cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-33238,https://securityvulnerability.io/vulnerability/CVE-2022-33238,Denial of Service Vulnerability in Snapdragon Products by Qualcomm,"A transient denial of service vulnerability is present in Qualcomm's Snapdragon products due to a loop with an unreachable exit condition when processing incoming FTM frames. This issue can lead to significant disruptions, impacting device functionality across various Snapdragon platforms including automotive, consumer electronics, and IoT applications.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-33235,https://securityvulnerability.io/vulnerability/CVE-2022-33235,Buffer Over-Read Vulnerability in Qualcomm Snapdragon Products,"A vulnerability has been identified in various Qualcomm Snapdragon products, stemming from a buffer over-read issue within the WLAN firmware. This flaw arises while parsing security context information attributes, potentially allowing unauthorized parties access to sensitive information. The affected Snapdragon series includes a wide array of applications, from consumer electronics to connectivity solutions, posing significant risks across multiple devices and environments.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.0012700000079348683,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-33237,https://securityvulnerability.io/vulnerability/CVE-2022-33237,Buffer Over-read Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from a buffer over-read in the WLAN firmware while processing the PPE threshold, impacting various Qualcomm Snapdragon products including automotive and mobile solutions. Attackers exploiting this weakness could potentially cause transient denial-of-service situations, disrupting the normal operation of affected devices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-33239,https://securityvulnerability.io/vulnerability/CVE-2022-33239,Transient Denial of Service Vulnerability in Snapdragon Firmware,"A vulnerable condition exists within the WLAN firmware of Snapdragon products, where a loop with an unreachable exit condition occurs during the parsing of the IPv6 extension header. This vulnerability can lead to a transient denial of service, potentially impacting device functionality and network connectivity across various Snapdragon platforms.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-25720,https://securityvulnerability.io/vulnerability/CVE-2022-25720,WLAN Memory Corruption in Qualcomm Snapdragon Products,"A memory corruption vulnerability exists in WLAN implementation within various Qualcomm Snapdragon products, triggered by out of bound array access during connection and roaming processes. This flaw potentially allows an attacker to exploit the vulnerability, leading to unexpected behavior or impacts on device performance.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",9.8,CRITICAL,0.0022299999836832285,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25748,https://securityvulnerability.io/vulnerability/CVE-2022-25748,Memory Corruption Vulnerability in Snapdragon Products by Qualcomm,"A vulnerability exists in Qualcomm's Snapdragon product line, stemming from memory corruption triggered by an integer overflow during the processing of GTK frames. This flaw affects a wide range of Snapdragon variants, including those utilized in automotive, connectivity, consumer electronics, IoT, and mobile applications. Exploiting this vulnerability may enable attackers to execute malicious code or disrupt system operations, underscoring the importance of timely updates and security measures.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.8,CRITICAL,0.0018899999558925629,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25749,https://securityvulnerability.io/vulnerability/CVE-2022-25749,Buffer Over-Read Vulnerability in Qualcomm Snapdragon Products,"A transient denial-of-service vulnerability occurs in the Qualcomm Snapdragon product line due to a buffer over-read when processing MDNS frames. This flaw can potentially disrupt service, affecting multiple Snapdragon applications across various sectors, including automotive, mobile, and IoT devices. Proper patches and system updates are crucial for mitigating this risk.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25736,https://securityvulnerability.io/vulnerability/CVE-2022-25736,Denial of Service Vulnerability in Qualcomm Snapdragon Products,"A denial of service vulnerability exists in Qualcomm Snapdragon products due to an out-of-bound read that occurs while processing VHT action frames. This vulnerability affects numerous Snapdragon platforms, potentially allowing unauthorized users to disrupt the service of connected devices. Readers are advised to review the specific product bulletins and update their systems promptly to mitigate associated risks.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-22058,https://securityvulnerability.io/vulnerability/CVE-2022-22058,Memory Corruption Vulnerability in Snapdragon Products by Qualcomm,"A memory corruption vulnerability exists in Qualcomm's Snapdragon product line, stemming from a use-after-free issue encountered while handling ION handles. This flaw can potentially enable malicious actors to exploit the affected systems, leading to unauthorized access and instability. Users of the Snapdragon Auto, Compute, Connectivity, Consumer Electronics Connectivity, Consumer IOT, Industrial IOT, Mobile, Voice & Music, and Wearables need to stay informed and apply necessary updates to safeguard their devices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-09-26T16:35:09.000Z,0 CVE-2022-25670,https://securityvulnerability.io/vulnerability/CVE-2022-25670,Denial of Service Vulnerability in Snapdragon Products by Qualcomm,"A vulnerability has been identified in Qualcomm Snapdragon products, where a buffer over-read can occur during the unpacking of frames in the WLAN HOST module. This issue may lead to a denial of service, impacting device functionality. Users of devices powered by Snapdragon technology should be aware of this vulnerability and consider applying available updates and mitigation strategies to safeguard their systems.