Vulnerabilities
Vulnerable Software
Qualcomm:  Security Vulnerabilities
Memory corruption can occur when process-specific maps are added to the global list. If a map is removed from the global list while another thread is using it for a process-specific task, issues may arise.
CVSS Score
7.8
EPSS Score
0.0
Published
2025-01-06
Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.
CVSS Score
8.4
EPSS Score
0.0
Published
2025-01-06
Transient DOS can occur when the driver parses the per STA profile IE and tries to access the EXTN element ID without checking the IE length.
CVSS Score
7.5
EPSS Score
0.001
Published
2025-01-06
Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend.
CVSS Score
5.5
EPSS Score
0.0
Published
2025-01-06
Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU.
CVSS Score
7.5
EPSS Score
0.0
Published
2025-01-06
Memory corruption when IOCTL call is invoked from user-space to read board data.
CVSS Score
7.8
EPSS Score
0.0
Published
2025-01-06
Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver.
CVSS Score
7.8
EPSS Score
0.0
Published
2025-01-06
Memory corruption while processing FIPS encryption or decryption IOCTL call invoked from user-space.
CVSS Score
7.8
EPSS Score
0.0
Published
2025-01-06
Memory corruption while processing IOCTL call invoked from user-space to verify non extension FIPS encryption and decryption functionality.
CVSS Score
7.8
EPSS Score
0.0
Published
2025-01-06
Memory corruption while processing FIPS encryption or decryption validation functionality IOCTL call.
CVSS Score
7.8
EPSS Score
0.0
Published
2025-01-06


Contact Us

Shodan ® - All rights reserved