cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-45569,https://securityvulnerability.io/vulnerability/CVE-2024-45569,Memory Corruption Vulnerability in Qualcomm Products,"This vulnerability involves memory corruption during the parsing of the ML Information Element (IE) due to improperly formatted frame content. Attackers could exploit this flaw to execute arbitrary code, potentially leading to unauthorized access or disruption of services. It highlights the necessity for robust validation mechanisms in parsing operations to safeguard against such threats.",Qualcomm,Snapdragon,9.8,CRITICAL,0.0007699999841861427,false,,true,false,true,2025-02-03T20:10:22.000Z,false,false,false,,2025-02-03T16:51:27.070Z,0 CVE-2024-43047,https://securityvulnerability.io/vulnerability/CVE-2024-43047,MemOK Security Platform Vulnerable to Memory Corruption,"The first article discusses two zero-day vulnerabilities in Android that were actively exploited and fixed by Google in their November security updates. These vulnerabilities, tracked as CVE-2024-43047 and CVE-2024-43093, were found to be exploited in limited, targeted attacks. The CVE-2024-43047 vulnerability affected Qualcomm components within the Android kernel and was used in targeted spyware attacks. The second article highlights a severe hardware vulnerability in Samsung Galaxy phones related to the CVE-2024-43047 flaw, urging users to update their devices urgently. However, the update was not available at the time, leaving users with no choice but to continue using their vulnerable phones. The severity of these vulnerabilities could lead to unauthorized access, system compromise, and the potential spread of malware.",Qualcomm,Snapdragon,7.8,HIGH,0.0006399999838322401,true,2024-10-08T00:00:00.000Z,true,false,true,2024-10-07T19:30:40.000Z,,false,false,,2024-10-07T13:15:00.000Z,0