Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon | CSRA6620 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-33028 | 9.8 CRITICAL | Buffer Copy without Checking Size of Input in WLAN Firmware |
| CVE-2023-24855 | 9.8 CRITICAL | Use of Out-of-range Pointer Offset in Modem |
| CVE-2023-28540 | 9.1 CRITICAL | Improper Authentication in Data Modem |
| CVE-2023-21673 | 8.7 HIGH | Improper Access Control in Kernel |
| CVE-2023-24853 | 8.4 HIGH | Improper Input Validation in HLOS |
| CVE-2023-24844 | 8.4 HIGH | Improper Access Control in Core |
| CVE-2023-33039 | 8.4 HIGH | Use After Free in Automotive Display |
| CVE-2023-33029 | 8.4 HIGH | Use After Free in DSP Service |
| CVE-2023-24849 | 8.2 HIGH | Buffer Over-read in Data Modem |
| CVE-2023-24848 | 8.2 HIGH | Buffer Over-read in Data Modem |
| CVE-2023-22385 | 8.2 HIGH | Buffer Over-read in Data Modem |
| CVE-2023-24850 | 7.8 HIGH | Improper Validation of Array Index in HLOS |
| CVE-2023-33035 | 7.8 HIGH | Buffer Copy Without Checking Size of Input in Audio |
| CVE-2023-33026 | 7.5 HIGH | Buffer over-read in WLAN Firmware |
| CVE-2023-33027 | 7.5 HIGH | Buffer Over-read in WLAN Firmware |
| CVE-2023-24847 | 7.5 HIGH | NULL pointer Dereference in Modem |
| CVE-2023-24843 | 7.5 HIGH | Reachable Assertion in Modem |
| CVE-2023-22382 | 7.4 HIGH | Improper Input Validation in Automotive |
| CVE-2023-22384 | 6.7 MEDIUM | Buffer Copy Without Checking Size of Input in VR Service |
| CVE-2023-28539 | 6.6 MEDIUM | Buffer Copy Without Checking Size of Input in WLAN Host |
Showing top 20 of 22 CVEs. View all on vendor page → →
No comments yet