Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Qualcomm:
>> Snapdragon W5+ Gen 1 Firmware
Security Vulnerabilities
CVE-2024-38426
While processing the authentication message in UE, improper authentication may lead to information disclosure.
CVSS Score
5.4
EPSS Score
0.001
Published
2025-03-03
CVE-2024-43051
Information disclosure while deriving keys for a session for any Widevine use case.
CVSS Score
5.5
EPSS Score
0.0
Published
2025-03-03
CVE-2024-33045
Memory corruption when BTFM client sends new messages over Slimbus to ADSP.
CVSS Score
8.4
EPSS Score
0.0
Published
2024-09-02
CVE-2023-28565
Memory corruption in WLAN HAL while handling command streams through WMI interfaces.
CVSS Score
7.8
EPSS Score
0.001
Published
2023-09-05
CVE-2023-28567
Memory corruption in WLAN HAL while handling command through WMI interfaces.
CVSS Score
7.8
EPSS Score
0.001
Published
2023-09-05
CVE-2023-33021
Memory corruption in Graphics while processing user packets for command submission.
CVSS Score
8.4
EPSS Score
0.0
Published
2023-09-05
CVE-2023-28564
Memory corruption in WLAN HAL while passing command parameters through WMI interfaces.
CVSS Score
7.8
EPSS Score
0.0
Published
2023-09-05
CVE-2023-28575
The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it.
CVSS Score
6.7
EPSS Score
0.0
Published
2023-08-08
CVE-2023-21629
Memory Corruption in Modem due to double free while parsing the PKCS15 sim files.
CVSS Score
6.8
EPSS Score
0.001
Published
2023-07-04
CVE-2023-21631
Weak Configuration due to improper input validation in Modem while processing LTE security mode command message received from network.
CVSS Score
7.5
EPSS Score
0.001
Published
2023-07-04
Next
Page 1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved