Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities328536
CVE-2025-11340
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-7.7||HIGH
EPSS-0.02% / 3.55%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:04
Updated-20 Oct, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in GitLab

GitLab has remediated an issue in GitLab EE affecting all versions from 18.3 to 18.3.4, 18.4 to 18.4.2 that, under certain conditions, could have allowed authenticated users with read-only API tokens to perform unauthorized write operations on vulnerability records by exploiting incorrectly scoped GraphQL mutations.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-2934
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 34.83%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 11:33
Updated-20 Oct, 2025 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Allocation of Resources Without Limits or Throttling in GitLab

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 5.2 prior to 18.2.8, 18.3 prior to 18.3.4, and 18.4 prior to 18.4.2 that could have allowed an authenticated attacker to create a denial of service condition by configuring malicious webhook endpoints that send crafted HTTP responses.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-9371
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 13.08%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 11:20
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Betheme <= 28.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'page_title'

The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘page_title’ parameter in all versions up to, and including, 28.1.6 due to insufficient input sanitization and output escaping of theme breadcrumbs. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-Muffin Group
Product-Betheme
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-10249
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.20%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 11:20
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Slider Revolution <= 6.7.37 - Missing Authorization to Authenticated (Contributor+) Arbitrary File Read

The Slider Revolution plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on several functions in all versions up to, and including, 6.7.37. This makes it possible for authenticated attackers, with Contributor-level access and above, to install and activate plugin add-ons, create sliders, and download arbitrary files.

Action-Not Available
Vendor-Revolution Slider
Product-Slider Revolution
CWE ID-CWE-23
Relative Path Traversal
CVE-2025-39959
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 7.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASoC: amd: acp: Fix incorrect retrival of acp_chip_info

In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: acp: Fix incorrect retrival of acp_chip_info Use dev_get_drvdata(dev->parent) instead of dev_get_platdata(dev) to correctly obtain acp_chip_info members in the acp I2S driver. Previously, some members were not updated properly due to incorrect data access, which could potentially lead to null pointer dereferences. This issue was missed in the earlier commit ("ASoC: amd: acp: Fix NULL pointer deref in acp_i2s_set_tdm_slot"), which only addressed set_tdm_slot(). This change ensures that all relevant functions correctly retrieve acp_chip_info, preventing further null pointer dereference issues.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39958
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 7.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-02 Jan, 2026 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iommu/s390: Make attach succeed when the device was surprise removed

In the Linux kernel, the following vulnerability has been resolved: iommu/s390: Make attach succeed when the device was surprise removed When a PCI device is removed with surprise hotplug, there may still be attempts to attach the device to the default domain as part of tear down via (__iommu_release_dma_ownership()), or because the removal happens during probe (__iommu_probe_device()). In both cases zpci_register_ioat() fails with a cc value indicating that the device handle is invalid. This is because the device is no longer part of the instance as far as the hypervisor is concerned. Currently this leads to an error return and s390_iommu_attach_device() fails. This triggers the WARN_ON() in __iommu_group_set_domain_nofail() because attaching to the default domain must never fail. With the device fenced by the hypervisor no DMAs to or from memory are possible and the IOMMU translations have no effect. Proceed as if the registration was successful and let the hotplug event handling clean up the device. This is similar to how devices in the error state are handled since commit 59bbf596791b ("iommu/s390: Make attach succeed even if the device is in error state") except that for removal the domain will not be registered later. This approach was also previously discussed at the link. Handle both cases, error state and removal, in a helper which checks if the error needs to be propagated or ignored. Avoid magic number condition codes by using the pre-existing, but never used, defines for PCI load/store condition codes and rename them to reflect that they apply to all PCI instructions.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39957
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 9.17%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-02 Jan, 2026 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wifi: mac80211: increase scan_ies_len for S1G

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: increase scan_ies_len for S1G Currently the S1G capability element is not taken into account for the scan_ies_len, which leads to a buffer length validation failure in ieee80211_prep_hw_scan() and subsequent WARN in __ieee80211_start_scan(). This prevents hw scanning from functioning. To fix ensure we accommodate for the S1G capability length.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39956
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 6.23%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
igc: don't fail igc_probe() on LED setup error

In the Linux kernel, the following vulnerability has been resolved: igc: don't fail igc_probe() on LED setup error When igc_led_setup() fails, igc_probe() fails and triggers kernel panic in free_netdev() since unregister_netdev() is not called. [1] This behavior can be tested using fault-injection framework, especially the failslab feature. [2] Since LED support is not mandatory, treat LED setup failures as non-fatal and continue probe with a warning message, consequently avoiding the kernel panic. [1] kernel BUG at net/core/dev.c:12047! Oops: invalid opcode: 0000 [#1] SMP NOPTI CPU: 0 UID: 0 PID: 937 Comm: repro-igc-led-e Not tainted 6.17.0-rc4-enjuk-tnguy-00865-gc4940196ab02 #64 PREEMPT(voluntary) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:free_netdev+0x278/0x2b0 [...] Call Trace: <TASK> igc_probe+0x370/0x910 local_pci_probe+0x3a/0x80 pci_device_probe+0xd1/0x200 [...] [2] #!/bin/bash -ex FAILSLAB_PATH=/sys/kernel/debug/failslab/ DEVICE=0000:00:05.0 START_ADDR=$(grep " igc_led_setup" /proc/kallsyms \ | awk '{printf("0x%s", $1)}') END_ADDR=$(printf "0x%x" $((START_ADDR + 0x100))) echo $START_ADDR > $FAILSLAB_PATH/require-start echo $END_ADDR > $FAILSLAB_PATH/require-end echo 1 > $FAILSLAB_PATH/times echo 100 > $FAILSLAB_PATH/probability echo N > $FAILSLAB_PATH/ignore-gfp-wait echo $DEVICE > /sys/bus/pci/drivers/igc/bind

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39955
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.05% / 16.75%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().

In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSPEC) 3. connect() to another destination As of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes it to TCP_CLOSE and makes connect() possible, which restarts timers. Since tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the retransmit timer triggered the warning and the intended packet was not retransmitted. Let's call reqsk_fastopen_remove() in tcp_disconnect(). [0]: WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Modules linked in: CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Code: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 <0f> 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e RSP: 0018:ffffc900002f8d40 EFLAGS: 00010293 RAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017 RDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400 RBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8 R10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540 R13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0 FS: 0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0 Call Trace: <IRQ> tcp_write_timer (net/ipv4/tcp_timer.c:738) call_timer_fn (kernel/time/timer.c:1747) __run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372) timer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135) tmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035) __walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1)) tmigr_handle_remote (kernel/time/timer_migration.c:1096) handle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580) irq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696) sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35)) </IRQ>

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39954
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 7.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
clk: sunxi-ng: mp: Fix dual-divider clock rate readback

In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: mp: Fix dual-divider clock rate readback When dual-divider clock support was introduced, the P divider offset was left out of the .recalc_rate readback function. This causes the clock rate to become bogus or even zero (possibly due to the P divider being 1, leading to a divide-by-zero). Fix this by incorporating the P divider offset into the calculation.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-10862
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.39%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 08:23
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers <= 2.1.3 - Unauthenticated SQL Injection via 'id'

The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 2.1.3. This is due to insufficient escaping on the 'id' parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Action-Not Available
Vendor-roxnor
Product-Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-11522
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.32% / 54.74%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 07:23
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Search & Go - Directory WordPress Theme <= 2.7 - Authentication Bypass to Privilege Escalation via Account Takeover

The Search & Go - Directory WordPress Theme theme for WordPress is vulnerable to Authentication Bypass via account takeover in all versions up to, and including, 2.7. This is due to insufficient user validation in the search_and_go_elated_check_facebook_user() function This makes it possible for unauthenticated attackers to gain access to other user's accounts, including administrators, when Facebook login is enabled.

