Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities328603
CVE-2025-52961
Assigner-Juniper Networks, Inc.
ShareView Details
Assigner-Juniper Networks, Inc.
CVSS Score-7.1||HIGH
EPSS-0.02% / 5.22%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 15:40
Updated-14 Oct, 2025 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS Evolved: PTX Series except PTX10003: An unauthenticated adjacent attacker sending specific valid traffic can cause a memory leak in cfmman leading to FPC crash and restart

An Uncontrolled Resource Consumption vulnerability in the Connectivity Fault Management (CFM) daemon and the Connectivity Fault Management Manager (cfmman) of Juniper Networks Junos OS Evolved on PTX10001-36MR, PTX10002-36QDD, PTX10004, PTX10008, PTX10016 allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). An attacker on an adjacent device sending specific valid traffic can cause cfmd to spike the CPU to 100% and cfmman's memory to leak, eventually to cause the FPC crash and restart. Continued receipt and processes of these specific valid packets will sustain the Denial of Service (DoS) condition. An indicator of compromise is to watch for an increase in cfmman memory rising over time by issuing the following command and evaluating the RSS number. If the RSS is growing into GBs then consider restarting the device to temporarily clear memory.   user@device> show system processes node fpc<num> detail | match cfmman Example:    show system processes node fpc0 detail | match cfmman    F S UID       PID       PPID PGID   SID   C PRI NI  ADDR SZ    WCHAN   RSS     PSR STIME TTY         TIME     CMD   4 S root      15204     1    15204  15204 0 80  0   - 90802     -      113652   4  Sep25 ?           00:15:28 /usr/bin/cfmman -p /var/pfe -o -c /usr/conf/cfmman-cfg-active.xml This issue affects Junos OS Evolved on PTX10001-36MR, PTX10002-36QDD, PTX10004, PTX10008, PTX10016: * from 23.2R1-EVO before 23.2R2-S4-EVO, * from 23.4 before 23.4R2-S4-EVO, * from 24.2 before 24.2R2-EVO, * from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO. This issue does not affect Junos OS Evolved on PTX10001-36MR, PTX10002-36QDD, PTX10004, PTX10008, PTX10016 before 23.2R1-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-Junos OS Evolved
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-52960
Assigner-Juniper Networks, Inc.
ShareView Details
Assigner-Juniper Networks, Inc.
CVSS Score-8.2||HIGH
EPSS-0.06% / 18.81%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 15:40
Updated-01 Dec, 2025 | 09:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: SRX Series and MX Series: Receipt of specific SIP packets in a high utilization situation causes a flowd/mspmand crash

A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When memory utilization is high, and specific SIP packets are received, flowd/mspmand crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, while high utilization is present, will cause a sustained DoS condition. The utilization is outside the attackers control, so they would not be able to deterministically exploit this. This issue affects Junos OS on SRX Series and MX Series:  * All versions before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-Junos OS
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-11198
Assigner-Juniper Networks, Inc.
ShareView Details
Assigner-Juniper Networks, Inc.
CVSS Score-8.5||HIGH
EPSS-0.06% / 20.12%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 15:39
Updated-14 Oct, 2025 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Security Director Policy Enforcer: An unrestricted API allows a network-based unauthenticated attacker to deploy malicious vSRX images to VMWare NSX Server

A Missing Authentication for Critical Function vulnerability in Juniper Networks Security Director Policy Enforcer allows an unauthenticated, network-based attacker to replace legitimate vSRX images with malicious ones. If a trusted user initiates deployment, Security Director Policy Enforcer will deliver the attacker's uploaded image to VMware NSX instead of a legitimate one. This issue affects Security Director Policy Enforcer:   * All versions before 23.1R1 Hotpatch v3. This issue does not affect Junos Space Security Director Insights.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-Security Director Policy Enforcer
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-39664
Assigner-Checkmk GmbH
ShareView Details
Assigner-Checkmk GmbH
CVSS Score-7.1||HIGH
EPSS-0.07% / 22.60%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 15:01
Updated-04 Dec, 2025 | 20:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path-Traversal in report scheduler

Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-32919
Assigner-Checkmk GmbH
ShareView Details
Assigner-Checkmk GmbH
CVSS Score-8.8||HIGH
EPSS-0.03% / 7.22%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 15:01
Updated-04 Dec, 2025 | 20:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation in Windows License plugin for Checkmk Windows Agent

Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-32916
Assigner-Checkmk GmbH
ShareView Details
Assigner-Checkmk GmbH
CVSS Score-1||LOW
EPSS-0.03% / 8.38%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 15:00
Updated-04 Dec, 2025 | 20:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive form data in URL query parameters

Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs.

Action-Not Available
Vendor-Checkmk GmbH
Product-checkmkCheckmk
CWE ID-CWE-598
Use of GET Request Method With Sensitive Query Strings
CVE-2025-36225
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 11.41%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 13:56
Updated-14 Oct, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Aspera Faspex information disclosure

IBM Aspera 5.0.0 through 5.0.13.1 could disclose sensitive user information from the system to an authenticated user due to an observable discrepancy of returned data.

Action-Not Available
Vendor-Microsoft CorporationIBM CorporationLinux Kernel Organization, Inc
Product-linux_kernelwindowsaspera_faspexAspera Faspex
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-37401
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.88%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 13:54
Updated-14 Oct, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Aspera Faspex cross-origin resource sharing

IBM Aspera Faspex 5.0.0 through 5.0.13.1 uses a cross-domain policy file that includes domains that should not be trusted.

Action-Not Available
Vendor-Microsoft CorporationIBM CorporationLinux Kernel Organization, Inc
Product-linux_kernelwindowsaspera_faspexAspera Faspex
CWE ID-CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CVE-2025-11561
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.17% / 38.58%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 13:37
Updated-15 Jan, 2026 | 10:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sssd: sssd default kerberos configuration allows privilege escalation on ad-joined linux systems

A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 4.15Red Hat Enterprise Linux 9.6 Extended Update SupportRed Hat Enterprise Linux 7 Extended Lifecycle SupportRed Hat OpenShift Container Platform 4.18Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRed Hat Ceph Storage 8Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat OpenShift Container Platform 4.14Red Hat OpenShift Container Platform 4.17Red Hat Enterprise Linux 8Red Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRed Hat OpenShift Container Platform 4.16Red Hat Enterprise Linux 9Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 10Red Hat OpenShift Container Platform 4.12Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 6Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Ceph Storage 7Red Hat OpenShift Container Platform 4.19Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRed Hat OpenShift Container Platform 4.20
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-62228
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-5.1||MEDIUM
EPSS-0.05% / 14.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 13:15
Updated-03 Dec, 2025 | 21:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Flink CDC, Apache Flink CDC, Apache Flink CDC, Apache Flink CDC, Apache Flink CDC: SQL injection via maliciously crafted identifiers

Apache Flink CDC version 3.4.0 was vulnerable to a SQL injection via maliciously crafted identifiers eg. crafted database name or crafted table name. Even through only the logged-in database user can trigger the attack, we recommend users update Flink CDC version to 3.5.0 which address this issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-flink_cdcApache Flink CDC
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-10240
Assigner-Progress Software Corporation
ShareView Details
Assigner-Progress Software Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 17.76%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:43
Updated-10 Oct, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Possibility of unintended actions when a user clicks a malicious link in the Progress Flowmon web application

A vulnerability exists in the Progress Flowmon web application prior to version 12.5.5, whereby a user who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated session.

