cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-33235,https://securityvulnerability.io/vulnerability/CVE-2022-33235,Buffer Over-Read Vulnerability in Qualcomm Snapdragon Products,"A vulnerability has been identified in various Qualcomm Snapdragon products, stemming from a buffer over-read issue within the WLAN firmware. This flaw arises while parsing security context information attributes, potentially allowing unauthorized parties access to sensitive information. The affected Snapdragon series includes a wide array of applications, from consumer electronics to connectivity solutions, posing significant risks across multiple devices and environments.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.0012700000079348683,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-33238,https://securityvulnerability.io/vulnerability/CVE-2022-33238,Denial of Service Vulnerability in Snapdragon Products by Qualcomm,"A transient denial of service vulnerability is present in Qualcomm's Snapdragon products due to a loop with an unreachable exit condition when processing incoming FTM frames. This issue can lead to significant disruptions, impacting device functionality across various Snapdragon platforms including automotive, consumer electronics, and IoT applications.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-25677,https://securityvulnerability.io/vulnerability/CVE-2022-25677,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"A memory corruption issue exists within Qualcomm's Snapdragon product line due to improper handling of memory during the processing of DCI packets. This type of vulnerability arises from a use-after-free scenario, where memory that has already been released is accessed again, potentially leading to arbitrary code execution or system instability. Affected systems include a broad range of Snapdragon platforms, which are widely utilized in automotive, industrial, mobile, consumer IoT, and networking applications. Prompt attention to this vulnerability is essential for maintaining system integrity and security.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-33239,https://securityvulnerability.io/vulnerability/CVE-2022-33239,Transient Denial of Service Vulnerability in Snapdragon Firmware,"A vulnerable condition exists within the WLAN firmware of Snapdragon products, where a loop with an unreachable exit condition occurs during the parsing of the IPv6 extension header. This vulnerability can lead to a transient denial of service, potentially impacting device functionality and network connectivity across various Snapdragon platforms.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-33237,https://securityvulnerability.io/vulnerability/CVE-2022-33237,Buffer Over-read Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from a buffer over-read in the WLAN firmware while processing the PPE threshold, impacting various Qualcomm Snapdragon products including automotive and mobile solutions. Attackers exploiting this weakness could potentially cause transient denial-of-service situations, disrupting the normal operation of affected devices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-25749,https://securityvulnerability.io/vulnerability/CVE-2022-25749,Buffer Over-Read Vulnerability in Qualcomm Snapdragon Products,"A transient denial-of-service vulnerability occurs in the Qualcomm Snapdragon product line due to a buffer over-read when processing MDNS frames. This flaw can potentially disrupt service, affecting multiple Snapdragon applications across various sectors, including automotive, mobile, and IoT devices. Proper patches and system updates are crucial for mitigating this risk.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25666,https://securityvulnerability.io/vulnerability/CVE-2022-25666,Memory Corruption in Qualcomm Snapdragon Products,"A memory corruption vulnerability exists in Qualcomm's Snapdragon products due to a use-after-free error. This issue arises when multiple threads attempt to access shared resources, leading to potential exploitation. The affected products include a range of Snapdragon variants utilized in automotive, computing, consumer IoT, industrial IoT, mobile, wearable, and networking applications, making timely security patches essential for mitigating the risks associated with this vulnerability.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25748,https://securityvulnerability.io/vulnerability/CVE-2022-25748,Memory Corruption Vulnerability in Snapdragon Products by Qualcomm,"A vulnerability exists in Qualcomm's Snapdragon product line, stemming from memory corruption triggered by an integer overflow during the processing of GTK frames. This flaw affects a wide range of Snapdragon variants, including those utilized in automotive, connectivity, consumer electronics, IoT, and mobile applications. Exploiting this vulnerability may enable attackers to execute malicious code or disrupt system operations, underscoring the importance of timely updates and security measures.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.8,CRITICAL,0.0018899999558925629,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25736,https://securityvulnerability.io/vulnerability/CVE-2022-25736,Denial of Service Vulnerability in Qualcomm Snapdragon Products,"A denial of service vulnerability exists in Qualcomm Snapdragon products due to an out-of-bound read that occurs while processing VHT action frames. This vulnerability affects numerous Snapdragon platforms, potentially allowing unauthorized users to disrupt the service of connected devices. Readers are advised to review the specific product bulletins and update their systems promptly to mitigate associated risks.