Action-Not Available
Vendor-Elated-Themes
Product-Search & Go - Directory WordPress Theme
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-11539
Assigner-Grafana Labs
ShareView Details
Assigner-Grafana Labs
CVSS Score-9.9||CRITICAL
EPSS-0.39% / 59.43%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 07:18
Updated-10 Oct, 2025 | 05:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Code Execution in Grafana Image Renderer Plugin

Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.

Action-Not Available
Vendor-Grafana Labs
Product-grafana-image-renderer
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-7634
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.57% / 68.13%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 05:23
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Travel Engine – Tour Booking Plugin – Tour Operator Software <= 6.6.7 - Unauthenticated Local File Inclusion

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 6.6.7 via the mode parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

Action-Not Available
Vendor-wptravelengine
Product-WP Travel Engine – Tour Booking Plugin – Tour Operator Software
CWE ID-CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CVE-2025-7526
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-1.07% / 77.31%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 05:23
Updated-09 Oct, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Travel Engine – Tour Booking Plugin – Tour Operator Software <= 6.6.7 - Authenticated (Subscriber+) Arbitrary File Deletion via File Renaming

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to arbitrary file deletion (via renaming) due to insufficient file path validation in the set_user_profile_image function in all versions up to, and including, 6.6.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

Action-Not Available
Vendor-wptravelengine
Product-WP Travel Engine – Tour Booking Plugin – Tour Operator Software
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-11530
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.01%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:32
Updated-09 Oct, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Online Complaint Site state.php sql injection

A weakness has been identified in code-projects Online Complaint Site 1.0. Affected is an unknown function of the file /cms/admin/state.php. This manipulation of the argument state causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Action-Not Available
Vendor-Fabian RosSource Code & Projects
Product-online_complaint_siteOnline Complaint Site
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-6038
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.8||HIGH
EPSS-0.06% / 18.44%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:23
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme <= 1.4.0 - Authenticated (Subscriber+) Privilege Escalation

The Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation via password update in all versions up to, and including, 1.4.0. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's passwords, including those of administrators.

Action-Not Available
Vendor-pebas
Product-Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-47355
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in DSP Service

Memory corruption while invoking remote procedure IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcn3980_firmwarewcd9380_firmwarewcn3680b_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcn3660bwcn3680bxg101039fastconnect_6900qcc2072_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwarewsa8830wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcn3980wcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)x2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarefastconnect_6700_firmwarexg101002_firmwarex2000092_firmwarewcn3660b_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47354
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Service

Memory corruption while allocating buffers in DSP service.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qmp1000sm8750p_firmwaresm6475_firmwarewcn7861sm7435_firmwaresm8750psnapdragon_4_gen_2_mobile_platform_firmwarewcd9385wsa8845sw5100p_firmwarewsa8835_firmwarewsa8810fastconnect_7800_firmwaresm8750_firmwarewcn7881wcn7880_firmwarewsa8835wcd9395wcd9378_firmwarewcn7750wcn7860wcn7881_firmwarefastconnect_6700wsa8830wsa8840sm8735wcd9385_firmwaresw5100psnapdragon_6_gen_1_mobile_platformsnapdragon_w5\+_gen_1_wearable_platform_firmwarewsa8830_firmwarewsa8832_firmwarewcn6755_firmwarefastconnect_6700_firmwarewcd9375_firmwarewcn3988_firmwarewcn7860_firmwarewcd9380wcd9378sw5100wsa8832sxr2350pwcn3950_firmwarewcd9375fastconnect_6200_firmwarewcd9380_firmwaresm8735_firmwarefastconnect_7800snapdragon_6_gen_1_mobile_platform_firmwarewsa8815wcd9370sm7435sm6475wsa8815_firmwaresxr2330pwcd9395_firmwarewcn6755wsa8845hsw5100_firmwarewcn7880wcn3988sxr2330p_firmwarewsa8845_firmwaresnapdragon_4_gen_2_mobile_platformfastconnect_6200wcd9370_firmwarewsa8840_firmwarewcn7750_firmwareqmp1000_firmwaresnapdragon_w5\+_gen_1_wearable_platformsm8750wcn3950wsa8810_firmwarewcn7861_firmwarewsa8845h_firmwaresxr2350p_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47351
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in DSP Service

Memory corruption while processing user buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sg6150wsa8832sg6150psm8750p_firmwarewcn3950_firmwarewcd9375sm8750pwcn7861fastconnect_6200_firmwaresg6150_firmwarewsa8845wcd9385wsa8835_firmwarewsa8810fastconnect_7800sm8850fastconnect_7800_firmwaresm8750_firmwarewcn7881wcn7880_firmwarewsa8815wsa8835wcd9395wcd9370wsa8815_firmwarefastconnect_6900sg6150p_firmwarewcd9395_firmwaresm8850_firmwarewsa8810_firmwarewcn7860wcn7881_firmwarewsa8845hfastconnect_6700wcn3988wsa8830wsa8840wsa8845_firmwarefastconnect_6200wcd9370_firmwarewsa8840_firmwarewcd9385_firmwaresm8850p_firmwarewsa8830_firmwarewsa8832_firmwarefastconnect_6900_firmwarefastconnect_6700_firmwarewcd9375_firmwarewcn3988_firmwaresm8750wcn7860_firmwarewcn3950wcn7880wcn7861_firmwarewsa8845h_firmwaresm8850pSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-47349
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in DSP Service

Memory corruption while processing an escape call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2025-47347
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-21 Oct, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Automotive Software platform based on QNX

Memory corruption while processing control commands in the virtual memory management interface.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa8155_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa6155sa8650psa8195psrv1mqam8775psa6155_firmwareqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255psa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255pqca6574asa8145pqam8620psrv1hsa6150p_firmwareqca6574a_firmwareqca6698aqqamsrv1msa8540psa8155sa8295p_firmwareqam8650p_firmwareSnapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-47342
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.06% / 17.32%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-21 Oct, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in BT Controller

Transient DOS may occur when multi-profile concurrency arises with QHS enabled.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc7225s5_sound_platform_firmwareqcc7225_firmwares5_gen_2_sound_platformqcc7228qcc5161qcc5161_firmwares3_gen_2_sound_platform_firmwareqcc7226qcc7228_firmwareqcc7226_firmwares5_gen_2_sound_platform_firmwares5_sound_platforms3_sound_platform_firmwares3_sound_platforms3_gen_2_sound_platformSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47341
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Camera

memory corruption while processing an image encoding completion event.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwareqcs6490wcd9375video_collaboration_vc3_platformwcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwareqcs5430x2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcd9370xg101039fastconnect_6900qcc2072_firmwareqcm6490_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwareqcs5430_firmwareqcm6490wsa8830wsa8840wsa8845_firmwarewcd9370_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwarex2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430wcd9375_firmwarex2000092_firmwarexg101002_firmwareqcs6490_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47340
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in DSP Service

Memory corruption while processing IOCTL call to get the mapping.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47338
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in DSP Service

Memory corruption while processing escape commands from userspace.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2025-27060
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-21 Oct, 2025 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in TZ Firmware

Memory corruption while performing SCM call with malformed inputs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9072_firmwareqcn9100_firmwareqcn9070ipq5010_firmwareqcn9001ipq5010qcn6102qcn9003_firmwareqcn9024_firmwareqcn9000_firmwareqcn6102_firmwareqcn9000qcn6023qcn9274qcn9022_firmwareqcn9070_firmwareimmersive_home_316_platform_firmwareqcn6023_firmwareipq5028_firmwareimmersive_home_214_platformqcn6132qcn9012qcn6112qcn6024_firmwareqcn9074_firmwareqcn9100qcn9024qcn9012_firmwareqcn9022qcn9003immersive_home_316_platformqcn6112_firmwareqcn6024qcn9274_firmwareimmersive_home_214_platform_firmwareimmersive_home_216_platformqcn6122ipq5028qcn6132_firmwareimmersive_home_318_platform_firmwareqcn6100_firmwareqcn6122_firmwareqcn6100qcn9002_firmwareimmersive_home_216_platform_firmwareimmersive_home_318_platformqcn9072qcn9001_firmwareqcn9074qcn9002Snapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2025-27059
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-21 Oct, 2025 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in TZ Firmware

Memory corruption while performing SCM call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9072_firmwareqcn9100_firmwareqcn9070ipq5010_firmwareqcn9001ipq5010qcn6102qcn9003_firmwareqcn9024_firmwareqcn9000_firmwareqcn6102_firmwareqcn9000qcn6023qcn9274qcn9022_firmwareqcn9070_firmwareimmersive_home_316_platform_firmwareqcn6023_firmwareipq5028_firmwareimmersive_home_214_platformqcn6132qcn9012qcn6112qcn6024_firmwareqcn9074_firmwareqcn9100qcn9024qcn9012_firmwareqcn9022qcn9003immersive_home_316_platformqcn6112_firmwareqcn6024qcn9274_firmwareimmersive_home_214_platform_firmwareimmersive_home_216_platformqcn6122ipq5028qcn6132_firmwareimmersive_home_318_platform_firmwareqcn6100_firmwareqcn6122_firmwareqcn6100qcn9002_firmwareimmersive_home_216_platform_firmwareimmersive_home_318_platformqcn9072qcn9001_firmwareqcn9074qcn9002Snapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2025-27054
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Display

Memory corruption while processing a malformed license file during reboot.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs9100_firmwareqdu1000_firmwarewcn3990_firmwareqca6426_firmwareqcs6490robotics_rb5_platformsg6150_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcs5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwarewsa8835_firmwaresm7635psc8380xpsm8750_firmwarewcd9341_firmwareqam8775p_firmwaresm8550psnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarefastconnect_6900sa8770psnapdragon_690_5g_mobile_platformsa8775pwsa8830qca8386sm8735snapdragon_695_5g_mobile_platformwcd9340sm8850p_firmwarex20000949205_lte_modemqcs8300wcn6450wcn7860_firmwareqdu1210sa7775p_firmwareqcs4490qca6420_firmwareqru1052_firmwareqru1062sd888qdx1010_firmwarerobotics_rb2_platformwcd9326_firmwarewcd9380_firmwaresm7635p_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwaresa8530pqca6595ausm6650p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)qcn9012_firmwareqcm4490snapdragon_xr1_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresm6250qcm6490_firmwarewcd9395_firmwaresm8850_firmwareqca8695auqcm6125snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)sm6370_firmwaresm7325pwsa8845_firmwarefastconnect_6200qcn9011_firmwaresnapdragon_888_5g_mobile_platformsa6150p_firmwarewcd9370_firmwarewcn7750_firmwaresnapdragon_662_mobile_platformqmp1000_firmwareqamsrv1msw5100pqcs7230sxr2250pqmp1000wcd9360snapdragon_ar2_gen_1_platformwsa8810sm6370flight_rb5_5g_platform_firmwaresnapdragon_wear_1300_platform_firmwaresnapdragon_x72_5g_modem-rf_systemsnapdragon_670_mobile_platformsnapdragon_665_mobile_platform_firmwarecsra6620_firmwaresm7315flight_rb5_5g_platformqcm2290_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)qcm8550sa8195p_firmwaresnapdragon_auto_4g_modemsa6150psnapdragon_8_gen_3_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180x-aa\)sa8155psnapdragon_778g_5g_mobile_platformssg2125p_firmwareqca6696_firmwaresnapdragon_460_mobile_platformwcn3950_firmwaresnapdragon_675_mobile_platform_firmwareqcs2290snapdragon_678_mobile_platform_\(sm6150-ac\)snapdragon_auto_5g_modem-rf_gen_2qrb5165msnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)sm8735_firmwaresnapdragon_865_5g_mobile_platform_firmwaresm7325p_firmwaresrv1lwsa8815wsa8815_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemsnapdragon_8cx_compute_platform_\(sc8180xp-af\)snapdragon_7c\+_gen_3_compute_firmwareqrb5165m_firmwarewcd9335snapdragon_4_gen_2_mobile_platformqcs8300_firmwarex2000077sd888_firmwarefastconnect_6800mdm9205sqca6421_firmwarexg101002_firmwaresxr1230psxr2230pqca6584auqfw7124_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)qru1052snapdragon_x50_5g_modem-rf_systemsm8750p_firmwareqrb5165n_firmwaressg2125px2000086_firmwareqca6420qca6430_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwarewsa8845qca8386_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)sxr1120fastconnect_7800_firmwareqca6391_firmwaresnapdragon_855_mobile_platformcsra6640sa4150psa8255p_firmwareqca6595snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwareqcs6690fastconnect_6700qam8295psa6155sa2150pwcn6650_firmwarewcd9385_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwarewcd9378c_firmwareqam8775pqcm2290qca6688aqsm7675p_firmwareqam8255p_firmwaresa8650p_firmwaresm8635pqca6797aq_firmwaresxr2350pvideo_collaboration_vc5_platformsnapdragon_4_gen_1_mobile_platform_firmwarefastconnect_6200_firmwareqts110qca6584au_firmwareqca6421snapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_690_5g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platform_firmwaresg8275pqcn7606_firmwaresa8620p_firmwareqam8255pqca6595au_firmwaresa6155pqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcn6274snapdragon_7c\+_gen_3_computewsa8845hsw5100_firmwaretalynplus_firmwareqfw7114_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)sxr2130qcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresa8540psm8750qca6797aqsnapdragon_730_mobile_platform_\(sm7150-aa\)_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqam8650p_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_x32_5g_modem-rf_systemsnapdragon_710_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwareqsm8350_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresg6150psa8770p_firmwaresdx82sm8750px2000090snapdragon_x55_5g_modem-rf_systemsc8380xp_firmwaresd_8_gen1_5g_firmwaresm8650qqcm4290_firmwaresxr2230p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)qca8695au_firmwaresmart_audio_400_platformqca6595_firmwareqcm8550_firmwaresa6145pwcd9335_firmwarewcd9390srv1m_firmwaresa4150p_firmwaresg6150p_firmwaresa9000p_firmwareqca6174awcn7860sa7775pwcd9340_firmwarewcn6450_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresa8195psrv1msnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)ssg2115pwcd9378csnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwarexg101032_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430qcs2290_firmwarewcd9375_firmwaresg8275p_firmware315_5g_iot_modemwcd9380snapdragon_xr2\+_gen_1_platformqcn9024_firmwaresdx82_firmwarec-v2x_9150_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresa7255pqca6436snapdragon_720g_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwareqcn7606sm7250pqcs615qcs8250sd865_5gqca8337_firmwaresxr2130_firmwarewcd9360_firmwaresnapdragon_460_mobile_platform_firmwarexg101039qca6696snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)qca4004qcm6690_firmwareqca6574ax2000092snapdragon_480_5g_mobile_platform_firmwareqam8620pqcn6224sxr2330p_firmwarewsa8840_firmwareqts110_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwarewcn3999x2000092_firmwaresc8180x\+sdx55_firmwarewcn3950sxr2330psnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)mdm9205s_firmwaresxr1120_firmwaresnapdragon_x32_5g_modem-rf_system_firmwareqca4004_firmwareaqt1000_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcn7861snapdragon_x65_5g_modem-rf_system_firmwaresm7675qamsrv1m_firmwaresa8150p_firmwarewcd9385x2000077_firmwareqcn6024_firmwareqcn9074_firmwaresm8850snapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391sa8145p_firmwareqca8081_firmwaresa9000pqam8295p_firmwareqca8081qcc2072_firmwareqca6574qca6431snapdragon_778g_5g_mobile_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101002qca6436_firmwaresmart_audio_400_platform_firmwareqcs5430_firmwareqcm6490qcs8550_firmwareqcs8250_firmwarewcd9306snapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqcs8550qdu1110_firmwaresa8540p_firmwaresm4635_firmwareqcm6125_firmwaresd730qca6430snapdragon_x62_5g_modem-rf_systemsa8775p_firmwareqam8620p_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)snapdragon_665_mobile_platformwcn3999_firmwaresm7675pqcm6690qcs4290qru1032_firmwareqcs6690_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8255pqdx1011qrb5165nsm7250p_firmwaresd855qcc711_firmwareqca6678aqqcm4290snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_480_5g_mobile_platformxg101032wcn6740snapdragon_wear_1300_platformqfw7124sm6650snapdragon_782g_mobile_platform_\(sm7325-af\)qcs6125_firmwarefastconnect_6900_firmwaresm8650q_firmwarewsa8810_firmwaresxr2350p_firmwaresnapdragon_8_gen_2_mobile_platformsa8150pqcc710_firmwaresnapdragon_670_mobile_platform_firmwareqca6174a_firmwaresa4155psnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7635sm4125_firmwarec-v2x_9150qcn9024wcd9395wcd9378_firmwarear8031wcd9306_firmwaresnapdragon_750g_5g_mobile_platformqcm4325_firmwareqru1032wcd9341ar8035sm6650_firmwaresm4635wsa8832_firmwarewcn6755_firmwarewcn3988_firmwareqca6678aq_firmwareqca6698au_firmwaresdx55_firmwaresdx85robotics_rb5_platform_firmwarewsa8832sdx61_firmwarex2000094_firmwaresnapdragon_ar1_gen_1_platformsc8180x\+sdx55qcn9274video_collaboration_vc3_platformwcd9375qcs615_firmwaresm4125qcc711snapdragon_8c_compute_platform_\(sc8180x-ad\)qcs4290_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareaqt1000qsm8250wcd9390_firmwarewcd9370sd865_5g_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sm6225p_firmwaresnapdragon_8_gen_1_mobile_platformsnapdragon_x75_5g_modem-rf_system_firmwarex2000086wcn3988sdx61snapdragon_662_mobile_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_xr2_5g_platform_firmwaresd_8_gen1_5gqdx1010qca6574_firmwareqdu1110qca6698aqsa8155talynpluswcn7880wsa8845h_firmwaresnapdragon_675_mobile_platformsnapdragon_auto_5g_modem-rfsnapdragon_780g_5g_mobile_platform_firmwareqam8650psa8620psd670_firmwaresg4150p_firmwaresm8635wcn6740_firmwaresd855_firmwareqcn9012sa7255p_firmwaresw5100p_firmwareqep81119205_lte_modem_firmwareqsm8250_firmwaresm7315_firmwareqcf8001wcn7750robotics_rb2_platform_firmwarewcn6650xg101039_firmwareqcn6274_firmwaresrv1h_firmwarear8031_firmwaresm8635_firmwarewsa8840sa8650psnapdragon_xr2_5g_platformsnapdragon_x35_5g_modem-rf_systemsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewsa8830_firmwaresnapdragon_8\+_gen_2_mobile_platformcsra6640_firmwaresm6225psm7635_firmwareqcs6125qdu1010sg4150pqdu1000sm8850pssg2115p_firmwarewcd9378qcc2072fastconnect_6800_firmwareqep8111_firmwaresnapdragon_x75_5g_modem-rf_systemqcs4490_firmwaresnapdragon_780g_5g_mobile_platformsnapdragon_auto_4g_modem_firmwarex2000090_firmwareqca6688aq_firmwaresm6250_firmwaresa8155p_firmwareqru1062_firmwarewcn3910_firmwaresd670qca6426snapdragon_730g_mobile_platform_\(sm7150-ab\)qcn6024qdu1010_firmwareqca6698auwcn3910qcs7230_firmwareqca6574a_firmwareqdx1011_firmwarewcd9326snapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwarewcn7861_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqdu1210_firmwaresd730_firmwaresg6150snapdragon_8\+_gen_1_mobile_platformwcn3980_firmwaresa8295p_firmwaresm7675_firmwaresrv1l_firmwareqca8337qcn6224_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewcn7881qcn9011wsa8835qamsrv1hqca6574au_firmwarewcn7880_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sa8155_firmwareqcm4325wcn7881_firmwareqcs6490_firmwarewcn3980video_collaboration_vc3_platform_firmwarevideo_collaboration_vc5_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwaresa6155_firmwaresdx55sa8295pqsm8350qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwaresw5100video_collaboration_vc1_platformqcf8001_firmwarecsra6620snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwarewcn3990sa6155p_firmwareqca6431_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)fastconnect_7800video_collaboration_vc1_platform_firmware315_5g_iot_modem_firmwaresnapdragon_865_5g_mobile_platformwcn6755qcs9100snapdragon_4_gen_1_mobile_platformsa2150p_firmwareqcn9274_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)sdx85_firmwaresm6650psnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresa8530p_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platformsa8145pqcn9074Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-27053
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Calculation of Buffer Size in HLOS