Action-Not Available
Vendor-Progress Software Corporation
Product-Flowmon
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-10239
Assigner-Progress Software Corporation
ShareView Details
Assigner-Progress Software Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 20.54%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:42
Updated-10 Oct, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unintended command execution via troubleshooting scripts in Progress Flowmon

In Flowmon versions prior to 12.5.5, a vulnerability has been identified that allows a user with administrator privileges and access to the management interface to execute additional unintended commands within scripts intended for troubleshooting purposes.

Action-Not Available
Vendor-Progress Software Corporation
Product-Flowmon
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-39963
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 6.23%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:13
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
io_uring: fix incorrect io_kiocb reference in io_link_skb

In the Linux kernel, the following vulnerability has been resolved: io_uring: fix incorrect io_kiocb reference in io_link_skb In io_link_skb function, there is a bug where prev_notif is incorrectly assigned using 'nd' instead of 'prev_nd'. This causes the context validation check to compare the current notification with itself instead of comparing it with the previous notification. Fix by using the correct prev_nd parameter when obtaining prev_notif.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39962
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 7.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:13
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
rxrpc: Fix untrusted unsigned subtract

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix untrusted unsigned subtract Fix the following Smatch static checker warning: net/rxrpc/rxgk_app.c:65 rxgk_yfs_decode_ticket() warn: untrusted unsigned subtract. 'ticket_len - 10 * 4' by prechecking the length of what we're trying to extract in two places in the token and decoding for a response packet. Also use sizeof() on the struct we're extracting rather specifying the size numerically to be consistent with the other related statements.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39961
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 6.78%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:13
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iommu/amd/pgtbl: Fix possible race while increase page table level

In the Linux kernel, the following vulnerability has been resolved: iommu/amd/pgtbl: Fix possible race while increase page table level The AMD IOMMU host page table implementation supports dynamic page table levels (up to 6 levels), starting with a 3-level configuration that expands based on IOVA address. The kernel maintains a root pointer and current page table level to enable proper page table walks in alloc_pte()/fetch_pte() operations. The IOMMU IOVA allocator initially starts with 32-bit address and onces its exhuasted it switches to 64-bit address (max address is determined based on IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU driver increases page table level. But in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads pgtable->[root/mode] without lock. So its possible that in exteme corner case, when increase_address_space() is updating pgtable->[root/mode], fetch_pte() reads wrong page table level (pgtable->mode). It does compare the value with level encoded in page table and returns NULL. This will result is iommu_unmap ops to fail and upper layer may retry/log WARN_ON. CPU 0 CPU 1 ------ ------ map pages unmap pages alloc_pte() -> increase_address_space() iommu_v1_unmap_pages() -> fetch_pte() pgtable->root = pte (new root value) READ pgtable->[mode/root] Reads new root, old mode Updates mode (pgtable->mode += 1) Since Page table level updates are infrequent and already synchronized with a spinlock, implement seqcount to enable lock-free read operations on the read path.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39960
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 7.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:13
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
gpiolib: acpi: initialize acpi_gpio_info struct

In the Linux kernel, the following vulnerability has been resolved: gpiolib: acpi: initialize acpi_gpio_info struct Since commit 7c010d463372 ("gpiolib: acpi: Make sure we fill struct acpi_gpio_info"), uninitialized acpi_gpio_info struct are passed to __acpi_find_gpio() and later in the call stack info->quirks is used in acpi_populate_gpio_lookup. This breaks the i2c_hid_cpi driver: [ 58.122916] i2c_hid_acpi i2c-UNIW0001:00: HID over i2c has not been provided an Int IRQ [ 58.123097] i2c_hid_acpi i2c-UNIW0001:00: probe with driver i2c_hid_acpi failed with error -22 Fix this by initializing the acpi_gpio_info pass to __acpi_find_gpio()

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-10004
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-7.5||HIGH
EPSS-0.06% / 18.40%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:04
Updated-20 Oct, 2025 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Allocation of Resources Without Limits or Throttling in GitLab

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.12 to 18.2.8, 18.3 to 18.3.4, and 18.4 to 18.4.2 that could make the GitLab instance unresponsive or severely degraded by sending crafted GraphQL queries requesting large repository blobs.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-11340
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-7.7||HIGH
EPSS-0.02% / 3.55%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 12:04
Updated-20 Oct, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in GitLab

GitLab has remediated an issue in GitLab EE affecting all versions from 18.3 to 18.3.4, 18.4 to 18.4.2 that, under certain conditions, could have allowed authenticated users with read-only API tokens to perform unauthorized write operations on vulnerability records by exploiting incorrectly scoped GraphQL mutations.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-2934
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 34.83%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 11:33
Updated-20 Oct, 2025 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Allocation of Resources Without Limits or Throttling in GitLab

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 5.2 prior to 18.2.8, 18.3 prior to 18.3.4, and 18.4 prior to 18.4.2 that could have allowed an authenticated attacker to create a denial of service condition by configuring malicious webhook endpoints that send crafted HTTP responses.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-9371
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 13.08%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 11:20
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Betheme <= 28.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'page_title'

The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘page_title’ parameter in all versions up to, and including, 28.1.6 due to insufficient input sanitization and output escaping of theme breadcrumbs. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-Muffin Group
Product-Betheme
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-10249
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 22.20%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 11:20
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Slider Revolution <= 6.7.37 - Missing Authorization to Authenticated (Contributor+) Arbitrary File Read

The Slider Revolution plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on several functions in all versions up to, and including, 6.7.37. This makes it possible for authenticated attackers, with Contributor-level access and above, to install and activate plugin add-ons, create sliders, and download arbitrary files.