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-09-16T05:25:55.000Z,0 CVE-2022-22062,https://securityvulnerability.io/vulnerability/CVE-2022-22062,Out-of-Bounds Read in Snapdragon Products from Qualcomm,"An out-of-bounds read vulnerability arises when improperly checking the length of data while parsing a server certificate in various Snapdragon products. This flaw affects a wide range of devices, including automotive systems, mobile devices, and consumer electronics, potentially allowing an attacker to read sensitive information beyond the allowed memory boundaries. By exploiting this vulnerability, an attacker could gain unauthorized access to critical data, impacting both user privacy and device integrity.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.001339999958872795,false,,false,false,false,,,false,false,,2022-09-02T11:31:05.000Z,0 CVE-2021-30341,https://securityvulnerability.io/vulnerability/CVE-2021-30341,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"This vulnerability in Qualcomm Snapdragon products stems from improper buffer size validation of DSM packets. When these packets are received, it can result in memory corruption across various Snapdragon categories, including Automotive, Compute, and IoT devices. This exposes systems to potential exploits that may compromise their integrity and lead to unforeseen operational issues.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Wearables",9.8,CRITICAL,0.0017099999822676182,false,,false,false,false,,,false,false,,2022-06-14T10:10:58.000Z,0 CVE-2022-22065,https://securityvulnerability.io/vulnerability/CVE-2022-22065,Out of Bound Read Vulnerability in Snapdragon Products by Qualcomm,"An out of bound read vulnerability exists in Qualcomm's WLAN HOST due to improper length checks. This could potentially lead to denial of service (DOS) in several Snapdragon products, impacting their performance and reliability. Affected devices include those in automotive, computing, connectivity, consumer electronics, IoT, and mobile sectors. Users are encouraged to stay informed about this vulnerability and consult available mitigation strategies to safeguard their devices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",7.5,HIGH,0.000910000002477318,false,,false,false,false,,,false,false,,2022-06-14T09:51:12.000Z,0 CVE-2022-22064,https://securityvulnerability.io/vulnerability/CVE-2022-22064,Buffer Over Read Vulnerability in Qualcomm Snapdragon Products,"A buffer over read vulnerability has been identified in various Qualcomm Snapdragon products due to insufficient size validation during the unpacking of frames. This flaw may allow attackers to access unauthorized memory areas, potentially leading to information leakage and impacting system integrity across multiple Snapdragon platforms, including automotive, consumer electronics, and IoT devices. It is crucial for users and developers utilizing affected Snapdragon products to implement necessary patches and follow security updates to mitigate potential exploitation.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",7.5,HIGH,0.000910000002477318,false,,false,false,false,,,false,false,,2022-06-14T09:51:11.000Z,0 CVE-2021-35083,https://securityvulnerability.io/vulnerability/CVE-2021-35083,Out of Bound Read Vulnerability in Snapdragon Products by Qualcomm,"The vulnerability arises from improper validation of the certificate chain during SSL or Internet key exchange processes in various Snapdragon products. This flaw may allow attackers to access sensitive information outside the intended memory bounds, potentially compromising the security and integrity of affected devices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",8.2,HIGH,0.0013599999947473407,false,,false,false,false,,,false,false,,2022-06-14T09:40:35.000Z,0 CVE-2021-30272,https://securityvulnerability.io/vulnerability/CVE-2021-30272,Null Pointer Dereference in Qualcomm Snapdragon Products,"An issue has been identified in Qualcomm's Snapdragon products where a null pointer dereference can occur in the thread cache operation handler. This vulnerability arises from inadequate validation of user-provided input, potentially leading to unexpected behaviors in a variety of Snapdragon platforms such as Automotive, Compute, Connectivity, and Consumer Electronics. Mitigating this vulnerability is crucial for ensuring system integrity and maintaining secure operations across affected devices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.3,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:25:48.000Z,0 CVE-2021-30271,https://securityvulnerability.io/vulnerability/CVE-2021-30271,Null Pointer Dereference in Snapdragon Components by Qualcomm,"This vulnerability allows a null pointer dereference in the trap handler due to inadequate validation of thread IDs before dereferencing them. Affected components include various Snapdragon models utilized across automotive, IoT, and consumer electronics sectors. Attackers exploiting this vulnerability could cause unexpected behavior or system crashes.