Memory corruption during PlayReady APP usecase while processing TA commands.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs9100_firmwaremsm8996auqdu1000_firmwaresnapdragon_626_mobile_platform_firmwaresnapdragon_821_mobile_platform_firmwareqca6426_firmwareqcs6490215_mobile_platform_firmwarerobotics_rb5_platform9207_lte_modem_firmwaresg6150_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcs5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresnapdragon_429_mobile_platformsm7635psc8380xpsm8750_firmwareqam8775p_firmwaresm8550psnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarefastconnect_6900sa8770psnapdragon_690_5g_mobile_platformsa8775pqca8386sm8735snapdragon_695_5g_mobile_platformsm8850p_firmware9205_lte_modemqcs8300qca6564aqdu1210sa7775p_firmwareqcs4490snapdragon_820_mobile_platform_firmwareqca6420_firmwareqru1052_firmwareqru1062sd888sd820apq8064au_firmwareqdx1010_firmwarerobotics_rb2_platformsm7635p_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwaresa8530pqca6595ausm6650p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)qcn9012_firmwarevision_intelligence_100_platform_\(apq8053-aa\)qcm4490snapdragon_xr1_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresnapdragon_632_mobile_platform_firmwaresm6250qcm6490_firmwaresm8850_firmwareqca8695auqcm6125snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)msm8996au_firmwaresm6370_firmwaresm7325pfastconnect_6200smart_display_200_platform_\(apq5053-aa\)qcn9011_firmwaresnapdragon_888_5g_mobile_platformsa6150p_firmwaresnapdragon_662_mobile_platformqmp1000_firmwareqamsrv1msw5100p215_mobile_platformqca9377qcs7230sxr2250pqmp1000home_hub_100_platform_firmwaresnapdragon_ar2_gen_1_platformsm6370flight_rb5_5g_platform_firmwaremdm9250_firmwaresnapdragon_wear_1300_platform_firmwaresnapdragon_x72_5g_modem-rf_systemrobotics_rb3_platform_firmwaresd820_firmwaresnapdragon_670_mobile_platformsnapdragon_665_mobile_platform_firmwarecsra6620_firmwaresnapdragon_845_mobile_platform_firmwaresm7315snapdragon_450_mobile_platform_firmwareflight_rb5_5g_platformqca6335robotics_rb3_platformqcm2290_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)qcm8550qca9367_firmwareqca9367qca9377_firmwaresa8195p_firmwaresd_675sa6150psnapdragon_auto_4g_modemsnapdragon_8_gen_3_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180x-aa\)sa8155psnapdragon_778g_5g_mobile_platformssg2125p_firmwareqca6696_firmwaresnapdragon_460_mobile_platformsnapdragon_820_mobile_platformsnapdragon_675_mobile_platform_firmwareqcs2290snapdragon_678_mobile_platform_\(sm6150-ac\)qrb5165msnapdragon_auto_5g_modem-rf_gen_2apq8017_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)sm8735_firmwaresnapdragon_865_5g_mobile_platform_firmwaresm7325p_firmwaresrv1lsnapdragon_450_mobile_platformmdm9640snapdragon_427_mobile_platformapq8037snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemsnapdragon_820_automotive_platform_firmwaremdm9640_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)qrb5165m_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm6250psnapdragon_4_gen_2_mobile_platformqcs8300_firmwareqca6335_firmwarecsrb31024_firmwarefastconnect_6800mdm9205sqca6421_firmwaresd888_firmwaresxr1230psxr2230pqca6584auqfw7124_firmwareqru1052snapdragon_8cx_compute_platform_\(sc8180x-ab\)mdm9650snapdragon_x50_5g_modem-rf_systemsnapdragon_x5_lte_modem_firmwaresm8750p_firmwareqrb5165n_firmwaressg2125pqca6420qca6430_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwareqca8386_firmwaresnapdragon_439_mobile_platformsnapdragon_430_mobile_platformvision_intelligence_300_platform_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)sxr1120fastconnect_7800_firmwareqca6391_firmwaresnapdragon_855_mobile_platformcsra6640sa4150psa8255p_firmwareqca6595snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwareqcs6690fastconnect_6700qam8295psa6155snapdragon_x12_lte_modemsa2150psnapdragon_680_4g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwareqam8775pqcm2290qca6688aqqam8255p_firmwaresm7675p_firmwaresa8650p_firmwaresnapdragon_x24_lte_modemsm8635pqca6797aq_firmwaresxr2350pvideo_collaboration_vc5_platformsnapdragon_4_gen_1_mobile_platform_firmwareqca9379fastconnect_6200_firmwareqts110qca6584au_firmwareqca6421snapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_wear_4100\+_platformsnapdragon_690_5g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platform_firmwaresg8275pqcn7606_firmwaresa8620p_firmwareqam8255pqca6310_firmwareqca6595au_firmwaresa6155pqcs410_firmwareqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcn6274snapdragon_7c\+_gen_3_computesw5100_firmwareqcs610apq8064autalynplus_firmwareqfw7114_firmwarevision_intelligence_300_platformsnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)sxr2130snapdragon_625_mobile_platform_firmwareqcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresa8540psm8750qca6797aqsnapdragon_730_mobile_platform_\(sm7150-aa\)_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqam8650p_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_x32_5g_modem-rf_systemsnapdragon_710_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwareqsm8350_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresg6150psdx82sm8750psa8770p_firmwaresnapdragon_x55_5g_modem-rf_systemsm8650qqcm4290_firmwaresc8380xp_firmwaresd_8_gen1_5g_firmwaresnapdragon_820_automotive_platformqca6564_firmwaresxr2230p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)qca8695au_firmwareqca6310smart_audio_400_platformqca6595_firmwareqcm8550_firmwaresa6145psrv1m_firmwaresa4150p_firmwaresg6150p_firmwareqca6174asa9000p_firmwaresa7775psnapdragon_730_mobile_platform_\(sm7150-aa\)snapdragon_435_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresa8195psrv1msnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)ssg2115psnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwarefastconnect_6700_firmwareqcm5430_firmwareqca6564a_firmwareqcm5430qcs2290_firmwarevision_intelligence_400_platform_firmwaresg8275p_firmware315_5g_iot_modemsnapdragon_xr2\+_gen_1_platformmdm9628qcn9024_firmwaresnapdragon_7c_compute_platform_\(sc7180-ac\)sdx82_firmwarec-v2x_9150_firmwaresa7255psnapdragon_x50_5g_modem-rf_system_firmwareqca6436snapdragon_720g_mobile_platformcsrb31024snapdragon_8_gen_1_mobile_platform_firmwareqcn7606sm7250pqcs615qcs8250sd865_5gqca8337_firmwaresxr2130_firmwaresd821snapdragon_460_mobile_platform_firmwareqca6696snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarevision_intelligence_400_platformsnapdragon_8cx_compute