Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Qualcomm:
>> Qca8084 Firmware
Security Vulnerabilities
CVE-2022-40513
Transient DOS due to uncontrolled resource consumption in WLAN firmware when peer is freed in non qos state.
CVSS Score
7.5
EPSS Score
0.001
Published
2023-02-12
CVE-2022-40514
Memory corruption due to buffer copy without checking the size of input in WLAN Firmware while processing CCKM IE in reassoc response frame.
CVSS Score
9.8
EPSS Score
0.001
Published
2023-02-12
CVE-2022-33271
Information disclosure due to buffer over-read in WLAN while parsing NMF frame.
CVSS Score
8.2
EPSS Score
0.001
Published
2023-02-12
CVE-2022-33277
Memory corruption in modem due to buffer copy without checking size of input while receiving WMI command.
CVSS Score
8.4
EPSS Score
0.001
Published
2023-02-12
CVE-2022-33306
Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs.
CVSS Score
7.5
EPSS Score
0.001
Published
2023-02-12
CVE-2022-40517
Memory corruption in core due to stack-based buffer overflow
CVSS Score
8.4
EPSS Score
0.001
Published
2023-01-09
CVE-2022-40519
Information disclosure due to buffer overread in Core
CVSS Score
6.8
EPSS Score
0.0
Published
2023-01-09
CVE-2022-33253
Transient DOS due to buffer over-read in WLAN while parsing corrupted NAN frames.
CVSS Score
7.5
EPSS Score
0.001
Published
2023-01-09
CVE-2022-33276
Memory corruption due to buffer copy without checking size of input in modem while receiving WMI_REQUEST_STATS_CMDID command.
CVSS Score
8.4
EPSS Score
0.001
Published
2023-01-09
CVE-2022-33283
Information disclosure due to buffer over-read in WLAN while WLAN frame parsing due to missing frame length check.
CVSS Score
8.2
EPSS Score
0.001
Published
2023-01-09
Prev
Next
Page 11
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved