Filter
-Infinity
0

Androidu'An Unaligned address or size can propagate to the database due to improper page permissions and ca…

7.8
First published (updated )

Androidu'Due to an incorrect SMMU configuration, the modem crypto engine can potentially compromise the hyp…

7.8
First published (updated )

Qualcomm SDM429Wu'Out of bound access can happen in MHI command process due to lack of check of channel id value rec…

7.8
First published (updated )

Androidu'QSEE reads the access permission policy for the SMEM TOC partition from the SMEM TOC contents popu…

7.8
First published (updated )

Qualcomm SDM429Wu'Potential out of bounds read while processing downlink NAS transport message due to improper lengt…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

AndroidInput Validation

First published (updated )

Qualcomm SDM429WOut-of-bounds Read, Buffer Overflow

First published (updated )

Qualcomm SDM429WBuffer Overflow

7.8
First published (updated )

Qualcomm SDM429WOut-of-bounds Read, Buffer Overflow

First published (updated )

Androidu'Third-party app may also call the broadcasts in Perfdump and cause privilege escalation issue due …

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

AndroidInput Validation

7.8
First published (updated )

AndroidBuffer Overflow, Input Validation

First published (updated )

Qualcomm SDM429WUse After Free, Race Condition

First published (updated )

Qualcomm Bitrau'During execution after Address Space Layout Randomization is turned on for QTEE, part of code is s…

First published (updated )

Androidu'Reachable assertion when wrong data size is returned by parser for ape clips' in Snapdragon Auto, …

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Androidu'Stack out of bound issue occurs when making query to DSP capabilities due to wrong assumption was …

7.8
First published (updated )

Androidu'Improper access control can lead signed process to guess pid of other processes and access their a…

7.8
First published (updated )

Qualcomm SDM429WInteger Underflow

First published (updated )

AndroidOut-of-bounds Read

7.8
First published (updated )

Qualcomm APQ8017Input Validation

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

AndroidUse After Free

7.8
First published (updated )

Qualcomm SDM429WOut of bound access can happen in MHI command process due to lack of check of command channel id val…

7.8
First published (updated )

AndroidOut-of-bounds Read

7.8
First published (updated )

AndroidInput Validation

7.1
First published (updated )

Qualcomm SDM429WInteger Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Androidu'Out of bound memory access if stack push and pop operation are performed without doing a bound che…

7.8
First published (updated )

Qualcomm MSM8909WInteger Overflow, Input Validation

7.8
First published (updated )

Qualcomm SDM429WInteger Overflow

7.8
First published (updated )

Qualcomm SDM429WInput Validation

First published (updated )

Qualcomm SDM429WInteger Overflow

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203