Action-Not Available
Vendor-Revolution Slider
Product-Slider Revolution
CWE ID-CWE-23
Relative Path Traversal
CVE-2025-39959
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 7.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASoC: amd: acp: Fix incorrect retrival of acp_chip_info

In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: acp: Fix incorrect retrival of acp_chip_info Use dev_get_drvdata(dev->parent) instead of dev_get_platdata(dev) to correctly obtain acp_chip_info members in the acp I2S driver. Previously, some members were not updated properly due to incorrect data access, which could potentially lead to null pointer dereferences. This issue was missed in the earlier commit ("ASoC: amd: acp: Fix NULL pointer deref in acp_i2s_set_tdm_slot"), which only addressed set_tdm_slot(). This change ensures that all relevant functions correctly retrieve acp_chip_info, preventing further null pointer dereference issues.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39958
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 7.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-02 Jan, 2026 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iommu/s390: Make attach succeed when the device was surprise removed

In the Linux kernel, the following vulnerability has been resolved: iommu/s390: Make attach succeed when the device was surprise removed When a PCI device is removed with surprise hotplug, there may still be attempts to attach the device to the default domain as part of tear down via (__iommu_release_dma_ownership()), or because the removal happens during probe (__iommu_probe_device()). In both cases zpci_register_ioat() fails with a cc value indicating that the device handle is invalid. This is because the device is no longer part of the instance as far as the hypervisor is concerned. Currently this leads to an error return and s390_iommu_attach_device() fails. This triggers the WARN_ON() in __iommu_group_set_domain_nofail() because attaching to the default domain must never fail. With the device fenced by the hypervisor no DMAs to or from memory are possible and the IOMMU translations have no effect. Proceed as if the registration was successful and let the hotplug event handling clean up the device. This is similar to how devices in the error state are handled since commit 59bbf596791b ("iommu/s390: Make attach succeed even if the device is in error state") except that for removal the domain will not be registered later. This approach was also previously discussed at the link. Handle both cases, error state and removal, in a helper which checks if the error needs to be propagated or ignored. Avoid magic number condition codes by using the pre-existing, but never used, defines for PCI load/store condition codes and rename them to reflect that they apply to all PCI instructions.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39957
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 9.17%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-02 Jan, 2026 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wifi: mac80211: increase scan_ies_len for S1G

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: increase scan_ies_len for S1G Currently the S1G capability element is not taken into account for the scan_ies_len, which leads to a buffer length validation failure in ieee80211_prep_hw_scan() and subsequent WARN in __ieee80211_start_scan(). This prevents hw scanning from functioning. To fix ensure we accommodate for the S1G capability length.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39956
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 6.23%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
igc: don't fail igc_probe() on LED setup error

In the Linux kernel, the following vulnerability has been resolved: igc: don't fail igc_probe() on LED setup error When igc_led_setup() fails, igc_probe() fails and triggers kernel panic in free_netdev() since unregister_netdev() is not called. [1] This behavior can be tested using fault-injection framework, especially the failslab feature. [2] Since LED support is not mandatory, treat LED setup failures as non-fatal and continue probe with a warning message, consequently avoiding the kernel panic. [1] kernel BUG at net/core/dev.c:12047! Oops: invalid opcode: 0000 [#1] SMP NOPTI CPU: 0 UID: 0 PID: 937 Comm: repro-igc-led-e Not tainted 6.17.0-rc4-enjuk-tnguy-00865-gc4940196ab02 #64 PREEMPT(voluntary) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:free_netdev+0x278/0x2b0 [...] Call Trace: <TASK> igc_probe+0x370/0x910 local_pci_probe+0x3a/0x80 pci_device_probe+0xd1/0x200 [...] [2] #!/bin/bash -ex FAILSLAB_PATH=/sys/kernel/debug/failslab/ DEVICE=0000:00:05.0 START_ADDR=$(grep " igc_led_setup" /proc/kallsyms \ | awk '{printf("0x%s", $1)}') END_ADDR=$(printf "0x%x" $((START_ADDR + 0x100))) echo $START_ADDR > $FAILSLAB_PATH/require-start echo $END_ADDR > $FAILSLAB_PATH/require-end echo 1 > $FAILSLAB_PATH/times echo 100 > $FAILSLAB_PATH/probability echo N > $FAILSLAB_PATH/ignore-gfp-wait echo $DEVICE > /sys/bus/pci/drivers/igc/bind

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39955
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.05% / 16.75%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().

In the Linux kernel, the following vulnerability has been resolved: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk in the TCP_ESTABLISHED state. [0] syzbot reused the server-side TCP Fast Open socket as a new client before the TFO socket completes 3WHS: 1. accept() 2. connect(AF_UNSPEC) 3. connect() to another destination As of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes it to TCP_CLOSE and makes connect() possible, which restarts timers. Since tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the retransmit timer triggered the warning and the intended packet was not retransmitted. Let's call reqsk_fastopen_remove() in tcp_disconnect(). [0]: WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Modules linked in: CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7)) Code: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 <0f> 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e RSP: 0018:ffffc900002f8d40 EFLAGS: 00010293 RAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017 RDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400 RBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8 R10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540 R13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0 FS: 0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0 Call Trace: <IRQ> tcp_write_timer (net/ipv4/tcp_timer.c:738) call_timer_fn (kernel/time/timer.c:1747) __run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372) timer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135) tmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035) __walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1)) tmigr_handle_remote (kernel/time/timer_migration.c:1096) handle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580) irq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696) sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35)) </IRQ>

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-39954
Assigner-kernel.org
ShareView Details
Assigner-kernel.org
CVSS Score-Not Assigned
EPSS-0.03% / 7.21%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 09:47
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
clk: sunxi-ng: mp: Fix dual-divider clock rate readback

In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: mp: Fix dual-divider clock rate readback When dual-divider clock support was introduced, the P divider offset was left out of the .recalc_rate readback function. This causes the clock rate to become bogus or even zero (possibly due to the P divider being 1, leading to a divide-by-zero). Fix this by incorporating the P divider offset into the calculation.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-Linux
CVE-2025-10862
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.39%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 08:23
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers <= 2.1.3 - Unauthenticated SQL Injection via 'id'

The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 2.1.3. This is due to insufficient escaping on the 'id' parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Action-Not Available
Vendor-roxnor
Product-Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-11522
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.32% / 54.74%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 07:23
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Search & Go - Directory WordPress Theme <= 2.7 - Authentication Bypass to Privilege Escalation via Account Takeover

The Search & Go - Directory WordPress Theme theme for WordPress is vulnerable to Authentication Bypass via account takeover in all versions up to, and including, 2.7. This is due to insufficient user validation in the search_and_go_elated_check_facebook_user() function This makes it possible for unauthenticated attackers to gain access to other user's accounts, including administrators, when Facebook login is enabled.

