搜索结果
关于「sd662_firmware」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2023-24852 | 核心中的身份验证不正确 (CVE-2023-24852) | 2023-01-31 | ||
AVD-2022-33284 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-40517 | 跨界内存写 | 2023-01-09 | ||
AVD-2022-33285 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-40516 | 跨界内存写 | 2023-01-09 | ||
AVD-2022-40519 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-33286 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-22088 | 内存缓冲区边界内操作的限制不恰当 | 2023-01-09 | ||
AVD-2022-40518 | 跨界内存读 | 2023-01-09 | ||
AVD-2023-22385 | 数据调制解调器中的缓冲区过度读取 (CVE-2023-22385) | 2022-12-21 | ||
AVD-2023-22388 | 在多模式呼叫处理器中使用超出范围的指针偏移 (CVE-2023-22388) | 2022-12-21 | ||
AVD-2022-25682 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-25695 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-33235 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-25685 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-33238 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2023-21628 | Qualcomm Chipsets 安全漏洞(CVE-2023-21628) | 2022-12-07 | ||
AVD-2023-21629 | 调制解调器中的双重释放 (CVE-2023-21629) | 2022-12-07 | ||
AVD-2023-21659 | Qualcomm WLAN Firmware 拒绝服务漏洞(CVE-2023-21659) | 2022-12-07 | ||
AVD-2022-25676 | qualcomm aqt1000_firmware 跨界内存读 | 2022-11-15 | ||
AVD-2022-25679 | Google Android 安全漏洞(CVE-2022-25679) | 2022-11-15 | ||
AVD-2022-25724 | qualcomm apq8009_firmware 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) | 2022-11-15 | ||
AVD-2022-25743 | qualcomm apq8009_firmware 释放后使用 | 2022-11-15 | ||
AVD-2022-25741 | qualcomm aqt1000_firmware 空指针解引用 | 2022-11-15 | ||
AVD-2022-33239 | qualcomm apq8009_firmware 不可达退出条件的循环(无限循环) | 2022-11-15 | ||
AVD-2022-33234 | Google Android 安全漏洞(CVE-2022-33234) | 2022-11-15 | ||
AVD-2022-33237 | qualcomm aqt1000_firmware 跨界内存读 | 2022-11-15 | ||
AVD-2022-25749 | qualcomm apq8009_firmware 跨界内存读 | 2022-10-19 | ||
AVD-2022-25736 | qualcomm aqt1000_firmware 跨界内存读 | 2022-10-19 | ||
AVD-2022-25720 | qualcomm apq8009_firmware 对数组索引的验证不恰当 | 2022-10-19 |