搜索结果
关于「qca0000_firmware」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2023-33097 | WLAN 固件中的缓冲区过度读取 (CVE-2023-33097) | 2023-12-05 | ||
AVD-2023-33098 | WLAN 固件中的缓冲区过度读取 (CVE-2023-33098) | 2023-12-05 | ||
AVD-2023-33026 | WLAN 固件中的缓冲区过度读取 (CVE-2023-33026) | 2023-05-17 | ||
AVD-2023-33027 | WLAN 固件中的缓冲区过度读取 (CVE-2023-33027) | 2023-05-17 | ||
AVD-2023-33028 | 不检查 WLAN 固件中输入大小的缓冲区复制 (CVE-2023-33028) | 2023-05-17 | ||
AVD-2023-33047 | WLAN 固件中的缓冲区过度读取 (CVE-2023-33047) | 2023-05-17 | ||
AVD-2023-33045 | 不检查 WLAN 固件中输入大小的缓冲区复制 (CVE-2023-33045) | 2023-05-17 | ||
AVD-2023-33048 | WLAN 固件中的缓冲区过度读取 (CVE-2023-33048) | 2023-05-17 | ||
AVD-2023-33056 | WLAN 固件中的 NULL 指针取消引用 (CVE-2023-33056) | 2023-05-17 | ||
AVD-2023-33061 | WLAN 固件中的缓冲区过度读取 (CVE-2023-33061) | 2023-05-17 | ||
AVD-2023-28565 | Qualcomm Chipsets 安全漏洞(CVE-2023-28565) | 2023-03-17 | ||
AVD-2023-24852 | 核心中的身份验证不正确 (CVE-2023-24852) | 2023-01-31 | ||
AVD-2022-33286 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-33238 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2023-21628 | Qualcomm Chipsets 安全漏洞(CVE-2023-21628) | 2022-12-07 | ||
AVD-2022-33237 | qualcomm aqt1000_firmware 跨界内存读 | 2022-11-15 | ||
AVD-2022-25749 | qualcomm apq8009_firmware 跨界内存读 | 2022-10-19 | ||
AVD-2022-25718 | 高通公司多款芯片远程代码执行漏洞(CVE-2022-25718) | 2022-10-19 | ||
AVD-2022-40512 | Qualcomm 芯片安全漏洞(CVE-2022-40512) | 2022-09-12 | ||
AVD-2020-11303 | qualcomm apq8009_firmware 将资源暴露给错误范围 | 2021-10-20 | ||
AVD-2021-30260 | Qualcomm 芯片安全漏洞 | 2021-09-17 | ||
AVD-2020-11235 | qualcomm apq8009_firmware 整数溢出或超界折返 | 2021-06-09 | ||
AVD-2020-11159 | qualcomm apq8009_firmware 跨界内存读 | 2021-06-09 | ||
AVD-2020-11269 | qualcomm apq8009_firmware 整数溢出或超界折返 | 2021-02-22 | ||
AVD-2020-11276 | qualcomm apq8009_firmware 跨界内存读 | 2021-02-22 | ||
AVD-2020-11119 | qualcomm apq8009_firmware 跨界内存读 | 2021-01-21 |