_platform_\(sc8180xp-ac\)qca4004qcm6690_firmwareqca6574asnapdragon_480_5g_mobile_platform_firmwareqam8620pqcn6224sxr2330p_firmwareqts110_firmwarepm8937_firmwarepm8937snapdragon_888_5g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresc8180x\+sdx55_firmwaresxr2330pmdm9250snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)mdm9205s_firmwaresxr1120_firmwaresnapdragon_x32_5g_modem-rf_system_firmwareqcs8155qca4004_firmwareaqt1000_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x65_5g_modem-rf_system_firmware9207_lte_modemsm7675qamsrv1m_firmwaresa8150p_firmwarehome_hub_100_platformqcn6024_firmwareqcn9074_firmwaresm8850snapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwareqcs8155_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391sa8145p_firmwareqca8081_firmwaresa9000pqam8295p_firmwareqca8081qcc2072_firmwaresnapdragon_425_mobile_platform_firmwareqca6574qca6431snapdragon_778g_5g_mobile_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresmart_audio_400_platform_firmwareqca6436_firmwaresnapdragon_1200_wearable_platform_firmwareqcs5430_firmwareqcm6490qcs8550_firmwareqcs8250_firmwaresnapdragon_x5_lte_modemsnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqcs8550qdu1110_firmwaresa8540p_firmwaresm4635_firmwareqcm6125_firmwaresd730snapdragon_425_mobile_platformqca6430snapdragon_x62_5g_modem-rf_systemsa8775p_firmwareqam8620p_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)snapdragon_665_mobile_platformqca6234_firmwaresnapdragon_7c_compute_platform_\(sc7180-ac\)_firmwaresm7675pqcm6690qcs4290qru1032_firmwareqcs6690_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8255pqdx1011qrb5165nsm7250p_firmwaresd855snapdragon_439_mobile_platform_firmwareqcc711_firmwareqca6678aqqcm4290snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_wear_1300_platformqfw7124sm6650qcs6125_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)fastconnect_6900_firmwaresm8650q_firmwareqca9379_firmwaresxr2350p_firmwaresnapdragon_8_gen_2_mobile_platformsa8150pqcc710_firmwaresnapdragon_670_mobile_platform_firmwareqca6174a_firmwaresa4155psnapdragon_x12_lte_modem_firmwaresd626_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_1200_wearable_platformsnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7635sm4125_firmwaresdm429w_firmwarec-v2x_9150qcn9024ar8031apq8037_firmwaresnapdragon_750g_5g_mobile_platformqcm4325_firmwareqru1032ar8035sm6650_firmwaresm4635sdm429wqca6678aq_firmwareqca6698au_firmwaremdm8207_firmwaresdx55_firmwaresdx85robotics_rb5_platform_firmwaresdx61_firmwaresnapdragon_ar1_gen_1_platformqcn9274qca6564video_collaboration_vc3_platformsnapdragon_821_mobile_platformsc8180x\+sdx55vision_intelligence_200_platform_\(apq8053-ac\)qcs615_firmwaresm4125qcc711snapdragon_8c_compute_platform_\(sc8180x-ad\)qcs4290_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareaqt1000qsm8250vision_intelligence_100_platform_\(apq8053-aa\)_firmwaresd_675_firmwaresd865_5g_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sm6225p_firmwaresnapdragon_626_mobile_platformsnapdragon_8_gen_1_mobile_platformsnapdragon_x75_5g_modem-rf_system_firmwaresdx61snapdragon_625_mobile_platformsnapdragon_662_mobile_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)sd675snapdragon_xr2_5g_platform_firmwaresd_8_gen1_5gqdx1010qca6574_firmwareqdu1110qca6698aqsnapdragon_1100_wearable_platform_firmwaresm6250p_firmwaresa8155talynplusqcm2150snapdragon_675_mobile_platformsnapdragon_auto_5g_modem-rfsnapdragon_780g_5g_mobile_platform_firmwareqam8650psa8620pqca6320_firmwaresd670_firmwaresg4150p_firmwaresm8635sd855_firmwareqcn9012sd821_firmwaresa7255p_firmwaresw5100p_firmwareqep81119205_lte_modem_firmwareqsm8250_firmwaresm7315_firmwareqcf8001robotics_rb2_platform_firmwareqcn6274_firmwaresrv1h_firmwarear8031_firmwaresm8635_firmwaresnapdragon_435_mobile_platformsa8650psnapdragon_xr2_5g_platformsnapdragon_x35_5g_modem-rf_systemsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresnapdragon_8\+_gen_2_mobile_platformcsra6640_firmwaresnapdragon_1100_wearable_platformsm6225psm7635_firmwareqcs61259206_lte_modemqdu1010sg4150pqdu1000sm8850psd626ssg2115p_firmwareqcs410qcc2072fastconnect_6800_firmwareqep8111_firmwaresnapdragon_x75_5g_modem-rf_systemqcs4490_firmwaresnapdragon_780g_5g_mobile_platformsnapdragon_auto_4g_modem_firmwareqca6688aq_firmwaresnapdragon_wear_4100\+_platform_firmwaresm6250_firmwaresnapdragon_845_mobile_platformsa8155p_firmwareqru1062_firmwaresd670qca6426snapdragon_730g_mobile_platform_\(sm7150-ab\)qcn6024qdu1010_firmwareapq8017mdm9650_firmwareqca6698auqcs7230_firmwareqca6574a_firmwareqdx1011_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqdu1210_firmwaresd730_firmwaresg6150snapdragon_8\+_gen_1_mobile_platformsa8295p_firmwaresm7675_firmwaresrv1l_firmwareqca8337qcn6224_firmwareqcs610_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwaresnapdragon_427_mobile_platform_firmwaresnapdragon_632_mobile_platformqcn9011qamsrv1hqca6574au_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sa8155_firmwarevision_intelligence_200_platform_\(apq8053-ac\)_firmwareqcm4325qcs6490_firmwarevideo_collaboration_vc3_platform_firmwareqcm2150_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarevideo_collaboration_vc5_platform_firmwaresa6155_firmwaresdx55sa8295pqsm8350qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwarevideo_collaboration_vc1_platformsw5100qcf8001_firmwarecsra6620snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresa6155p_firmwareqca6431_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sd675_firmwarefastconnect_7800video_collaboration_vc1_platform_firmware315_5g_iot_modem_firmwareqca6564au_firmwareqca6320snapdragon_865_5g_mobile_platform9206_lte_modem_firmwaresmart_display_200_platform_\(apq5053-aa\)_firmwaremdm9628_firmwaresnapdragon_4_gen_1_mobile_platformqcs9100sa2150p_firmwareqcn9274_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)sdx85_firmwaresm6650psnapdragon_712_mobile_platformsnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwareqca6234qca6564aumdm8207snapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwaresa8530p_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_430_mobile_platform_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platformsa8145pqcn9074Snapdragon
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-27049
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.14%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-05 Nov, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Camera

