搜索结果
关于「sa415m」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2023-21626 | qualcomm wsa8835 firmware身份验证不当漏洞(CVE-2023-21626) | 2023-08-08 | ||
AVD-2023-22666 | qualcomm wsa8835 firmware越界写入漏洞(CVE-2023-22666) | 2023-08-08 | ||
AVD-2022-40510 | qualcomm wsa8835 firmware越界写入漏洞(CVE-2022-40510) | 2023-08-08 | ||
AVD-2023-21650 | qualcomm wsa8835 firmware越界写入漏洞(CVE-2023-21650) | 2023-08-08 | ||
AVD-2022-33253 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-40516 | 跨界内存写 | 2023-01-09 | ||
AVD-2022-33285 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-33286 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-40517 | 跨界内存写 | 2023-01-09 | ||
AVD-2022-40518 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-25725 | 对无效指针或索引的释放 | 2023-01-09 | ||
AVD-2022-33266 | 内存缓冲区边界内操作的限制不恰当 | 2023-01-09 | ||
AVD-2022-40519 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-33290 | 空指针解引用 | 2023-01-09 | ||
AVD-2022-33299 | 空指针解引用 | 2023-01-09 | ||
AVD-2022-33252 | 跨界内存读 | 2023-01-09 | ||
AVD-2022-40520 | 跨界内存写 | 2023-01-09 | ||
AVD-2022-33235 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-33238 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-25682 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2022-25695 | Google Pixel 安全漏洞 | 2022-12-14 | ||
AVD-2023-21654 | Qualcomm Chipsets 安全漏洞(CVE-2023-21654) | 2022-12-07 | ||
AVD-2022-25724 | qualcomm apq8009_firmware 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) | 2022-11-15 | ||
AVD-2022-25741 | qualcomm aqt1000_firmware 空指针解引用 | 2022-11-15 | ||
AVD-2022-33237 | qualcomm aqt1000_firmware 跨界内存读 | 2022-11-15 | ||
AVD-2022-25710 | qualcomm apq8009_firmware 空指针解引用 | 2022-11-15 | ||
AVD-2022-33239 | qualcomm apq8009_firmware 不可达退出条件的循环(无限循环) | 2022-11-15 | ||
AVD-2022-25743 | qualcomm apq8009_firmware 释放后使用 | 2022-11-15 | ||
AVD-2022-22078 | qualcomm aqt1000_firmware 整数溢出或超界折返 | 2022-10-19 | ||
AVD-2022-25749 | qualcomm apq8009_firmware 跨界内存读 | 2022-10-19 |