Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Qualcomm, Inc. | Snapdragon | 315 5G IoT Modem | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-23365 | 8.4 HIGH | Use After Free in SCE-Mink |
| CVE-2024-33060 | 8.4 HIGH | Use After Free in DSP Service |
| CVE-2024-33035 | 8.4 HIGH | Integer Overflow or Wraparound in Display |
| CVE-2024-33045 | 8.4 HIGH | Return of Stack Variable Address in Buses |
| CVE-2024-33047 | 8.4 HIGH | Buffer Over-read in Display |
| CVE-2024-38401 | 7.8 HIGH | Use After Free in Qualcomm IPC |
| CVE-2024-33042 | 7.8 HIGH | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in FM Host |
| CVE-2024-33038 | 7.8 HIGH | Untrusted Pointer Dereference in Computer Vision |
| CVE-2024-33052 | 7.8 HIGH | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in FM Host |
| CVE-2024-33054 | 7.8 HIGH | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Computer Vision |
| CVE-2024-38402 | 7.8 HIGH | Use After Free in DSP Services |
| CVE-2024-33048 | 7.5 HIGH | Buffer Over-read in WLAN Host |
| CVE-2024-33050 | 7.5 HIGH | Buffer Over-read in WLAN Host Communication |
| CVE-2024-33051 | 7.5 HIGH | Buffer Over-read in WLAN Firmware |
| CVE-2024-33057 | 7.5 HIGH | Buffer Over-read in WLAN Host Communication |
| CVE-2024-23364 | 7.5 HIGH | Buffer Over-read in WLAN Firmware |
| CVE-2024-23358 | 7.5 HIGH | Buffer Over-read in Multi Mode Call Processor |
| CVE-2024-23362 | 7.1 HIGH | Improper Input Validation in Trusted Execution Environment |
| CVE-2024-33016 | 6.8 MEDIUM | Improper Restriction of Operations within the Bounds of a Memory Buffer in Storage |
| CVE-2024-33043 | 5.5 MEDIUM | Buffer Over-read in FM Host |
No comments yet