Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon | AR8035 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-43531 | 8.4 HIGH | Access of Uninitialized Pointer in SPS Applications |
| CVE-2023-33119 | 8.4 HIGH | Time-of-check Time-of-use (TOCTOU) Race Condition in Hypervisor |
| CVE-2024-23354 | 8.4 HIGH | Use After Free in Graphics Linux |
| CVE-2024-21471 | 8.4 HIGH | Use After Free in Graphics Linux |
| CVE-2024-21474 | 8.4 HIGH | Stack-based Buffer Overflow in PMIC |
| CVE-2024-23351 | 8.4 HIGH | Improper Access Control in Graphics Linux |
| CVE-2024-21475 | 7.8 HIGH | Use of Out-of-range Pointer Offset in Video |
| CVE-2024-21476 | 7.8 HIGH | Improper Input Validation in Secure Processor |
| CVE-2024-21477 | 7.5 HIGH | Buffer Over-read in WLAN Firmware |
| CVE-2023-43529 | 7.5 HIGH | Reachable Assertion in Data Modem |
| CVE-2024-21480 | 7.3 HIGH | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio |
| CVE-2023-43527 | 6.8 MEDIUM | Buffer Over-read in Video |
| CVE-2023-43526 | 6.7 MEDIUM | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio |
| CVE-2023-43525 | 6.7 MEDIUM | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio |
| CVE-2023-43521 | 6.7 MEDIUM | Use After Free in HLOS |
| CVE-2023-43528 | 6.1 MEDIUM | Buffer Over-read in Audio |
| CVE-2023-43530 | 5.9 MEDIUM | Integer Overflow or Wraparound in HLOS |
No comments yet