Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon | 315 5G IoT Modem | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-22388 | 9.8 CRITICAL | Use of Out-of-range Pointer Offset in Multi-mode Call Processor |
| CVE-2023-33045 | 9.8 CRITICAL | Buffer Copy Without Checking Size of Input in WLAN Firmware |
| CVE-2023-21671 | 9.3 CRITICAL | Improper Input Validation in Core |
| CVE-2023-28574 | 9.0 CRITICAL | Improper Input Validation in Core |
| CVE-2023-33074 | 8.4 HIGH | Use After Free in Audio |
| CVE-2023-24852 | 8.4 HIGH | Improper Authentication in Core |
| CVE-2023-28545 | 8.2 HIGH | Improper Restriction of Operations within the Bounds of a Memory Buffer in TZ Secure OS |
| CVE-2023-33031 | 7.8 HIGH | Buffer Copy Without Checking Size of Input in Automotive Audio |
| CVE-2023-33059 | 7.8 HIGH | Buffer Copy Without Checking Size of Input in Audio |
| CVE-2023-33055 | 7.8 HIGH | Buffer Copy Without Checking Size of Input in Audio |
| CVE-2023-33047 | 7.5 HIGH | Buffer Over-read in WLAN Firmware |
| CVE-2023-33048 | 7.5 HIGH | Buffer over-read in WLAN Firmware |
| CVE-2023-33056 | 7.5 HIGH | NULL Pointer dereference in WLAN Firmware |
| CVE-2023-33061 | 7.5 HIGH | Buffer Over-read in WLAN Firmware |
| CVE-2023-28570 | 6.7 MEDIUM | Buffer Copy without Checking Size of Input in Audio |
| CVE-2023-28572 | 6.6 MEDIUM | Buffer Over-read in WLAN HOST |
| CVE-2023-28553 | 6.1 MEDIUM | Buffer Over-read in WLAN Host |
| CVE-2023-28554 | 6.1 MEDIUM | Buffer Over-read in Qualcomm IPC |
| CVE-2023-28569 | 6.1 MEDIUM | Buffer Over-read in WLAN HAL |
| CVE-2023-28568 | 6.1 MEDIUM | Buffer Over-read in WLAN HAL |
Showing top 20 of 23 CVEs. View all on vendor page → →
No comments yet