搜索结果
关于「ipq4028_firmware」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2023-28564 | Qualcomm Chipsets 安全漏洞(CVE-2023-28564) | 2023-03-17 | ||
AVD-2023-28565 | Qualcomm Chipsets 安全漏洞(CVE-2023-28565) | 2023-03-17 | ||
AVD-2023-28567 | Qualcomm Chipsets 安全漏洞(CVE-2023-28567) | 2023-03-17 | ||
AVD-2023-28569 | WLAN HAL 中的缓冲区过度读取 (CVE-2023-28569) | 2023-03-17 | ||
AVD-2022-25722 | 释放后使用 | 2023-01-09 | ||
AVD-2022-33285 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-33286 | 跨界内存读 | 2023-01-09 | ||
AVD-2023-22387 | 在 Qualcomm IPC 中使用超出范围的指针偏移量 (CVE-2023-22387) | 2022-12-21 | ||
AVD-2022-25677 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-33235 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-33238 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2023-21628 | Qualcomm Chipsets 安全漏洞(CVE-2023-21628) | 2022-12-07 | ||
AVD-2022-25667 | qualcomm ar9380_firmware 认证机制不恰当 | 2022-11-15 | ||
AVD-2022-33237 | qualcomm aqt1000_firmware 跨界内存读 | 2022-11-15 | ||
AVD-2022-25666 | qualcomm apq8096au_firmware 释放后使用 | 2022-10-19 | ||
AVD-2022-25736 | qualcomm aqt1000_firmware 跨界内存读 | 2022-10-19 | ||
AVD-2022-25748 | qualcomm apq8009_firmware 整数溢出或超界折返 | 2022-10-19 | ||
AVD-2022-25749 | qualcomm apq8009_firmware 跨界内存读 | 2022-10-19 | ||
AVD-2022-40512 | Qualcomm 芯片安全漏洞(CVE-2022-40512) | 2022-09-12 | ||
AVD-2022-40531 | Google Android 安全漏洞 | 2022-09-12 | ||
AVD-2022-40532 | Qualcomm Chipsets 安全漏洞(CVE-2022-40532) | 2022-09-12 | ||
AVD-2021-35071 | qualcomm aqt1000_firmware 跨界内存读 | 2022-06-14 | ||
AVD-2022-33243 | Qualcomm IPC 安全漏洞(CVE-2022-33243) | 2022-06-14 | ||
AVD-2022-33275 | Qualcomm Chipsets 安全漏洞(CVE-2022-33275) | 2022-06-14 | ||
AVD-2022-33277 | Qualcomm 芯片安全漏洞(CVE-2022-33277) | 2022-06-14 | ||
AVD-2022-33279 | Qualcomm 芯片安全漏洞(CVE-2022-33279) | 2022-06-14 | ||
AVD-2021-35088 | Qualcomm多款产品越界读取漏洞(CVE-2021-35088) | 2022-04-01 | ||
AVD-2021-35103 | Qualcomm多款产品越界写入漏洞(CVE-2021-35103) | 2022-04-01 | ||
AVD-2022-25655 | Google Android 安全漏洞 | 2022-02-22 | ||
AVD-2021-30324 | qualcomm apq8096au_firmware 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) | 2022-02-11 |