Action-Not Available
Vendor-Elated-Themes
Product-Search & Go - Directory WordPress Theme
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-11539
Assigner-Grafana Labs
ShareView Details
Assigner-Grafana Labs
CVSS Score-9.9||CRITICAL
EPSS-0.39% / 59.43%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 07:18
Updated-10 Oct, 2025 | 05:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Code Execution in Grafana Image Renderer Plugin

Grafana Image Renderer is vulnerable to remote code execution due to an arbitrary file write vulnerability. This is due to the fact that the /render/csv endpoint lacked validation of the filePath parameter that allowed an attacker to save a shared object to an arbitrary location that is then loaded by the Chromium process. Instances are vulnerable if: 1. The default token ("authToken") is not changed, or is known to the attacker. 2. The attacker can reach the image renderer endpoint. This issue affects grafana-image-renderer: from 1.0.0 through 4.0.16.

Action-Not Available
Vendor-Grafana Labs
Product-grafana-image-renderer
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-7634
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.57% / 68.13%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 05:23
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Travel Engine – Tour Booking Plugin – Tour Operator Software <= 6.6.7 - Unauthenticated Local File Inclusion

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 6.6.7 via the mode parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

Action-Not Available
Vendor-wptravelengine
Product-WP Travel Engine – Tour Booking Plugin – Tour Operator Software
CWE ID-CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CVE-2025-7526
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-1.07% / 77.31%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 05:23
Updated-09 Oct, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Travel Engine – Tour Booking Plugin – Tour Operator Software <= 6.6.7 - Authenticated (Subscriber+) Arbitrary File Deletion via File Renaming

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to arbitrary file deletion (via renaming) due to insufficient file path validation in the set_user_profile_image function in all versions up to, and including, 6.6.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

Action-Not Available
Vendor-wptravelengine
Product-WP Travel Engine – Tour Booking Plugin – Tour Operator Software
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-11530
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.01%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:32
Updated-09 Oct, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Online Complaint Site state.php sql injection

A weakness has been identified in code-projects Online Complaint Site 1.0. Affected is an unknown function of the file /cms/admin/state.php. This manipulation of the argument state causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Action-Not Available
Vendor-Fabian RosSource Code & Projects
Product-online_complaint_siteOnline Complaint Site
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-6038
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.8||HIGH
EPSS-0.06% / 18.44%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:23
Updated-09 Oct, 2025 | 15:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme <= 1.4.0 - Authenticated (Subscriber+) Privilege Escalation

The Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation via password update in all versions up to, and including, 1.4.0. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's passwords, including those of administrators.

Action-Not Available
Vendor-pebas
Product-Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-47355
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in DSP Service

Memory corruption while invoking remote procedure IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcn3980_firmwarewcd9380_firmwarewcn3680b_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcn3660bwcn3680bxg101039fastconnect_6900qcc2072_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwarewsa8830wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcn3980wcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)x2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarefastconnect_6700_firmwarexg101002_firmwarex2000092_firmwarewcn3660b_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47354
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Service

Memory corruption while allocating buffers in DSP service.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qmp1000sm8750p_firmwaresm6475_firmwarewcn7861sm7435_firmwaresm8750psnapdragon_4_gen_2_mobile_platform_firmwarewcd9385wsa8845sw5100p_firmwarewsa8835_firmwarewsa8810fastconnect_7800_firmwaresm8750_firmwarewcn7881wcn7880_firmwarewsa8835wcd9395wcd9378_firmwarewcn7750wcn7860wcn7881_firmwarefastconnect_6700wsa8830wsa8840sm8735wcd9385_firmwaresw5100psnapdragon_6_gen_1_mobile_platformsnapdragon_w5\+_gen_1_wearable_platform_firmwarewsa8830_firmwarewsa8832_firmwarewcn6755_firmwarefastconnect_6700_firmwarewcd9375_firmwarewcn3988_firmwarewcn7860_firmwarewcd9380wcd9378sw5100wsa8832sxr2350pwcn3950_firmwarewcd9375fastconnect_6200_firmwarewcd9380_firmwaresm8735_firmwarefastconnect_7800snapdragon_6_gen_1_mobile_platform_firmwarewsa8815wcd9370sm7435sm6475wsa8815_firmwaresxr2330pwcd9395_firmwarewcn6755wsa8845hsw5100_firmwarewcn7880wcn3988sxr2330p_firmwarewsa8845_firmwaresnapdragon_4_gen_2_mobile_platformfastconnect_6200wcd9370_firmwarewsa8840_firmwarewcn7750_firmwareqmp1000_firmwaresnapdragon_w5\+_gen_1_wearable_platformsm8750wcn3950wsa8810_firmwarewcn7861_firmwarewsa8845h_firmwaresxr2350p_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47351
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in DSP Service

Memory corruption while processing user buffers.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sg6150wsa8832sg6150psm8750p_firmwarewcn3950_firmwarewcd9375sm8750pwcn7861fastconnect_6200_firmwaresg6150_firmwarewsa8845wcd9385wsa8835_firmwarewsa8810fastconnect_7800sm8850fastconnect_7800_firmwaresm8750_firmwarewcn7881wcn7880_firmwarewsa8815wsa8835wcd9395wcd9370wsa8815_firmwarefastconnect_6900sg6150p_firmwarewcd9395_firmwaresm8850_firmwarewsa8810_firmwarewcn7860wcn7881_firmwarewsa8845hfastconnect_6700wcn3988wsa8830wsa8840wsa8845_firmwarefastconnect_6200wcd9370_firmwarewsa8840_firmwarewcd9385_firmwaresm8850p_firmwarewsa8830_firmwarewsa8832_firmwarefastconnect_6900_firmwarefastconnect_6700_firmwarewcd9375_firmwarewcn3988_firmwaresm8750wcn7860_firmwarewcn3950wcn7880wcn7861_firmwarewsa8845h_firmwaresm8850pSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-47349
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in DSP Service

Memory corruption while processing an escape call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2025-47347
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-21 Oct, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Automotive Software platform based on QNX

Memory corruption while processing control commands in the virtual memory management interface.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa8155_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa6155sa8650psa8195psrv1mqam8775psa6155_firmwareqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255psa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255pqca6574asa8145pqam8620psrv1hsa6150p_firmwareqca6574a_firmwareqca6698aqqamsrv1msa8540psa8155sa8295p_firmwareqam8650p_firmwareSnapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-47342
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.1||HIGH
EPSS-0.06% / 17.32%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-21 Oct, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in BT Controller

