Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon | FastConnect 6200 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-23354 | 8.4 HIGH | Use After Free in Graphics Linux |
| CVE-2024-21474 | 8.4 HIGH | Stack-based Buffer Overflow in PMIC |
| CVE-2024-21471 | 8.4 HIGH | Use After Free in Graphics Linux |
| CVE-2023-43531 | 8.4 HIGH | Access of Uninitialized Pointer in SPS Applications |
| CVE-2023-33119 | 8.4 HIGH | Time-of-check Time-of-use (TOCTOU) Race Condition in Hypervisor |
| CVE-2024-21476 | 7.8 HIGH | Improper Input Validation in Secure Processor |
| CVE-2024-21475 | 7.8 HIGH | Use of Out-of-range Pointer Offset in Video |
| CVE-2024-21477 | 7.5 HIGH | Buffer Over-read in WLAN Firmware |
| CVE-2023-43529 | 7.5 HIGH | Reachable Assertion in Data Modem |
| CVE-2024-21480 | 7.3 HIGH | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio |
| CVE-2023-43527 | 6.8 MEDIUM | Buffer Over-read in Video |
| CVE-2023-43526 | 6.7 MEDIUM | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio |
| CVE-2023-43525 | 6.7 MEDIUM | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio |
| CVE-2023-43524 | 6.7 MEDIUM | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Audio |
| CVE-2023-43521 | 6.7 MEDIUM | Use After Free in HLOS |
| CVE-2023-43528 | 6.1 MEDIUM | Buffer Over-read in Audio |
| CVE-2023-43530 | 5.9 MEDIUM | Integer Overflow or Wraparound in HLOS |
No comments yet