEM |
| CVE-2022-33271 | 8.2 HIGH | Buffer over-read in WLAN |
| CVE-2022-25738 | 8.2 HIGH | Buffer Over-read in MODEM |
| CVE-2022-33229 | 8.2 HIGH | Buffer over-read in Modem |
| CVE-2022-33248 | 7.8 HIGH | Integer overflow to buffer overflow in User Identity Module |
| CVE-2022-33233 | 7.8 HIGH | Configuration weakness in modem |
| CVE-2022-40513 | 7.5 HIGH | Uncontrolled resource consumption in WLAN Firmware. |
| CVE-2022-33306 | 7.5 HIGH | Buffer over-read in WLAN |
| CVE-2022-25733 | 7.5 HIGH | Null Pointer Dereference in MODEM |
| CVE-2022-25734 | 7.5 HIGH | Loop with Unreachable Exit Condition in MODEM |
| CVE-2022-25735 | 7.5 HIGH | Null Pointer Dereference in MODEM |
| CVE-2022-40512 | 7.5 HIGH | Buffer over-read in WLAN Firmware. |
| CVE-2022-40502 | 7.5 HIGH | Improper input validation in WLAN Host |
| CVE-2022-34146 | 7.5 HIGH | Improper input validation in WLAN Host |
Showing top 20 of 27 CVEs. View all on vendor page → →
No comments yet