Transient DOS may occur when multi-profile concurrency arises with QHS enabled.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc7225s5_sound_platform_firmwareqcc7225_firmwares5_gen_2_sound_platformqcc7228qcc5161qcc5161_firmwares3_gen_2_sound_platform_firmwareqcc7226qcc7228_firmwareqcc7226_firmwares5_gen_2_sound_platform_firmwares5_sound_platforms3_sound_platform_firmwares3_sound_platforms3_gen_2_sound_platformSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47341
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Copy Without Checking Size of Input in Camera

memory corruption while processing an image encoding completion event.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwareqcs6490wcd9375video_collaboration_vc3_platformwcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwareqcs5430x2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcd9370xg101039fastconnect_6900qcc2072_firmwareqcm6490_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwareqcs5430_firmwareqcm6490wsa8830wsa8840wsa8845_firmwarewcd9370_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwarex2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430wcd9375_firmwarex2000092_firmwarexg101002_firmwareqcs6490_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-47340
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in DSP Service

Memory corruption while processing IOCTL call to get the mapping.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47338
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in DSP Service

Memory corruption while processing escape commands from userspace.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2025-27060
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-21 Oct, 2025 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in TZ Firmware

Memory corruption while performing SCM call with malformed inputs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9072_firmwareqcn9100_firmwareqcn9070ipq5010_firmwareqcn9001ipq5010qcn6102qcn9003_firmwareqcn9024_firmwareqcn9000_firmwareqcn6102_firmwareqcn9000qcn6023qcn9274qcn9022_firmwareqcn9070_firmwareimmersive_home_316_platform_firmwareqcn6023_firmwareipq5028_firmwareimmersive_home_214_platformqcn6132qcn9012qcn6112qcn6024_firmwareqcn9074_firmwareqcn9100qcn9024qcn9012_firmwareqcn9022qcn9003immersive_home_316_platformqcn6112_firmwareqcn6024qcn9274_firmwareimmersive_home_214_platform_firmwareimmersive_home_216_platformqcn6122ipq5028qcn6132_firmwareimmersive_home_318_platform_firmwareqcn6100_firmwareqcn6122_firmwareqcn6100qcn9002_firmwareimmersive_home_216_platform_firmwareimmersive_home_318_platformqcn9072qcn9001_firmwareqcn9074qcn9002Snapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2025-27059
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-21 Oct, 2025 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Out-of-range Pointer Offset in TZ Firmware

Memory corruption while performing SCM call.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcn9072_firmwareqcn9100_firmwareqcn9070ipq5010_firmwareqcn9001ipq5010qcn6102qcn9003_firmwareqcn9024_firmwareqcn9000_firmwareqcn6102_firmwareqcn9000qcn6023qcn9274qcn9022_firmwareqcn9070_firmwareimmersive_home_316_platform_firmwareqcn6023_firmwareipq5028_firmwareimmersive_home_214_platformqcn6132qcn9012qcn6112qcn6024_firmwareqcn9074_firmwareqcn9100qcn9024qcn9012_firmwareqcn9022qcn9003immersive_home_316_platformqcn6112_firmwareqcn6024qcn9274_firmwareimmersive_home_214_platform_firmwareimmersive_home_216_platformqcn6122ipq5028qcn6132_firmwareimmersive_home_318_platform_firmwareqcn6100_firmwareqcn6122_firmwareqcn6100qcn9002_firmwareimmersive_home_216_platform_firmwareimmersive_home_318_platformqcn9072qcn9001_firmwareqcn9074qcn9002Snapdragon
CWE ID-CWE-823
Use of Out-of-range Pointer Offset
CVE-2025-27054
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Display

