U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 107 matching records.
Displaying matches 1 through 20.
Vuln ID Summary CVSS Severity
CVE-2023-21664

Memory Corruption in Core Platform while printing the response buffer in log.

Published: September 05, 2023; 3:15:12 AM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21662

Memory corruption in Core Platform while printing the response buffer in log.

Published: September 05, 2023; 3:15:12 AM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-40531

Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message.

Published: March 10, 2023; 4:15:12 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-40530

Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase.

Published: March 10, 2023; 4:15:12 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-40527

Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM.

Published: March 10, 2023; 4:15:12 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-33309

Transient DOS due to buffer over-read in WLAN Firmware while parsing secure FTMR frame with size lesser than 39 Bytes.

Published: March 10, 2023; 4:15:12 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-25655

Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload.

Published: March 10, 2023; 4:15:11 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-40514

Memory corruption due to buffer copy without checking the size of input in WLAN Firmware while processing CCKM IE in reassoc response frame.

Published: February 11, 2023; 11:15:15 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2022-40513

Transient DOS due to uncontrolled resource consumption in WLAN firmware when peer is freed in non qos state.

Published: February 11, 2023; 11:15:15 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-40512

Transient DOS in WLAN Firmware due to buffer over-read while processing probe response or beacon.

Published: February 11, 2023; 11:15:15 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-40502

Transient DOS due to improper input validation in WLAN Host.

Published: February 11, 2023; 11:15:15 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-34146

Transient DOS due to improper input validation in WLAN Host while parsing frame during defragmentation.

Published: February 11, 2023; 11:15:14 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-34145

Transient DOS due to buffer over-read in WLAN Host while parsing frame information.

Published: February 11, 2023; 11:15:14 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-33306

Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs.

Published: February 11, 2023; 11:15:14 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-33279

Memory corruption due to stack based buffer overflow in WLAN having invalid WNM frame length.

Published: February 11, 2023; 11:15:14 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2022-33277

Memory corruption in modem due to buffer copy without checking size of input while receiving WMI command.

Published: February 11, 2023; 11:15:14 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-33271

Information disclosure due to buffer over-read in WLAN while parsing NMF frame.

Published: February 11, 2023; 11:15:14 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-33243

Memory corruption due to improper access control in Qualcomm IPC.

Published: February 11, 2023; 11:15:14 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-33286

Transient DOS due to buffer over-read in WLAN while processing 802.11 management frames.

Published: January 09, 2023; 3:15:12 AM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2022-33285

Transient DOS due to buffer over-read in WLAN while parsing WLAN CSA action frames.

Published: January 09, 2023; 3:15:12 AM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)