cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-33235,https://securityvulnerability.io/vulnerability/CVE-2022-33235,Buffer Over-Read Vulnerability in Qualcomm Snapdragon Products,"A vulnerability has been identified in various Qualcomm Snapdragon products, stemming from a buffer over-read issue within the WLAN firmware. This flaw arises while parsing security context information attributes, potentially allowing unauthorized parties access to sensitive information. The affected Snapdragon series includes a wide array of applications, from consumer electronics to connectivity solutions, posing significant risks across multiple devices and environments.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.0012700000079348683,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-33238,https://securityvulnerability.io/vulnerability/CVE-2022-33238,Denial of Service Vulnerability in Snapdragon Products by Qualcomm,"A transient denial of service vulnerability is present in Qualcomm's Snapdragon products due to a loop with an unreachable exit condition when processing incoming FTM frames. This issue can lead to significant disruptions, impacting device functionality across various Snapdragon platforms including automotive, consumer electronics, and IoT applications.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-12-13T00:00:00.000Z,0 CVE-2022-33239,https://securityvulnerability.io/vulnerability/CVE-2022-33239,Transient Denial of Service Vulnerability in Snapdragon Firmware,"A vulnerable condition exists within the WLAN firmware of Snapdragon products, where a loop with an unreachable exit condition occurs during the parsing of the IPv6 extension header. This vulnerability can lead to a transient denial of service, potentially impacting device functionality and network connectivity across various Snapdragon platforms.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-33237,https://securityvulnerability.io/vulnerability/CVE-2022-33237,Buffer Over-read Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from a buffer over-read in the WLAN firmware while processing the PPE threshold, impacting various Qualcomm Snapdragon products including automotive and mobile solutions. Attackers exploiting this weakness could potentially cause transient denial-of-service situations, disrupting the normal operation of affected devices.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-25749,https://securityvulnerability.io/vulnerability/CVE-2022-25749,Buffer Over-Read Vulnerability in Qualcomm Snapdragon Products,"A transient denial-of-service vulnerability occurs in the Qualcomm Snapdragon product line due to a buffer over-read when processing MDNS frames. This flaw can potentially disrupt service, affecting multiple Snapdragon applications across various sectors, including automotive, mobile, and IoT devices. Proper patches and system updates are crucial for mitigating this risk.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25748,https://securityvulnerability.io/vulnerability/CVE-2022-25748,Memory Corruption Vulnerability in Snapdragon Products by Qualcomm,"A vulnerability exists in Qualcomm's Snapdragon product line, stemming from memory corruption triggered by an integer overflow during the processing of GTK frames. This flaw affects a wide range of Snapdragon variants, including those utilized in automotive, connectivity, consumer electronics, IoT, and mobile applications. Exploiting this vulnerability may enable attackers to execute malicious code or disrupt system operations, underscoring the importance of timely updates and security measures.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.8,CRITICAL,0.0018899999558925629,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25736,https://securityvulnerability.io/vulnerability/CVE-2022-25736,Denial of Service Vulnerability in Qualcomm Snapdragon Products,"A denial of service vulnerability exists in Qualcomm Snapdragon products due to an out-of-bound read that occurs while processing VHT action frames. This vulnerability affects numerous Snapdragon platforms, potentially allowing unauthorized users to disrupt the service of connected devices. Readers are advised to review the specific product bulletins and update their systems promptly to mitigate associated risks.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-22062,https://securityvulnerability.io/vulnerability/CVE-2022-22062,Out-of-Bounds Read in Snapdragon Products from Qualcomm,"An out-of-bounds read vulnerability arises when improperly checking the length of data while parsing a server certificate in various Snapdragon products. This flaw affects a wide range of devices, including automotive systems, mobile devices, and consumer electronics, potentially allowing an attacker to read sensitive information beyond the allowed memory boundaries. By exploiting this vulnerability, an attacker could gain unauthorized access to critical data, impacting both user privacy and device integrity.