Memory corruption while processing a malformed license file during reboot.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs9100_firmwareqdu1000_firmwarewcn3990_firmwareqca6426_firmwareqcs6490robotics_rb5_platformsg6150_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcs5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwarewsa8835_firmwaresm7635psc8380xpsm8750_firmwarewcd9341_firmwareqam8775p_firmwaresm8550psnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarefastconnect_6900sa8770psnapdragon_690_5g_mobile_platformsa8775pwsa8830qca8386sm8735snapdragon_695_5g_mobile_platformwcd9340sm8850p_firmwarex20000949205_lte_modemqcs8300wcn6450wcn7860_firmwareqdu1210sa7775p_firmwareqcs4490qca6420_firmwareqru1052_firmwareqru1062sd888qdx1010_firmwarerobotics_rb2_platformwcd9326_firmwarewcd9380_firmwaresm7635p_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwaresa8530pqca6595ausm6650p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)qcn9012_firmwareqcm4490snapdragon_xr1_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresm6250qcm6490_firmwarewcd9395_firmwaresm8850_firmwareqca8695auqcm6125snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)sm6370_firmwaresm7325pwsa8845_firmwarefastconnect_6200qcn9011_firmwaresnapdragon_888_5g_mobile_platformsa6150p_firmwarewcd9370_firmwarewcn7750_firmwaresnapdragon_662_mobile_platformqmp1000_firmwareqamsrv1msw5100pqcs7230sxr2250pqmp1000wcd9360snapdragon_ar2_gen_1_platformwsa8810sm6370flight_rb5_5g_platform_firmwaresnapdragon_wear_1300_platform_firmwaresnapdragon_x72_5g_modem-rf_systemsnapdragon_670_mobile_platformsnapdragon_665_mobile_platform_firmwarecsra6620_firmwaresm7315flight_rb5_5g_platformqcm2290_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)qcm8550sa8195p_firmwaresnapdragon_auto_4g_modemsa6150psnapdragon_8_gen_3_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180x-aa\)sa8155psnapdragon_778g_5g_mobile_platformssg2125p_firmwareqca6696_firmwaresnapdragon_460_mobile_platformwcn3950_firmwaresnapdragon_675_mobile_platform_firmwareqcs2290snapdragon_678_mobile_platform_\(sm6150-ac\)snapdragon_auto_5g_modem-rf_gen_2qrb5165msnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)sm8735_firmwaresnapdragon_865_5g_mobile_platform_firmwaresm7325p_firmwaresrv1lwsa8815wsa8815_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemsnapdragon_8cx_compute_platform_\(sc8180xp-af\)snapdragon_7c\+_gen_3_compute_firmwareqrb5165m_firmwarewcd9335snapdragon_4_gen_2_mobile_platformqcs8300_firmwarex2000077sd888_firmwarefastconnect_6800mdm9205sqca6421_firmwarexg101002_firmwaresxr1230psxr2230pqca6584auqfw7124_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)qru1052snapdragon_x50_5g_modem-rf_systemsm8750p_firmwareqrb5165n_firmwaressg2125px2000086_firmwareqca6420qca6430_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwarewsa8845qca8386_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)sxr1120fastconnect_7800_firmwareqca6391_firmwaresnapdragon_855_mobile_platformcsra6640sa4150psa8255p_firmwareqca6595snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwareqcs6690fastconnect_6700qam8295psa6155sa2150pwcn6650_firmwarewcd9385_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwarewcd9378c_firmwareqam8775pqcm2290qca6688aqsm7675p_firmwareqam8255p_firmwaresa8650p_firmwaresm8635pqca6797aq_firmwaresxr2350pvideo_collaboration_vc5_platformsnapdragon_4_gen_1_mobile_platform_firmwarefastconnect_6200_firmwareqts110qca6584au_firmwareqca6421snapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_690_5g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platform_firmwaresg8275pqcn7606_firmwaresa8620p_firmwareqam8255pqca6595au_firmwaresa6155pqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcn6274snapdragon_7c\+_gen_3_computewsa8845hsw5100_firmwaretalynplus_firmwareqfw7114_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)sxr2130qcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresa8540psm8750qca6797aqsnapdragon_730_mobile_platform_\(sm7150-aa\)_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqam8650p_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_x32_5g_modem-rf_systemsnapdragon_710_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwareqsm8350_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresg6150psa8770p_firmwaresdx82sm8750px2000090snapdragon_x55_5g_modem-rf_systemsc8380xp_firmwaresd_8_gen1_5g_firmwaresm8650qqcm4290_firmwaresxr2230p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)qca8695au_firmwaresmart_audio_400_platformqca6595_firmwareqcm8550_firmwaresa6145pwcd9335_firmwarewcd9390srv1m_firmwaresa4150p_firmwaresg6150p_firmwaresa9000p_firmwareqca6174awcn7860sa7775pwcd9340_firmwarewcn6450_firmwaresnapdragon_730_mobile_platform_\(sm7150-aa\)snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresa8195psrv1msnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)ssg2115pwcd9378csnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwarexg101032_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430qcs2290_firmwarewcd9375_firmwaresg8275p_firmware315_5g_iot_modemwcd9380snapdragon_xr2\+_gen_1_platformqcn9024_firmwaresdx82_firmwarec-v2x_9150_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresa7255pqca6436snapdragon_720g_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwareqcn7606sm7250pqcs615qcs8250sd865_5gqca8337_firmwaresxr2130_firmwarewcd9360_firmwaresnapdragon_460_mobile_platform_firmwarexg101039qca6696snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)qca4004qcm6690_firmwareqca6574ax2000092snapdragon_480_5g_mobile_platform_firmwareqam8620pqcn6224sxr2330p_firmwarewsa8840_firmwareqts110_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwarewcn3999x2000092_firmwaresc8180x\+sdx55_firmwarewcn3950sxr2330psnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)mdm9205s_firmwaresxr1120_firmwaresnapdragon_x32_5g_modem-rf_system_firmwareqca4004_firmwareaqt1000_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcn7861snapdragon_x65_5g_modem-rf_system_firmwaresm7675qamsrv1m_firmwaresa8150p_firmwarewcd9385x2000077_firmwareqcn6024_firmwareqcn9074_firmwaresm8850snapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391sa8145p_firmwareqca8081_firmwaresa9000pqam8295p_firmwareqca8081qcc2072_firmwareqca6574qca6431snapdragon_778g_5g_mobile_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101002qca6436_firmwaresmart_audio_400_platform_firmwareqcs5430_firmwareqcm6490qcs8550_firmwareqcs8250_firmwarewcd9306snapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqcs8550qdu1110_firmwaresa8540p_firmwaresm4635_firmwareqcm6125_firmwaresd730qca6430snapdragon_x62_5g_modem-rf_systemsa8775p_firmwareqam8620p_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)snapdragon_665_mobile_platformwcn3999_firmwaresm7675pqcm6690qcs4290qru1032_firmwareqcs6690_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8255pqdx1011qrb5165nsm7250p_firmwaresd855qcc711_firmwareqca6678aqqcm4290snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_480_5g_mobile_platformxg101032wcn6740snapdragon_wear_1300_platformqfw7124sm6650snapdragon_782g_mobile_platform_\(sm7325-af\)qcs6125_firmwarefastconnect_6900_firmwaresm8650q_firmwarewsa8810_firmwaresxr2350p_firmwaresnapdragon_8_gen_2_mobile_platformsa8150pqcc710_firmwaresnapdragon_670_mobile_platform_firmwareqca6174a_firmwaresa4155psnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7635sm4125_firmwarec-v2x_9150qcn9024wcd9395wcd9378_firmwarear8031wcd9306_firmwaresnapdragon_750g_5g_mobile_platformqcm4325_firmwareqru1032wcd9341ar8035sm6650_firmwaresm4635wsa8832_firmwarewcn6755_firmwarewcn3988_firmwareqca6678aq_firmwareqca6698au_firmwaresdx55_firmwaresdx85robotics_rb5_platform_firmwarewsa8832sdx61_firmwarex2000094_firmwaresnapdragon_ar1_gen_1_platformsc8180x\+sdx55qcn9274video_collaboration_vc3_platformwcd9375qcs615_firmwaresm4125qcc711snapdragon_8c_compute_platform_\(sc8180x-ad\)qcs4290_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareaqt1000qsm8250wcd9390_firmwarewcd9370sd865_5g_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sm6225p_firmwaresnapdragon_8_gen_1_mobile_platformsnapdragon_x75_5g_modem-rf_system_firmwarex2000086wcn3988sdx61snapdragon_662_mobile_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_xr2_5g_platform_firmwaresd_8_gen1_5gqdx1010qca6574_firmwareqdu1110qca6698aqsa8155talynpluswcn7880wsa8845h_firmwaresnapdragon_675_mobile_platformsnapdragon_auto_5g_modem-rfsnapdragon_780g_5g_mobile_platform_firmwareqam8650psa8620psd670_firmwaresg4150p_firmwaresm8635wcn6740_firmwaresd855_firmwareqcn9012sa7255p_firmwaresw5100p_firmwareqep81119205_lte_modem_firmwareqsm8250_firmwaresm7315_firmwareqcf8001wcn7750robotics_rb2_platform_firmwarewcn6650xg101039_firmwareqcn6274_firmwaresrv1h_firmwarear8031_firmwaresm8635_firmwarewsa8840sa8650psnapdragon_xr2_5g_platformsnapdragon_x35_5g_modem-rf_systemsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewsa8830_firmwaresnapdragon_8\+_gen_2_mobile_platformcsra6640_firmwaresm6225psm7635_firmwareqcs6125qdu1010sg4150pqdu1000sm8850pssg2115p_firmwarewcd9378qcc2072fastconnect_6800_firmwareqep8111_firmwaresnapdragon_x75_5g_modem-rf_systemqcs4490_firmwaresnapdragon_780g_5g_mobile_platformsnapdragon_auto_4g_modem_firmwarex2000090_firmwareqca6688aq_firmwaresm6250_firmwaresa8155p_firmwareqru1062_firmwarewcn3910_firmwaresd670qca6426snapdragon_730g_mobile_platform_\(sm7150-ab\)qcn6024qdu1010_firmwareqca6698auwcn3910qcs7230_firmwareqca6574a_firmwareqdx1011_firmwarewcd9326snapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwarewcn7861_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqdu1210_firmwaresd730_firmwaresg6150snapdragon_8\+_gen_1_mobile_platformwcn3980_firmwaresa8295p_firmwaresm7675_firmwaresrv1l_firmwareqca8337qcn6224_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewcn7881qcn9011wsa8835qamsrv1hqca6574au_firmwarewcn7880_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sa8155_firmwareqcm4325wcn7881_firmwareqcs6490_firmwarewcn3980video_collaboration_vc3_platform_firmwarevideo_collaboration_vc5_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwaresa6155_firmwaresdx55sa8295pqsm8350qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwaresw5100video_collaboration_vc1_platformqcf8001_firmwarecsra6620snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwarewcn3990sa6155p_firmwareqca6431_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)fastconnect_7800video_collaboration_vc1_platform_firmware315_5g_iot_modem_firmwaresnapdragon_865_5g_mobile_platformwcn6755qcs9100snapdragon_4_gen_1_mobile_platformsa2150p_firmwareqcn9274_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)sdx85_firmwaresm6650psnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresa8530p_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platformsa8145pqcn9074Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-27053
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:18
Updated-05 Nov, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Calculation of Buffer Size in HLOS