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-22062,https://securityvulnerability.io/vulnerability/CVE-2022-22062,Out-of-Bounds Read in Snapdragon Products from Qualcomm,"An out-of-bounds read vulnerability arises when improperly checking the length of data while parsing a server certificate in various Snapdragon products. This flaw affects a wide range of devices, including automotive systems, mobile devices, and consumer electronics, potentially allowing an attacker to read sensitive information beyond the allowed memory boundaries. By exploiting this vulnerability, an attacker could gain unauthorized access to critical data, impacting both user privacy and device integrity.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.001339999958872795,false,,false,false,false,,,false,false,,2022-09-02T11:31:05.000Z,0 CVE-2021-35129,https://securityvulnerability.io/vulnerability/CVE-2021-35129,Memory Corruption Vulnerability in Snapdragon Products by Qualcomm,"This vulnerability involves memory corruption in Qualcomm's Snapdragon range due to improper length checks when processing vendor-specific commands. This issue can potentially allow an attacker to manipulate device functionality, leading to unexpected behavior in products such as Snapdragon Compute, Snapdragon Connectivity, and others in the Snapdragon ecosystem.",Qualcomm,"Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-06-14T10:11:28.000Z,0 CVE-2021-35088,https://securityvulnerability.io/vulnerability/CVE-2021-35088,Out of Bound Read Vulnerability in Snapdragon Products by Qualcomm,"The vulnerability arises from improper validation of Information Element (IE) length during the parsing of SSID IEs when the channel is in Dynamic Frequency Selection (DFS) mode. This flaw could allow unauthorized access to sensitive data, posing a significant risk across various Snapdragon platforms including automotive, consumer IoT, industrial IoT, mobile, wearables, and wired infrastructure. It is essential for users of affected Snapdragon products to apply necessary patches and monitor for any related security advisories.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.002460000105202198,false,,false,false,false,,,false,false,,2022-04-01T04:40:36.000Z,0 CVE-2021-1942,https://securityvulnerability.io/vulnerability/CVE-2021-1942,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from improper handling of permissions within a shared memory region, potentially leading to memory corruption across various Qualcomm Snapdragon products. This issue could allow an attacker to exploit the permission settings, resulting in unintended access to sensitive information or system instability. Affected devices include a wide range of Snapdragon platforms utilized in automotive systems, computing, connectivity, consumer IoT, industrial applications, mobile devices, voice and music systems, wearables, and wired infrastructure and networking.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.3,CRITICAL,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-04-01T04:40:25.000Z,0 CVE-2021-35069,https://securityvulnerability.io/vulnerability/CVE-2021-35069,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from the improper validation of data length received from a Direct Memory Access (DMA) buffer, potentially leading to memory corruption across various Qualcomm Snapdragon products. This flaw may allow an attacker to exploit the system, affecting the integrity and stability of devices in automotive, consumer IoT, industrial IoT, and mobile categories.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-11T10:40:32.000Z,0 CVE-2021-30325,https://securityvulnerability.io/vulnerability/CVE-2021-30325,Out of Bound Access Vulnerability in Qualcomm Snapdragon Products,"This vulnerability allows for potential out of bound access to DCI resources in various Qualcomm Snapdragon products due to insufficient validation processes and resource allocation issues. Affected products include Snapdragon Auto, Snapdragon Compute, and several IoT and mobile devices, which could lead to unauthorized access to sensitive data or resources.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-11T10:40:28.000Z,0 CVE-2021-30324,https://securityvulnerability.io/vulnerability/CVE-2021-30324,Out of Bound Write Vulnerability in Snapdragon Products by Qualcomm,"A vulnerability exists in various Qualcomm Snapdragon products due to inadequate boundary checks for maximum buffer size when sending a DCI packet to a remote process. This flaw could potentially allow unauthorized access or manipulation of data, impacting the integrity and security of affected devices. This vulnerability highlights the importance of rigorous validation checks in software development to prevent exploitation.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-11T10:40:27.000Z,0 CVE-2021-30317,https://securityvulnerability.io/vulnerability/CVE-2021-30317,Image Verification Bypass in Qualcomm Snapdragon Products,"This vulnerability arises from improper validation of program headers that contain ELF metadata across various Qualcomm Snapdragon products. Attackers may exploit this flaw to bypass image verification, potentially leading to unauthorized access or execution of malicious code. It is crucial for users of affected Snapdragon platforms to apply necessary patches and updates to mitigate risks associated with this vulnerability.