Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables — Vulnerabilities & Security Advisories 22

All 22 CVE vulnerabilities found in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, with AI-generated Chinese analysis, references, and POCs.

Vendor: Qualcomm, Inc.

CVE IDTitleCVSSSeverityPublished
CVE-2022-33234 Google Android 缓冲区错误漏洞 7.3 High2022-11-15
CVE-2022-25741 Google Android 代码问题漏洞 7.5 High2022-11-15
CVE-2022-25664 Google Pixel 信息泄露漏洞 6.2 Medium2022-10-12
CVE-2022-25662 Google Pixel 缓冲区错误漏洞 5.3 Medium2022-10-12
CVE-2022-22078 Google Pixel 输入验证错误漏洞 4.6 Medium2022-10-12
CVE-2022-25706 Google Android 缓冲区错误漏洞 8.2 High2022-09-16
CVE-2022-22091 Google Android 安全漏洞 7.5 High2022-09-16
CVE-2021-35132 Qualcomm 芯片缓冲区错误漏洞 8.4 High2022-09-02
CVE-2021-35122 Qualcomm 芯片输入验证错误漏洞 9.3 Critical2022-09-02
CVE-2021-35116 Qualcomm 输入验证错误漏洞 7.7 High2022-06-14
CVE-2021-35078 Qualcomm多款产品 安全漏洞 7.5 High2022-06-14
CVE-2021-30331 Qualcomm 芯片 信息泄露漏洞 5.5 Medium2022-04-01
CVE-2021-30314 多款Qualcomm产品信息泄露漏洞 6.2 Medium2022-01-13
CVE-2021-30295 Qualcomm 芯片 缓冲区错误漏洞 8.4 High2021-09-09
CVE-2021-1929 Qualcomm 芯片安全漏洞 6.2 Medium2021-09-08
CVE-2020-11294 Qualcomm 组件输入验证错误漏洞 5.9 Medium2021-05-07
CVE-2020-11290 Qualcomm 组件资源管理错误漏洞 7.0 -2021-03-17
CVE-2020-11148 多款Qualcomm产品资源管理错误漏洞 6.7 -2021-01-21
CVE-2020-3673 多款Qualcomm产品安全漏洞 9.8 -2020-11-02
CVE-2020-3654 多款Qualcomm产品安全漏洞 9.8 -2020-11-02
CVE-2018-11967 多款Qualcomm产品权限许可和访问控制问题漏洞 7.8 -2019-05-24
CVE-2018-13899 多款Qualcomm产品Video Driver 资源管理错误漏洞 7.8 -2019-05-24

All 22 known CVE vulnerabilities affecting Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables with full Chinese analysis, references, and POCs where available.