Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon | QAM8255P | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-43538 | 9.3 CRITICAL | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in TZ Secure OS |
| CVE-2023-43556 | 9.3 CRITICAL | Buffer Copy Without Checking Size of Input in Hypervisor |
| CVE-2023-43551 | 9.1 CRITICAL | Improper Authentication in Multi-Mode Call Processor |
| CVE-2024-23360 | 8.4 HIGH | Improper Access Control in Graphics Windows |
| CVE-2023-43555 | 8.2 HIGH | Buffer Over-read in Video |
| CVE-2023-43542 | 7.8 HIGH | Buffer Copy Without Checking Size of Input in Trusted Execution Environment |
| CVE-2024-23363 | 7.5 HIGH | Buffer Over-read in WLAN Firmware |
| CVE-2023-43544 | 6.7 MEDIUM | Use After Free in Audio |
| CVE-2023-43545 | 6.7 MEDIUM | Integer Overflow or Wraparound in WLAN HOST |
| CVE-2023-43537 | 6.5 MEDIUM | Buffer Over-read in WLAN Host |
| CVE-2024-21478 | 6.2 MEDIUM | NULL Pointer Dereference in Graphics |
No comments yet