Transient DOS while processing IOCTL call for image encoding.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwareqcs6490wcd9375video_collaboration_vc3_platformwcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwareqcs5430x2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcd9370xg101039fastconnect_6900qcc2072_firmwareqcm6490_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwareqcs5430_firmwareqcm6490wsa8830wsa8840wsa8845_firmwarewcd9370_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwarex2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430wcd9375_firmwarex2000092_firmwarexg101002_firmwareqcs6490_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-27048
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-05 Nov, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in Camera

Memory corruption while processing camera platform driver IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2025-27045
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.49%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-05 Nov, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Video

Information disclosure while processing batch command execution in Video driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-27041
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.14%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-05 Nov, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Video

Transient DOS while processing video packets received from video firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377sa8150psxr2250pqcc710_firmwareqca6174a_firmwarewcn3990_firmwareqcs6490sg4150p_firmwarewcn3980_firmwareqca8337qcn6224_firmwaresa8150p_firmwareqcs610_firmwarewcd9385sw5100p_firmwarewsa8835_firmwaresxr2230p_firmwarewsa8810fastconnect_7800_firmwareqfw7114ar8035_firmwareqca6698aq_firmwarewcd9341_firmwareqca6574au_firmwarewsa8835sa6145psa8145p_firmwaresnapdragon_x72_5g_modem-rf_systemqca8081_firmwaresd660fastconnect_6900wcd9335_firmwareqca8081qca6174aqcn6274_firmwarewcd9340_firmwarewcd9341wsa8830qcm6490qcs6490_firmwaresa8195pwcd9340wcd9385_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_680_4g_mobile_platformar8035snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewcn3980wsa8830_firmwarevideo_collaboration_vc3_platform_firmwarewsa8832_firmwareqca6688aqqca9367_firmwaresnapdragon_660_mobile_platform_firmwareqca9367qca9377_firmwaresa8195p_firmwarewcd9375_firmwaresa6150pwcn3988_firmwareqca6678aq_firmwaresa8155psg4150pwcd9380qca6574ausnapdragon_660_mobile_platformsa6145p_firmwareqcs410qca6696_firmwarevideo_collaboration_vc1_platformsw5100wsa8832wcn3950_firmwarewcd9375video_collaboration_vc3_platformsnapdragon_x75_5g_modem-rf_systemwcn3990qca6584au_firmwaresd660_firmwarewcd9380_firmwaresa6155p_firmwaresnapdragon_auto_5g_modem-rf_gen_2snapdragon_685_4g_mobile_platform_\(sm6225-ad\)qca6688aq_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca8337_firmwaresa8155p_firmwarefastconnect_7800video_collaboration_vc1_platform_firmwareqca6595au_firmwareqca6595auqcs410_firmwaresa6155pwsa8815qca6696wcd9370snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwarewsa8815_firmwarewcn3950sxr2250p_firmwareqcm6490_firmwareqcn6274snapdragon_x75_5g_modem-rf_system_firmwaresw5100_firmwareqcs610wcn3988wcd9335qca6678aqqcn6224snapdragon_888_5g_mobile_platformqfw7114_firmwaresa6150p_firmwarewcd9370_firmwaresnapdragon_888_5g_mobile_platform_firmwareqfw7124fastconnect_6900_firmwareqca6698aqqcc710snapdragon_x72_5g_modem-rf_system_firmwaresxr2230psa8145pqca6584ausw5100pwsa8810_firmwareqfw7124_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)Snapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-27040
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 4.63%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-21 Oct, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in TZ Firmware

Information disclosure may occur while processing the hypervisor log.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-ipq8076a_firmwareqcn9001ipq5010pmp8074qcn5064_firmwareipq8078a_firmwareipq8078aqcn9022_firmwareqcn9070_firmwareqcn9012ipq5028_firmwareqca8075qcn6024_firmwareqcn9074_firmwareqca8075_firmwareipq8074_firmwareqcn5052_firmwareipq9008qca8081_firmwareqcn9003qca8081qcn6112_firmwarepmp8074_firmwareqcn5054ipq8072a_firmwarecsr8811immersive_home_318_platform_firmwareqcn5550ipq8070aqcn9001_firmwareqcn5164qcn9002ipq8076qcn9072_firmwareqcn9100_firmwareqcn9070qcn5154_firmwareqcn5164_firmwareqca6438qcn6023qca4024_firmwareqcn6023_firmwareimmersive_home_214_platformipq8173_firmwareipq8174_firmwareqcn9012_firmwareqcn5154qcn5124immersive_home_316_platformqcn6024ipq9574ipq8173qca9984_firmwareqcn5152_firmwareqcn5152qcn6100_firmwareqcn6100ipq8070_firmwarecsr8811_firmwareqca4024ipq8071a_firmwareqcn5054_firmwareqcn5550_firmwareqcn6102qcn9000_firmwareqcn5024_firmwareqca6438_firmwareqca9984qcn6132ipq8071aqcn6112ipq8174ipq8072qcn9024ipq8070a_firmwareqcn9022ipq8078qca9889ipq8074aqca9888immersive_home_216_platformqcn6132_firmwareqca6428sdx55immersive_home_216_platform_firmwareimmersive_home_318_platformqcn9072qcn5122qca8072sdx55_firmwareipq5010_firmwareipq8074a_firmwareipq8078_firmwareqcn9003_firmwareqcn9024_firmwareipq8076aqcn6102_firmwareqca6428_firmwareqcn9000ipq8070qcn9274qca9889_firmwareipq8071immersive_home_316_platform_firmwareqca6694ipq8072aipq8072_firmwareqca9888_firmwareqcn5022qcn9100ipq8074qcn5022_firmwareipq9008_firmwareqcn5052qca6694_firmwareipq8076_firmwareqcn9274_firmwareimmersive_home_214_platform_firmwareqcn5124_firmwareqcn6122ipq5028ipq9574_firmwareqcn5122_firmwareqcn6122_firmwareqcn5064qcn9002_firmwareqca8072_firmwareipq8071_firmwareqcn9074qcn5024Snapdragon
CWE ID-CWE-20
Improper Input Validation
CVE-2025-27039
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 4.03%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-15 Oct, 2025 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Detection of Error Condition Without Action in Computer Vision