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.3,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:25:46.000Z,0 CVE-2021-1924,https://securityvulnerability.io/vulnerability/CVE-2021-1924,Information Disclosure Vulnerability in Snapdragon Products by Qualcomm,This vulnerability allows attackers to disclose sensitive information through timing and power side-channel attacks during the RSA-CRT mod exponentiation process in various Snapdragon products. The exposed information can potentially be exploited to undermine the security of affected devices.,Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9,CRITICAL,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-11-12T06:15:42.000Z,0 CVE-2021-1909,https://securityvulnerability.io/vulnerability/CVE-2021-1909,Buffer Overflow in Qualcomm Snapdragon Products,"A buffer overflow vulnerability exists in Qualcomm's Snapdragon products due to insufficient length checks of parameters. This flaw can lead to unpredictable behavior and potential exploitation by malicious entities. It affects a range of products including Snapdragon Automotive, Compute, and IoT devices, highlighting the importance of stringent parameter validation to ensure device security. Users of affected Snapdragon products are urged to apply relevant patches and updates to mitigate risks associated with this vulnerability.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.3,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-09-09T07:35:41.000Z,0 CVE-2020-11301,https://securityvulnerability.io/vulnerability/CVE-2020-11301,Improper Authentication Vulnerability in Qualcomm Snapdragon Products,"The vulnerability arises from improper authentication when handling unencrypted plaintext Wi-Fi frames within an encrypted network. This flaw impacts various Qualcomm Snapdragon products, enabling potential information disclosure. Attackers may utilize this vulnerability to intercept sensitive data, exposing users to various security risks. It is essential for users and organizations leveraging affected Snapdragon technologies to remain vigilant and apply the available mitigations.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.1,CRITICAL,0.0018400000408291817,false,,false,false,false,,,false,false,,2021-09-08T11:25:31.000Z,0 CVE-2021-1955,https://securityvulnerability.io/vulnerability/CVE-2021-1955,Denial of Service Vulnerability in Qualcomm Snapdragon Products,"This vulnerability occurs due to improper handling of connections in Qualcomm's Snapdragon products when an association is rejected. It may lead to a denial of service, potentially impacting the functionality of devices using the affected Snapdragon technologies across various applications including automotive, computing, consumer electronics, and IoT.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2021-07-13T05:31:04.000Z,0 CVE-2020-11234,https://securityvulnerability.io/vulnerability/CVE-2020-11234,Use After Free Vulnerability in Qualcomm Snapdragon Products,"A Use After Free vulnerability exists in various Qualcomm Snapdragon products. This issue occurs when a socket event message is sent to a user application, but if the socket is freed by another thread, it can lead to the transmission of invalid information. This flaw can potentially allow an attacker to exploit this condition, compromising the integrity and security of applications relying on Snapdragon technologies. The affected products include a wide range of Snapdragon solutions across automotive, industrial, mobile, and consumer electronics sectors, emphasizing the need for vigilant security practices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-04-07T07:55:29.000Z,0 CVE-2020-11191,https://securityvulnerability.io/vulnerability/CVE-2020-11191,Out of Bound Read Vulnerability in Qualcomm Snapdragon Products,"A potential out of bound read vulnerability has been identified in various Qualcomm Snapdragon products. This issue arises when crafted Session Description Protocol (SDP) packets are processed without appropriate checks for null strings, leading to unauthorized access to sensitive data. Affected devices include a wide range of Snapdragon platforms used in automotive, consumer electronics, IoT, mobile, and networking sectors. It is crucial for manufacturers and developers to assess their systems and apply recommended mitigations to safeguard against potential exploitation.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.001879999996162951,false,,false,false,false,,,false,false,,2021-04-07T07:55:27.000Z,0 CVE-2020-11272,https://securityvulnerability.io/vulnerability/CVE-2020-11272,Use After Free Vulnerability in Qualcomm Snapdragon Products,"A vulnerability exists in some Qualcomm Snapdragon products due to improper handling of hash table entries before they are queued for processing. An attacker could manipulate this flaw, leading to a use after free condition, which may compromise the integrity and availability of the affected systems. This issue highlights the importance of appropriate memory management in software to prevent exploitation through stale versions of data structures.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables",9.8,CRITICAL,0.002460000105202198,false,,false,false,false,,,false,false,,2021-02-22T06:25:59.000Z,0 CVE-2020-11269,https://securityvulnerability.io/vulnerability/CVE-2020-11269,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"A memory corruption issue has been identified that arises from insufficient validation of key length when processing EAPOL frames across various Qualcomm Snapdragon products. This flaw may expose affected devices to potential exploits, allowing unauthorized access or other malicious activities, especially in environments relying on secure network communications.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.8,HIGH,0.000699999975040555,false,,false,false,false,,,false,false,,2021-02-22T06:25:57.000Z,0