Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables — Vulnerabilities & Security Advisories 73

All 73 CVE vulnerabilities found in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, with AI-generated Chinese analysis, references, and POCs.

This page aggregates Common Weakness Enumerations (CWE) associated with Qualcomm’s Snapdragon ecosystem, covering Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables product lines. It collects security advisories and vulnerability reports that highlight flaws in these hardware and software components, spanning a wide historical range from initial public disclosures to recent updates. By centralizing this information, the resource allows users to efficiently track Qualcomm’s security advisory patterns, gain deeper insights into specific weakness classes affecting Snapdragon platforms, and investigate the vulnerability history of individual products. The data is structured to facilitate analysis of recurring issues, helping developers, security researchers, and system integrators understand the risk landscape. Users can identify common attack surfaces, review patch availability, and assess the severity of reported defects. This aggregation serves as a comprehensive reference for understanding the security posture of Qualcomm’s diverse product portfolio. The content is organized to support both broad trend analysis and detailed product-specific queries, ensuring that stakeholders have access to the necessary context for risk management and mitigation planning. All entries are categorized by product type and weakness type to streamline navigation and improve the utility of the information for technical audiences seeking to enhance the security of systems utilizing Snapdragon components.

Vendor: Qualcomm, Inc.

CVE IDTitleCVSSSeverityPublished
CVE-2022-25682 Google Pixel 缓冲区错误漏洞 8.4 High2022-12-13
CVE-2022-25743 Google Android 资源管理错误漏洞 8.4 High2022-11-15
CVE-2022-25724 Google Android 安全漏洞 8.4 High2022-11-15
CVE-2022-25687 Google Pixel 安全漏洞 7.3 High2022-10-19
CVE-2022-25688 Google Android 安全漏洞 7.3 High2022-09-16
CVE-2022-25669 Google Android 缓冲区错误漏洞 7.5 High2022-09-16
CVE-2022-22074 Google Android 输入验证错误漏洞 8.4 High2022-09-16
CVE-2022-22066 Google Android 缓冲区错误漏洞 8.4 High2022-09-16
CVE-2022-25668 Google Android 资源管理错误漏洞 7.3 High2022-09-02
CVE-2022-25659 Qualcomm 芯片缓冲区错误漏洞 7.3 High2022-09-02
CVE-2022-25658 Qualcomm 芯片缓冲区错误漏洞 7.3 High2022-09-02
CVE-2022-22070 Google Pixel 缓冲区错误漏洞 7.8 High2022-09-02
CVE-2021-35135 Qualcomm 芯片代码问题漏洞 6.2 Medium2022-09-02
CVE-2021-35097 Qualcomm 芯片数据伪造问题漏洞 7.3 High2022-09-02
CVE-2021-35112 多款Qualcomm产品访问控制错误漏洞 8.4 High2022-06-14
CVE-2021-35100 多款Qualcomm产品缓冲区错误漏洞 7.5 High2022-06-14
CVE-2021-30344 Qualcomm 芯片 安全漏洞 7.5 High2022-06-14
CVE-2022-22068 多款Qualcomm产品资源管理错误漏洞 8.4 High2022-06-14
CVE-2021-35098 Qualcomm 缓冲区错误漏洞 6.7 Medium2022-06-14
CVE-2022-22087 多款Qualcomm产品缓冲区错误漏洞 7.3 High2022-06-14
CVE-2022-22086 多款Qualcomm产品资源管理错误漏洞 7.3 High2022-06-14
CVE-2022-22085 Qualcomm 缓冲区错误漏洞 8.4 High2022-06-14
CVE-2022-22084 Qualcomm 缓冲区错误漏洞 8.4 High2022-06-14
CVE-2022-22083 Qualcomm 缓冲区错误漏洞 7.5 High2022-06-14
CVE-2022-22082 Qualcomm 缓冲区错误漏洞 8.4 High2022-06-14
CVE-2021-35118 Qualcomm 缓冲区错误漏洞 6.7 Medium2022-06-14
CVE-2021-35106 Qualcomm 芯片 缓冲区错误漏洞 7.8 High2022-04-01
CVE-2021-35105 Qualcomm 芯片代码问题漏洞 8.4 High2022-04-01
CVE-2021-30333 Qualcomm 芯片缓冲区错误漏洞 7.8 High2022-04-01
CVE-2021-30268 Qualcomm 芯片安全漏洞 7.8 High2022-01-03

All 73 known CVE vulnerabilities affecting Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables with full Chinese analysis, references, and POCs where available.