Link | Resource |
---|---|
https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin | Patch Vendor Advisory |
https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin | Patch Vendor Advisory |
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
Configuration 23 (hide)
AND |
|
Configuration 24 (hide)
AND |
|
Configuration 25 (hide)
AND |
|
Configuration 26 (hide)
AND |
|
Configuration 27 (hide)
AND |
|
Configuration 28 (hide)
AND |
|
Configuration 29 (hide)
AND |
|
Configuration 30 (hide)
AND |
|
Configuration 31 (hide)
AND |
|
Configuration 32 (hide)
AND |
|
Configuration 33 (hide)
AND |
|
Configuration 34 (hide)
AND |
|
Configuration 35 (hide)
AND |
|
Configuration 36 (hide)
AND |
|
Configuration 37 (hide)
AND |
|
Configuration 38 (hide)
AND |
|
Configuration 39 (hide)
AND |
|
Configuration 40 (hide)
AND |
|
Configuration 41 (hide)
AND |
|
Configuration 42 (hide)
AND |
|
Configuration 43 (hide)
AND |
|
Configuration 44 (hide)
AND |
|
Configuration 45 (hide)
AND |
|
Configuration 46 (hide)
AND |
|
Configuration 47 (hide)
AND |
|
Configuration 48 (hide)
AND |
|
Configuration 49 (hide)
AND |
|
Configuration 50 (hide)
AND |
|
Configuration 51 (hide)
AND |
|
Configuration 52 (hide)
AND |
|
Configuration 53 (hide)
AND |
|
Configuration 54 (hide)
AND |
|
Configuration 55 (hide)
AND |
|
Configuration 56 (hide)
AND |
|
Configuration 57 (hide)
AND |
|
Configuration 58 (hide)
AND |
|
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin - Patch, Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1284 |
22 Jun 2022, 17:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:mdm9626:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:mdm9626_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:pm8937_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca4020_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin - Patch, Vendor Advisory | |
CWE | NVD-CWE-Other | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
14 Jun 2022, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2022-06-14 10:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22072
Mitre link : CVE-2022-22072
CVE.ORG link : CVE-2022-22072
JSON object : View
qualcomm
- qca6574a_firmware
- sd820_firmware
- wcd9340_firmware
- msm8937
- qca9379
- pm8937
- apq8017_firmware
- qcs405
- sd845
- apq8053_firmware
- qca6335
- qca6564a_firmware
- sd670_firmware
- sd835
- wcn3990
- csra6620
- qca6564au_firmware
- qca9367
- sdx20
- wsa8810_firmware
- sdx24_firmware
- qca6320_firmware
- msm8937_firmware
- sdxr1_firmware
- mdm9628
- wcn3615_firmware
- sd845_firmware
- csra6620_firmware
- sd710
- apq8009
- mdm9206
- wcd9341_firmware
- sd710_firmware
- apq8053
- sdx24
- wcn3680b_firmware
- mdm9607
- wcn3610
- mdm9150_firmware
- wcn3660b_firmware
- wcd9330_firmware
- qca9367_firmware
- wcn3610_firmware
- sa515m
- wcn3680b
- mdm9628_firmware
- sd835_firmware
- qca6335_firmware
- wcn3998
- qca6574_firmware
- apq8096au_firmware
- mdm9250
- qcs405_firmware
- qca6574
- sdx20_firmware
- wcn3660b
- mdm9206_firmware
- apq8017
- wcn3998_firmware
- wcn3980
- qca6564au
- csra6640
- qca6574au_firmware
- qca6564a
- mdm9650_firmware
- wcd9326
- qca9377_firmware
- mdm9150
- qcs603_firmware
- qca6574au
- qca9379_firmware
- qcs605
- qca6310_firmware
- qca6320
- qca6310
- qca9377
- wsa8815
- mdm9626
- apq8096au
- pm8937_firmware
- qca6175a
- wsa8810
- qca6574a
- sa515m_firmware
- sdx12_firmware
- qca6174a
- qca4020_firmware
- csra6640_firmware
- wcn3999
- sdxr1
- sd820
- wcd9341
- qcs603
- apq8009_firmware
- wcd9340
- sd670
- qca4020
- qca6175a_firmware
- mdm9607_firmware
- mdm9650
- wcn3615
- wsa8815_firmware
- mdm9626_firmware
- wcn3980_firmware
- wcd9335
- qcs605_firmware
- wcd9330
- ar8031_firmware
- wcn3999_firmware
- mdm9250_firmware
- ar8031
- qca6174a_firmware
- wcd9335_firmware
- wcn3990_firmware
- sdx12
- wcd9326_firmware
Improper Validation of Specified Quantity in Input