Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables — Vulnerabilities & Security Advisories 73

All 73 CVE vulnerabilities found in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, with AI-generated Chinese analysis, references, and POCs.

This page aggregates Common Weakness Enumerations (CWE) associated with Qualcomm’s Snapdragon ecosystem, covering Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, Mobile, Voice & Music, and Wearables product lines. It collects security advisories and vulnerability reports that highlight flaws in these hardware and software components, spanning a wide historical range from initial public disclosures to recent updates. By centralizing this information, the resource allows users to efficiently track Qualcomm’s security advisory patterns, gain deeper insights into specific weakness classes affecting Snapdragon platforms, and investigate the vulnerability history of individual products. The data is structured to facilitate analysis of recurring issues, helping developers, security researchers, and system integrators understand the risk landscape. Users can identify common attack surfaces, review patch availability, and assess the severity of reported defects. This aggregation serves as a comprehensive reference for understanding the security posture of Qualcomm’s diverse product portfolio. The content is organized to support both broad trend analysis and detailed product-specific queries, ensuring that stakeholders have access to the necessary context for risk management and mitigation planning. All entries are categorized by product type and weakness type to streamline navigation and improve the utility of the information for technical audiences seeking to enhance the security of systems utilizing Snapdragon components.

Vendor: Qualcomm, Inc.

CVE IDTitleCVSSSeverityPublished
CVE-2021-30262 Qualcomm Chipsets 资源管理错误漏洞 8.4 High2022-01-03
CVE-2021-30265 多款Qualcomm产品缓冲区错误漏洞 6.7 Medium2021-11-12
CVE-2021-1967 多款Qualcomm产品缓冲区错误漏洞 5.3 Medium2021-10-20
CVE-2021-1963 Qualcomm 芯片 资源管理错误漏洞 6.7 Medium2021-09-09
CVE-2021-1961 Qualcomm 芯片缓冲区错误漏洞 6.7 Medium2021-09-09
CVE-2021-1904 Qualcomm 芯片信息泄露漏洞 6.2 Medium2021-09-08
CVE-2021-1900 Google Android资源管理错误漏洞 8.4 High2021-06-09
CVE-2020-11262 高通 Qualcomm Graphics 资源管理错误漏洞 7.0 -2021-06-09
CVE-2020-11261 高通 Qualcomm Graphics 输入验证错误漏洞 7.8 -2021-06-09
CVE-2020-11240 高通 Qualcomm Camera Driver 资源管理错误漏洞 7.8 -2021-06-09
CVE-2020-11239 高通 Qualcomm Graphics 资源管理错误漏洞 7.8 -2021-06-09
CVE-2021-1910 Qualcomm 多款产品资源管理错误漏洞 7.3 High2021-05-07
CVE-2021-1906 Qualcomm 组件安全漏洞 6.2 Medium2021-05-07
CVE-2021-1905 Qualcomm 组件资源管理错误漏洞 8.4 High2021-05-07
CVE-2020-11309 GPU driver 资源管理错误漏洞 7.8 -2021-03-17
CVE-2020-11299 Qualcomm 封闭源组件缓冲区错误漏洞 9.8 -2021-03-17
CVE-2020-11283 Qualcomm Video 缓冲区错误漏洞 9.8 -2021-02-22
CVE-2020-11282 Qualcomm Graphics 访问控制错误漏洞 7.8 -2021-02-22
CVE-2020-11216 多款Qualcomm产品输入验证错误漏洞 9.8 -2021-01-21
CVE-2020-11197 多款Qualcomm产品输入验证错误漏洞 9.8 -2021-01-21
CVE-2020-11179 Qualcomm Adreno GPU缓冲区错误漏洞 6.3 -2021-01-21
CVE-2020-11167 多款Qualcomm产品输入验证错误漏洞 9.8 -2021-01-21
CVE-2020-11149 多款Qualcomm产品缓冲区错误漏洞 6.7 -2021-01-21
CVE-2020-11150 多款Qualcomm产品缓冲区错误漏洞 6.7 -2021-01-21
CVE-2020-11146 多款Qualcomm产品输入验证错误漏洞 6.7 -2021-01-21
CVE-2020-3688 多款Qualcomm产品缓冲区错误漏洞 9.8 -2020-07-30
CVE-2020-3663 多款Qualcomm产品缓冲区错误漏洞 9.8 -2020-06-22
CVE-2020-3661 多款Qualcomm产品缓冲区错误漏洞 9.8 -2020-06-22
CVE-2020-3662 多款Qualcomm产品缓冲区错误漏洞 9.8 -2020-06-22
CVE-2020-3658 多款Qualcomm产品代码问题漏洞 9.8 -2020-06-22

All 73 known CVE vulnerabilities affecting Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables with full Chinese analysis, references, and POCs where available.