Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear — Vulnerabilities & Security Advisories 129

All 129 CVE vulnerabilities found in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear, with AI-generated Chinese analysis, references, and POCs.

This page is a vulnerability aggregation resource for Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear products, focusing on common weakness enumeration and security advisories. It systematically collects and catalogs reported security flaws affecting these specific silicon platforms, covering a comprehensive time range from initial discoveries through recent updates. This collection includes various vulnerability types such as buffer overflows, privilege escalation flaws, and information disclosure issues that impact the integrity and confidentiality of devices utilizing these Snapdragon chipsets. By aggregating data from multiple sources, the page provides a unified view of the security landscape for these mobile and automotive solutions. Readers can use this resource to track vendor advisories from Qualcomm, allowing for timely patching and risk mitigation strategies. Furthermore, the organized data helps users understand specific weakness classes prevalent in the Snapdragon ecosystem, facilitating deeper technical analysis of root causes and potential impacts. The page also serves as a historical reference, enabling developers and security professionals to look up a product's vulnerability history and assess long-term security trends. This approach supports informed decision-making for device manufacturers and end-users alike. The content is structured to enhance visibility into known defects, aiding in the prioritization of remediation efforts across diverse deployment scenarios. Whether for automotive infotainment systems or handheld mobile devices, this aggregation streamlines the process of staying informed about critical security updates and maintaining robust protection against emerging threats.

Vendor: Qualcomm, Inc.

CVE IDTitleCVSSSeverityPublished
CVE-2015-9180 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9181 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9182 Android Qualcomm闭源组件输入验证漏洞 9.8 -2018-04-18
CVE-2015-9184 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9185 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9186 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9187 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9188 Android Qualcomm闭源组件Secure DEMUX command handler 缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9192 Android Qualcomm闭源组件安全漏洞 9.8 -2018-04-18
CVE-2015-9193 Android Qualcomm闭源组件输入验证漏洞 9.8 -2018-04-18
CVE-2015-9198 Android Qualcomm闭源组件数字错误漏洞 9.8 -2018-04-18
CVE-2015-9201 Android Qualcomm闭源组件数字错误漏洞 9.8 -2018-04-18
CVE-2015-9202 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9203 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2015-9210 Android Qualcomm闭源组件输入验证漏洞 9.8 -2018-04-18
CVE-2015-9211 Android Qualcomm闭源组件输入验证漏洞 9.8 -2018-04-18
CVE-2016-10417 Android Qualcomm闭源组件竞争条件漏洞 9.8 -2018-04-18
CVE-2016-10418 Android Qualcomm闭源组件访问控制错误漏洞 9.1 -2018-04-18
CVE-2016-10424 Android Qualcomm闭源组件安全漏洞 9.8 -2018-04-18
CVE-2016-10425 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2016-10431 Android Qualcomm闭源组件输入验证漏洞 9.8 -2018-04-18
CVE-2016-10433 Android Qualcomm闭源组件竞争条件漏洞 9.8 -2018-04-18
CVE-2016-10435 Android Qualcomm闭源组件QTEE syscall handler 竞争条件漏洞 9.8 -2018-04-18
CVE-2016-10443 Android Qualcomm闭源组件安全特征问题漏洞 9.8 -2018-04-18
CVE-2016-10444 Android Qualcomm闭源组件访问控制错误漏洞 9.8 -2018-04-18
CVE-2016-10446 Android Qualcomm闭源组件配置错误漏洞 9.1 -2018-04-18
CVE-2016-10469 Android Qualcomm闭源组件输入验证漏洞 9.8 -2018-04-18
CVE-2016-10474 Android Qualcomm闭源组件缓冲区错误漏洞 9.8 -2018-04-18
CVE-2016-10484 Android Qualcomm闭源组件缓冲区溢出漏洞 9.8 -2018-04-18
CVE-2016-10487 Android Qualcomm闭源组件安全漏洞 9.8 -2018-04-18

All 129 known CVE vulnerabilities affecting Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear with full Chinese analysis, references, and POCs where available.