Memory corruption may occur while processing IOCTL call for DMM/WARPNCC CONFIG request.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9385_firmwarewcd9385wsa8830wsa8835fastconnect_6900_firmwarewcd9380_firmwarewsa8830_firmwaresxr2250pwsa8832fastconnect_6900fastconnect_7800wsa8835_firmwaresxr2230p_firmwaresxr2250p_firmwarefastconnect_7800_firmwaresxr2230pwcd9380wsa8832_firmwareSnapdragon
CWE ID-CWE-390
Detection of Error Condition Without Action
CVE-2025-11529
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.21% / 43.53%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:02
Updated-27 Oct, 2025 | 18:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ChurchCRM API Endpoint AuthMiddleware.php AuthMiddleware missing authentication

A security flaw has been discovered in ChurchCRM up to 5.18.0. This impacts the function AuthMiddleware of the file src/ChurchCRM/Slim/Middleware/AuthMiddleware.php of the component API Endpoint. The manipulation results in missing authentication. The attack can be executed remotely. The exploit has been released to the public and may be exploited. The patch is identified as 3a1cffd2aea63d884025949cfbcfd274d06216a4. A patch should be applied to remediate this issue.

Action-Not Available
Vendor-churchcrmn/a
Product-churchcrmChurchCRM
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-11528
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.11% / 29.43%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:02
Updated-09 Oct, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC7 saveAutoQos stack-based overflow

A vulnerability was identified in Tenda AC7 15.03.06.44. This affects an unknown function of the file /goform/saveAutoQos. The manipulation of the argument enable leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac7_firmwareac7AC7
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-11527
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.11% / 29.43%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 02:32
Updated-14 Oct, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC7 fast_setting_pppoe_set stack-based overflow

A vulnerability was determined in Tenda AC7 15.03.06.44. The impacted element is an unknown function of the file /goform/fast_setting_pppoe_set. Executing manipulation of the argument Password can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac7ac7_firmwareAC7
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-11526
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.11% / 30.29%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 02:32
Updated-14 Oct, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC7 WifiMacFilterSet stack-based overflow

A vulnerability was found in Tenda AC7 15.03.06.44. The affected element is an unknown function of the file /goform/WifiMacFilterSet. Performing manipulation of the argument wifi_chkHz results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac7ac7_firmwareAC7
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-10496
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-7.2||HIGH
EPSS-0.19% / 40.48%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 02:09
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cookie Notice & Consent <= 1.6.5 - Unauthenticated Stored Cross-Site Scripting

The Cookie Notice & Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uuid parameter in all versions up to, and including, 1.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-christophrado
Product-Cookie Notice & Consent
CWE ID-CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CVE-2025-10586
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.05% / 14.52%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 01:48
Updated-09 Oct, 2025 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Community Events <= 1.5.1 - Unauthenticated SQL Injection

The Community Events plugin for WordPress is vulnerable to SQL Injection via the ‘event_venue’ parameter in all versions up to, and including, 1.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Action-Not Available
Vendor-jackdewey
Product-Community Events
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-11166
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 0.58%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 01:48
Updated-09 Oct, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Go Maps (formerly WP Google Maps) <= 9.0.46 - Cross-Site Request Forgery to Plugin Settings Update

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to, and including, 9.0.46. This is due to the plugin exposing state-changing REST actions through an AJAX bridge without proper CSRF token validation, and having destructive logic reachable via GET requests with no permission_callback. This makes it possible for unauthenticated attackers to force logged-in administrators to create, update, or delete markers and geometry features via CSRF attacks, and allows anonymous users to trigger mass deletion of markers via unsafe GET requests.

Action-Not Available
Vendor-wpgmaps
Product-WP Go Maps (formerly WP Google Maps)
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11525
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.11% / 30.29%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 01:32
Updated-09 Oct, 2025 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC7 SetUpnpCfg stack-based overflow

A vulnerability has been found in Tenda AC7 15.03.06.44. Impacted is an unknown function of the file /goform/SetUpnpCfg. Such manipulation of the argument upnpEn leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac7_firmwareac7AC7
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-11524
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.11% / 29.43%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 01:02
Updated-09 Oct, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC7 SetDDNSCfg stack-based overflow

A flaw has been found in Tenda AC7 15.03.06.44. This issue affects some unknown processing of the file /goform/SetDDNSCfg. This manipulation of the argument ddnsEn causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac7_firmwareac7AC7
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-11523
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.90% / 75.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 01:02
Updated-09 Oct, 2025 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC7 AdvSetLanip command injection

A vulnerability was detected in Tenda AC7 15.03.06.44. This vulnerability affects unknown code of the file /goform/AdvSetLanip. The manipulation of the argument lanIp results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac7_firmwareac7AC7
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2025-11516
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.01%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 00:32
Updated-09 Oct, 2025 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Online Complaint Site complaint-details.php sql injection

A weakness has been identified in code-projects Online Complaint Site 1.0. Impacted is an unknown function of the file /cms/users/complaint-details.php. Executing manipulation of the argument cid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

Action-Not Available
Vendor-Source Code & Projects
Product-Online Complaint Site
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-11515
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.01%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 00:02
Updated-10 Oct, 2025 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Online Complaint Site register-complaint.php sql injection

A security flaw has been discovered in code-projects Online Complaint Site 1.0. This issue affects some unknown processing of the file /cms/users/register-complaint.php. Performing manipulation of the argument cid results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.

Action-Not Available
Vendor-Fabian RosSource Code & Projects
Product-online_complaint_siteOnline Complaint Site
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-11514
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.01%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 00:02
Updated-10 Oct, 2025 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Online Complaint Site index.php sql injection

A vulnerability was identified in code-projects Online Complaint Site 1.0. This vulnerability affects unknown code of the file /cms/users/index.php. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.

Action-Not Available
Vendor-Fabian RosSource Code & Projects
Product-online_complaint_siteOnline Complaint Site
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-60375
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.07% / 22.62%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 00:00
Updated-14 Oct, 2025 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The authentication mechanism in Perfex CRM before 3.3.1 allows attackers to bypass login credentials due to insufficient server-side validation. By sending empty username and password parameters in the login request, an attacker can gain unauthorized access to user accounts, including administrative accounts, without providing valid credentials.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-289
Authentication Bypass by Alternate Name
CVE-2025-60316
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.4||CRITICAL
EPSS-0.05% / 14.99%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 00:00
Updated-14 Oct, 2025 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SourceCodester Pet Grooming Management Software 1.0 is vulnerable to SQL Injection in admin/view_customer.php via the ID parameter.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
  • Previous
  • 1
  • 2
  • ...
  • 283
  • 284
  • 285
  • ...
  • 6570
  • 6571
  • Next