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.001339999958872795,false,,false,false,false,,,false,false,,2022-09-02T11:31:05.000Z,0 CVE-2021-35129,https://securityvulnerability.io/vulnerability/CVE-2021-35129,Memory Corruption Vulnerability in Snapdragon Products by Qualcomm,"This vulnerability involves memory corruption in Qualcomm's Snapdragon range due to improper length checks when processing vendor-specific commands. This issue can potentially allow an attacker to manipulate device functionality, leading to unexpected behavior in products such as Snapdragon Compute, Snapdragon Connectivity, and others in the Snapdragon ecosystem.",Qualcomm,"Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-06-14T10:11:28.000Z,0 CVE-2021-35088,https://securityvulnerability.io/vulnerability/CVE-2021-35088,Out of Bound Read Vulnerability in Snapdragon Products by Qualcomm,"The vulnerability arises from improper validation of Information Element (IE) length during the parsing of SSID IEs when the channel is in Dynamic Frequency Selection (DFS) mode. This flaw could allow unauthorized access to sensitive data, posing a significant risk across various Snapdragon platforms including automotive, consumer IoT, industrial IoT, mobile, wearables, and wired infrastructure. It is essential for users of affected Snapdragon products to apply necessary patches and monitor for any related security advisories.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.2,HIGH,0.002460000105202198,false,,false,false,false,,,false,false,,2022-04-01T04:40:36.000Z,0 CVE-2021-1942,https://securityvulnerability.io/vulnerability/CVE-2021-1942,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from improper handling of permissions within a shared memory region, potentially leading to memory corruption across various Qualcomm Snapdragon products. This issue could allow an attacker to exploit the permission settings, resulting in unintended access to sensitive information or system instability. Affected devices include a wide range of Snapdragon platforms utilized in automotive systems, computing, connectivity, consumer IoT, industrial applications, mobile devices, voice and music systems, wearables, and wired infrastructure and networking.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.3,CRITICAL,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-04-01T04:40:25.000Z,0 CVE-2021-35069,https://securityvulnerability.io/vulnerability/CVE-2021-35069,Memory Corruption Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from the improper validation of data length received from a Direct Memory Access (DMA) buffer, potentially leading to memory corruption across various Qualcomm Snapdragon products. This flaw may allow an attacker to exploit the system, affecting the integrity and stability of devices in automotive, consumer IoT, industrial IoT, and mobile categories.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-11T10:40:32.000Z,0 CVE-2021-30317,https://securityvulnerability.io/vulnerability/CVE-2021-30317,Image Verification Bypass in Qualcomm Snapdragon Products,"This vulnerability arises from improper validation of program headers that contain ELF metadata across various Qualcomm Snapdragon products. Attackers may exploit this flaw to bypass image verification, potentially leading to unauthorized access or execution of malicious code. It is crucial for users of affected Snapdragon platforms to apply necessary patches and updates to mitigate risks associated with this vulnerability.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",9.3,CRITICAL,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-02-11T10:40:21.000Z,0 CVE-2021-30313,https://securityvulnerability.io/vulnerability/CVE-2021-30313,Race Condition Vulnerability in Snapdragon Products by Qualcomm,"This vulnerability arises from a use-after-free condition triggered by a race condition in the creation and deletion of folders across various Snapdragon platforms. This flaw can lead to potential unauthorized access or data corruption, allowing an attacker to exploit the underlying systems mainly focused on connectivity and automotive applications. Proper patching and updates are essential to mitigate the risks associated with this security flaw.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-13T11:40:30.000Z,0 CVE-2021-30351,https://securityvulnerability.io/vulnerability/CVE-2021-30351,Out of Bound Memory Access in Qualcomm Snapdragon Products,"An out of bound memory access vulnerability exists in Qualcomm's Snapdragon products due to improper validation of the number of frames processed during music playback. This flaw can potentially allow attackers to exploit buffer overflow conditions, leading to unexpected behavior or crashes in affected devices. Security updates are recommended for all users of Snapdragon-based systems to mitigate potential risks associated with this vulnerability.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",9.8,CRITICAL,0.001879999996162951,false,,false,false,false,,,false,false,,2022-01-03T07:26:13.000Z,0 CVE-2021-30337,https://securityvulnerability.io/vulnerability/CVE-2021-30337,Use After Free Vulnerability in Qualcomm Snapdragon Products,"A possible use after free vulnerability exists when the memory associated with a process shell is freed while the process initialization is still in progress. This issue affects various Qualcomm Snapdragon products including Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking. Attackers exploiting this vulnerability might gain unauthorized access to sensitive data or execute arbitrary code, thus compromising the integrity and confidentiality of the system.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:26:10.000Z,0 CVE-2021-30335,https://securityvulnerability.io/vulnerability/CVE-2021-30335,Improper Validation Vulnerability in Qualcomm's Snapdragon Products,"This vulnerability arises from improper validation when multiple add or update requests are processed simultaneously within various Snapdragon platforms. This could potentially lead to assertion issues in QOS requests, impacting the overall functionality and security of devices relying on Snapdragon technology.