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",9.3,CRITICAL,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-11T10:40:21.000Z,0 CVE-2021-30313,https://securityvulnerability.io/vulnerability/CVE-2021-30313,Race Condition Vulnerability in Snapdragon Products by Qualcomm,"This vulnerability arises from a use-after-free condition triggered by a race condition in the creation and deletion of folders across various Snapdragon platforms. This flaw can lead to potential unauthorized access or data corruption, allowing an attacker to exploit the underlying systems mainly focused on connectivity and automotive applications. Proper patching and updates are essential to mitigate the risks associated with this security flaw.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-13T11:40:30.000Z,0 CVE-2021-30351,https://securityvulnerability.io/vulnerability/CVE-2021-30351,Out of Bound Memory Access in Qualcomm Snapdragon Products,"An out of bound memory access vulnerability exists in Qualcomm's Snapdragon products due to improper validation of the number of frames processed during music playback. This flaw can potentially allow attackers to exploit buffer overflow conditions, leading to unexpected behavior or crashes in affected devices. Security updates are recommended for all users of Snapdragon-based systems to mitigate potential risks associated with this vulnerability.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.8,CRITICAL,0.001879999996162951,false,,false,false,false,,,false,false,,2022-01-03T07:26:13.000Z,0 CVE-2021-30337,https://securityvulnerability.io/vulnerability/CVE-2021-30337,Use After Free Vulnerability in Qualcomm Snapdragon Products,"A possible use after free vulnerability exists when the memory associated with a process shell is freed while the process initialization is still in progress. This issue affects various Qualcomm Snapdragon products including Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking. Attackers exploiting this vulnerability might gain unauthorized access to sensitive data or execute arbitrary code, thus compromising the integrity and confidentiality of the system.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:26:10.000Z,0 CVE-2021-30335,https://securityvulnerability.io/vulnerability/CVE-2021-30335,Improper Validation Vulnerability in Qualcomm's Snapdragon Products,"This vulnerability arises from improper validation when multiple add or update requests are processed simultaneously within various Snapdragon platforms. This could potentially lead to assertion issues in QOS requests, impacting the overall functionality and security of devices relying on Snapdragon technology.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:26:07.000Z,0 CVE-2021-30303,https://securityvulnerability.io/vulnerability/CVE-2021-30303,Buffer Overflow Vulnerability in Qualcomm Snapdragon Products,"A potential buffer overflow vulnerability exists in Qualcomm's Snapdragon product line due to insufficient length checks when handling segmented Windows Management Instrumentation (WMI) commands. This flaw could allow unauthorized access or execution of arbitrary code, affecting a wide range of devices, including those utilized in automotive, consumer electronics, and industrial Internet of Things (IoT) solutions.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:26:06.000Z,0 CVE-2021-30279,https://securityvulnerability.io/vulnerability/CVE-2021-30279,Access Control Vulnerability in Qualcomm Snapdragon Products,"The vulnerability stems from improper permission masking when setting current permissions for VMIDs in various Snapdragon products. This oversight could allow unauthorized access or manipulation of system resources, posing a security risk to devices utilizing Snapdragon technology for compute, connectivity, and IoT functions. Users and developers are advised to implement available patches and monitor access controls to mitigate potential threats.",Qualcomm,"Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:25:56.000Z,0 CVE-2020-11263,https://securityvulnerability.io/vulnerability/CVE-2020-11263,Integer Overflow Vulnerability in Qualcomm Snapdragon Products,"This vulnerability involves an integer overflow that occurs due to inadequate validation after alignment checks of the address and size parameters in various Qualcomm Snapdragon products. This issue can compromise system integrity and potentially be exploited in systems utilizing these products, highlighting the need for users to apply necessary patches and updates.",Qualcomm,"Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wired Infrastructure And Networking",7.3,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:25:35.000Z,0 CVE-2021-30266,https://securityvulnerability.io/vulnerability/CVE-2021-30266,Use After Free Vulnerability in Qualcomm Snapdragon Products,"The vulnerability arises from improper memory validation when initializing a new interface via the Interface add command across multiple Qualcomm Snapdragon products. This flaw can potentially lead to exploitation, allowing an attacker to manipulate memory in unintended ways, which could result in unauthorized access or data leakage.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-11-12T06:16:01.000Z,0