cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2017-18124,https://securityvulnerability.io/vulnerability/CVE-2017-18124,,"During secure boot, addition is performed on uint8 ptrs which led to overflow issue in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version FSM9055, IPQ4019, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDX20",Qualcomm,"Small Cell Soc, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2018-10-26T13:00:00.000Z,0 CVE-2017-18304,https://securityvulnerability.io/vulnerability/CVE-2017-18304,,"Insufficient memory allocation in boot due to incorrect size being passed could result in out of bounds access in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in version FSM9055, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660 and SDX20",Qualcomm,"Small Cell Soc, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear",7.8,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2018-10-23T13:00:00.000Z,0 CVE-2017-18294,https://securityvulnerability.io/vulnerability/CVE-2017-18294,,"While reading file class type from ELF header, a buffer overread may happen if the ELF file size is less than the size of ELF64 header size in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version FSM9055, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDA660, SDX20.",Qualcomm,"Small Cell Soc, Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear",7.8,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2018-10-23T13:00:00.000Z,0 CVE-2015-9224,https://securityvulnerability.io/vulnerability/CVE-2015-9224,,"In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear, and Small Cell SoC FSM9055, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, and SDX20, lack of input Validation in QURTK_write() can cause potential buffer overflow.",Qualcomm,"Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear, Small Cell Soc",9.8,CRITICAL,0.0018700000364333391,false,,false,false,false,,,false,false,,2018-04-18T14:29:00.000Z,0 CVE-2016-10422,https://securityvulnerability.io/vulnerability/CVE-2016-10422,,"In Android before 2018-04-05 or earlier security patch level on Qualcomm Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear FSM9055, IPQ4019, MDM9206, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, and SDX20, improper access control in system call leads to unauthorized access.",Qualcomm,"Small Cell Soc , Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear",9.8,CRITICAL,0.0019199999514967203,false,,false,false,false,,,false,false,,2018-04-18T14:29:00.000Z,0 CVE-2016-10429,https://securityvulnerability.io/vulnerability/CVE-2016-10429,,"In Android before 2018-04-05 or earlier security patch level on Qualcomm Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear FSM9055, IPQ4019, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, and SDX20, three image types are loaded in the same manner without distinguishing them.",Qualcomm,"Small Cell Soc , Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear",7.5,HIGH,0.0008699999889358878,false,,false,false,false,,,false,false,,2018-04-18T14:29:00.000Z,0 CVE-2015-9138,https://securityvulnerability.io/vulnerability/CVE-2015-9138,,"In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear, and Small Cell SoC FSM9055, IPQ4019, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, and SDX20, when an RSA encryption operation is called, the ce_util_to_unsigned_bin is invoked to convert the input buffer to unsigned binary. The ce_util_to_unsigned_bin function, instead of operating on the size of the unsigned character buffer that is passed, operates on the address - i.e. operates on ""c"" instead of ""*c"". Decrementing the address to check if it is less than zero means that the operation will always pass, since a pointer will never be less than zero, and may result in a buffer overflow.",Qualcomm,"Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear, Small Cell Soc",9.8,CRITICAL,0.00171999994199723,false,,false,false,false,,,false,false,,2018-04-18T14:29:00.000Z,0 CVE-2016-10414,https://securityvulnerability.io/vulnerability/CVE-2016-10414,,"In Android before 2018-04-05 or earlier security patch level on Qualcomm Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear FSM9055, IPQ4019, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, and SDX20, when a hash is passed with zero datalength, the code returns an error, even though zero data length is valid.",Qualcomm,"Small Cell Soc , Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear",9.8,CRITICAL,0.0019199999514967203,false,,false,false,false,,,false,false,,2018-04-18T14:29:00.000Z,0