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:26:07.000Z,0 CVE-2021-30303,https://securityvulnerability.io/vulnerability/CVE-2021-30303,Buffer Overflow Vulnerability in Qualcomm Snapdragon Products,"A potential buffer overflow vulnerability exists in Qualcomm's Snapdragon product line due to insufficient length checks when handling segmented Windows Management Instrumentation (WMI) commands. This flaw could allow unauthorized access or execution of arbitrary code, affecting a wide range of devices, including those utilized in automotive, consumer electronics, and industrial Internet of Things (IoT) solutions.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:26:06.000Z,0 CVE-2021-30279,https://securityvulnerability.io/vulnerability/CVE-2021-30279,Access Control Vulnerability in Qualcomm Snapdragon Products,"The vulnerability stems from improper permission masking when setting current permissions for VMIDs in various Snapdragon products. This oversight could allow unauthorized access or manipulation of system resources, posing a security risk to devices utilizing Snapdragon technology for compute, connectivity, and IoT functions. Users and developers are advised to implement available patches and monitor access controls to mitigate potential threats.",Qualcomm,"Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:25:56.000Z,0 CVE-2020-11263,https://securityvulnerability.io/vulnerability/CVE-2020-11263,Integer Overflow Vulnerability in Qualcomm Snapdragon Products,"This vulnerability involves an integer overflow that occurs due to inadequate validation after alignment checks of the address and size parameters in various Qualcomm Snapdragon products. This issue can compromise system integrity and potentially be exploited in systems utilizing these products, highlighting the need for users to apply necessary patches and updates.",Qualcomm,"Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wired Infrastructure And Networking",7.3,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-01-03T07:25:35.000Z,0 CVE-2021-30266,https://securityvulnerability.io/vulnerability/CVE-2021-30266,Use After Free Vulnerability in Qualcomm Snapdragon Products,"The vulnerability arises from improper memory validation when initializing a new interface via the Interface add command across multiple Qualcomm Snapdragon products. This flaw can potentially lead to exploitation, allowing an attacker to manipulate memory in unintended ways, which could result in unauthorized access or data leakage.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",6.7,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-11-12T06:16:01.000Z,0 CVE-2021-30259,https://securityvulnerability.io/vulnerability/CVE-2021-30259,Out of Bound Access in Qualcomm Snapdragon Products,"This vulnerability arises from inadequate validation of function table entries across various Snapdragon products, potentially leading to unauthorized access to memory. The affected Snapdragon platforms include Automotive, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, Wearables, and Wired Infrastructure and Networking. It is crucial for users and developers to take immediate steps to assess their systems and implement available security updates to mitigate the associated risks.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-11-12T06:15:55.000Z,0 CVE-2021-1903,https://securityvulnerability.io/vulnerability/CVE-2021-1903,Denial of Service Vulnerability in Snapdragon Products by Qualcomm,"A denial of service vulnerability exists due to insufficient length checks on the Channel Switch Announcement Information Element in the beacon or probe response frames of affected Snapdragon products. This can potentially allow attackers to exploit the flaw, leading to disrupted services and impaired functionality in various applications utilizing Snapdragon technology.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure And Networking",5.3,MEDIUM,0.0010600000387057662,false,,false,false,false,,,false,false,,2021-11-12T06:15:37.000Z,0 CVE-2021-30312,https://securityvulnerability.io/vulnerability/CVE-2021-30312,Improper Authentication Vulnerability in Qualcomm Snapdragon Products,"This vulnerability involves improper authentication of sub-frames within a multicast AMSDU frame, potentially exposing sensitive information across multiple Qualcomm Snapdragon products. Affected devices span various categories, including automotive, computing, connectivity, consumer IoT, industrial IoT, mobile, voice and music, wearables, and network infrastructure, allowing for unintentional data leaks that can compromise user privacy and data integrity.",Qualcomm,"Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.002139999996870756,false,,false,false,false,,,false,false,,2021-10-20T06:31:52.000Z,0 CVE-2021-30302,https://securityvulnerability.io/vulnerability/CVE-2021-30302,Improper Authentication Vulnerability in Qualcomm Snapdragon Products,"This vulnerability arises from the improper authentication of EAP WAPI EAPOL frames when they are sent by unauthenticated users. This flaw could potentially allow these users to gain unauthorized access to sensitive information within various Qualcomm Snapdragon products. With numerous devices relying on Snapdragon technology, this vulnerability poses a significant risk to data integrity and user privacy across several applications, including computing, connectivity, and IoT. It is crucial for users and organizations using these affected Snapdragon products to assess the potential impact and implement mitigations as recommended.",Qualcomm,"Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer Iot, Snapdragon Industrial Iot, Snapdragon Mobile, Snapdragon Wired Infrastructure And Networking",7.5,HIGH,0.0015399999683722854,false,,false,false,false,,,false,false,,2021-10-20T06:31:44.000Z,0