Memory corruption during PlayReady APP usecase while processing TA commands.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs9100_firmwaremsm8996auqdu1000_firmwaresnapdragon_626_mobile_platform_firmwaresnapdragon_821_mobile_platform_firmwareqca6426_firmwareqcs6490215_mobile_platform_firmwarerobotics_rb5_platform9207_lte_modem_firmwaresg6150_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcs5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresnapdragon_429_mobile_platformsm7635psc8380xpsm8750_firmwareqam8775p_firmwaresm8550psnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarefastconnect_6900sa8770psnapdragon_690_5g_mobile_platformsa8775pqca8386sm8735snapdragon_695_5g_mobile_platformsm8850p_firmware9205_lte_modemqcs8300qca6564aqdu1210sa7775p_firmwareqcs4490snapdragon_820_mobile_platform_firmwareqca6420_firmwareqru1052_firmwareqru1062sd888sd820apq8064au_firmwareqdx1010_firmwarerobotics_rb2_platformsm7635p_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)_firmwaresnapdragon_auto_5g_modem-rf_firmwaresnapdragon_429_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwaresa8530pqca6595ausm6650p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)qcn9012_firmwarevision_intelligence_100_platform_\(apq8053-aa\)qcm4490snapdragon_xr1_platformsnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresnapdragon_632_mobile_platform_firmwaresm6250qcm6490_firmwaresm8850_firmwareqca8695auqcm6125snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)msm8996au_firmwaresm6370_firmwaresm7325pfastconnect_6200smart_display_200_platform_\(apq5053-aa\)qcn9011_firmwaresnapdragon_888_5g_mobile_platformsa6150p_firmwaresnapdragon_662_mobile_platformqmp1000_firmwareqamsrv1msw5100p215_mobile_platformqca9377qcs7230sxr2250pqmp1000home_hub_100_platform_firmwaresnapdragon_ar2_gen_1_platformsm6370flight_rb5_5g_platform_firmwaremdm9250_firmwaresnapdragon_wear_1300_platform_firmwaresnapdragon_x72_5g_modem-rf_systemrobotics_rb3_platform_firmwaresd820_firmwaresnapdragon_670_mobile_platformsnapdragon_665_mobile_platform_firmwarecsra6620_firmwaresnapdragon_845_mobile_platform_firmwaresm7315snapdragon_450_mobile_platform_firmwareflight_rb5_5g_platformqca6335robotics_rb3_platformqcm2290_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)qcm8550qca9367_firmwareqca9367qca9377_firmwaresa8195p_firmwaresd_675sa6150psnapdragon_auto_4g_modemsnapdragon_8_gen_3_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180x-aa\)sa8155psnapdragon_778g_5g_mobile_platformssg2125p_firmwareqca6696_firmwaresnapdragon_460_mobile_platformsnapdragon_820_mobile_platformsnapdragon_675_mobile_platform_firmwareqcs2290snapdragon_678_mobile_platform_\(sm6150-ac\)qrb5165msnapdragon_auto_5g_modem-rf_gen_2apq8017_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)sm8735_firmwaresnapdragon_865_5g_mobile_platform_firmwaresm7325p_firmwaresrv1lsnapdragon_450_mobile_platformmdm9640snapdragon_427_mobile_platformapq8037snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemsnapdragon_820_automotive_platform_firmwaremdm9640_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)qrb5165m_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm6250psnapdragon_4_gen_2_mobile_platformqcs8300_firmwareqca6335_firmwarecsrb31024_firmwarefastconnect_6800mdm9205sqca6421_firmwaresd888_firmwaresxr1230psxr2230pqca6584auqfw7124_firmwareqru1052snapdragon_8cx_compute_platform_\(sc8180x-ab\)mdm9650snapdragon_x50_5g_modem-rf_systemsnapdragon_x5_lte_modem_firmwaresm8750p_firmwareqrb5165n_firmwaressg2125pqca6420qca6430_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwareqca8386_firmwaresnapdragon_439_mobile_platformsnapdragon_430_mobile_platformvision_intelligence_300_platform_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)sxr1120fastconnect_7800_firmwareqca6391_firmwaresnapdragon_855_mobile_platformcsra6640sa4150psa8255p_firmwareqca6595snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwareqcs6690fastconnect_6700qam8295psa6155snapdragon_x12_lte_modemsa2150psnapdragon_680_4g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwareqam8775pqcm2290qca6688aqqam8255p_firmwaresm7675p_firmwaresa8650p_firmwaresnapdragon_x24_lte_modemsm8635pqca6797aq_firmwaresxr2350pvideo_collaboration_vc5_platformsnapdragon_4_gen_1_mobile_platform_firmwareqca9379fastconnect_6200_firmwareqts110qca6584au_firmwareqca6421snapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_wear_4100\+_platformsnapdragon_690_5g_mobile_platform_firmwaresnapdragon_680_4g_mobile_platform_firmwaresg8275pqcn7606_firmwaresa8620p_firmwareqam8255pqca6310_firmwareqca6595au_firmwaresa6155pqcs410_firmwareqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcn6274snapdragon_7c\+_gen_3_computesw5100_firmwareqcs610apq8064autalynplus_firmwareqfw7114_firmwarevision_intelligence_300_platformsnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)sxr2130snapdragon_625_mobile_platform_firmwareqcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresa8540psm8750qca6797aqsnapdragon_730_mobile_platform_\(sm7150-aa\)_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqam8650p_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_x32_5g_modem-rf_systemsnapdragon_710_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwareqsm8350_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresg6150psdx82sm8750psa8770p_firmwaresnapdragon_x55_5g_modem-rf_systemsm8650qqcm4290_firmwaresc8380xp_firmwaresd_8_gen1_5g_firmwaresnapdragon_820_automotive_platformqca6564_firmwaresxr2230p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)qca8695au_firmwareqca6310smart_audio_400_platformqca6595_firmwareqcm8550_firmwaresa6145psrv1m_firmwaresa4150p_firmwaresg6150p_firmwareqca6174asa9000p_firmwaresa7775psnapdragon_730_mobile_platform_\(sm7150-aa\)snapdragon_435_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresa8195psrv1msnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)ssg2115psnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwarefastconnect_6700_firmwareqcm5430_firmwareqca6564a_firmwareqcm5430qcs2290_firmwarevision_intelligence_400_platform_firmwaresg8275p_firmware315_5g_iot_modemsnapdragon_xr2\+_gen_1_platformmdm9628qcn9024_firmwaresnapdragon_7c_compute_platform_\(sc7180-ac\)sdx82_firmwarec-v2x_9150_firmwaresa7255psnapdragon_x50_5g_modem-rf_system_firmwareqca6436snapdragon_720g_mobile_platformcsrb31024snapdragon_8_gen_1_mobile_platform_firmwareqcn7606sm7250pqcs615qcs8250sd865_5gqca8337_firmwaresxr2130_firmwaresd821snapdragon_460_mobile_platform_firmwareqca6696snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarevision_intelligence_400_platformsnapdragon_8cx_compute_platform_\(sc8180xp-ac\)qca4004qcm6690_firmwareqca6574asnapdragon_480_5g_mobile_platform_firmwareqam8620pqcn6224sxr2330p_firmwareqts110_firmwarepm8937_firmwarepm8937snapdragon_888_5g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresc8180x\+sdx55_firmwaresxr2330pmdm9250snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)mdm9205s_firmwaresxr1120_firmwaresnapdragon_x32_5g_modem-rf_system_firmwareqcs8155qca4004_firmwareaqt1000_firmwaresnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x65_5g_modem-rf_system_firmware9207_lte_modemsm7675qamsrv1m_firmwaresa8150p_firmwarehome_hub_100_platformqcn6024_firmwareqcn9074_firmwaresm8850snapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwareqcs8155_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391sa8145p_firmwareqca8081_firmwaresa9000pqam8295p_firmwareqca8081qcc2072_firmwaresnapdragon_425_mobile_platform_firmwareqca6574qca6431snapdragon_778g_5g_mobile_platform_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresmart_audio_400_platform_firmwareqca6436_firmwaresnapdragon_1200_wearable_platform_firmwareqcs5430_firmwareqcm6490qcs8550_firmwareqcs8250_firmwaresnapdragon_x5_lte_modemsnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwareqcs8550qdu1110_firmwaresa8540p_firmwaresm4635_firmwareqcm6125_firmwaresd730snapdragon_425_mobile_platformqca6430snapdragon_x62_5g_modem-rf_systemsa8775p_firmwareqam8620p_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwaresnapdragon_732g_mobile_platform_\(sm7150-ac\)snapdragon_665_mobile_platformqca6234_firmwaresnapdragon_7c_compute_platform_\(sc7180-ac\)_firmwaresm7675pqcm6690qcs4290qru1032_firmwareqcs6690_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8255pqdx1011qrb5165nsm7250p_firmwaresd855snapdragon_439_mobile_platform_firmwareqcc711_firmwareqca6678aqqcm4290snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_wear_1300_platformqfw7124sm6650qcs6125_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)fastconnect_6900_firmwaresm8650q_firmwareqca9379_firmwaresxr2350p_firmwaresnapdragon_8_gen_2_mobile_platformsa8150pqcc710_firmwaresnapdragon_670_mobile_platform_firmwareqca6174a_firmwaresa4155psnapdragon_x12_lte_modem_firmwaresd626_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_1200_wearable_platformsnapdragon_730g_mobile_platform_\(sm7150-ab\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_8\+_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaresm7635sm4125_firmwaresdm429w_firmwarec-v2x_9150qcn9024ar8031apq8037_firmwaresnapdragon_750g_5g_mobile_platformqcm4325_firmwareqru1032ar8035sm6650_firmwaresm4635sdm429wqca6678aq_firmwareqca6698au_firmwaremdm8207_firmwaresdx55_firmwaresdx85robotics_rb5_platform_firmwaresdx61_firmwaresnapdragon_ar1_gen_1_platformqcn9274qca6564video_collaboration_vc3_platformsnapdragon_821_mobile_platformsc8180x\+sdx55vision_intelligence_200_platform_\(apq8053-ac\)qcs615_firmwaresm4125qcc711snapdragon_8c_compute_platform_\(sc8180x-ad\)qcs4290_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwareaqt1000qsm8250vision_intelligence_100_platform_\(apq8053-aa\)_firmwaresd_675_firmwaresd865_5g_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sm6225p_firmwaresnapdragon_626_mobile_platformsnapdragon_8_gen_1_mobile_platformsnapdragon_x75_5g_modem-rf_system_firmwaresdx61snapdragon_625_mobile_platformsnapdragon_662_mobile_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)sd675snapdragon_xr2_5g_platform_firmwaresd_8_gen1_5gqdx1010qca6574_firmwareqdu1110qca6698aqsnapdragon_1100_wearable_platform_firmwaresm6250p_firmwaresa8155talynplusqcm2150snapdragon_675_mobile_platformsnapdragon_auto_5g_modem-rfsnapdragon_780g_5g_mobile_platform_firmwareqam8650psa8620pqca6320_firmwaresd670_firmwaresg4150p_firmwaresm8635sd855_firmwareqcn9012sd821_firmwaresa7255p_firmwaresw5100p_firmwareqep81119205_lte_modem_firmwareqsm8250_firmwaresm7315_firmwareqcf8001robotics_rb2_platform_firmwareqcn6274_firmwaresrv1h_firmwarear8031_firmwaresm8635_firmwaresnapdragon_435_mobile_platformsa8650psnapdragon_xr2_5g_platformsnapdragon_x35_5g_modem-rf_systemsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresnapdragon_8\+_gen_2_mobile_platformcsra6640_firmwaresnapdragon_1100_wearable_platformsm6225psm7635_firmwareqcs61259206_lte_modemqdu1010sg4150pqdu1000sm8850psd626ssg2115p_firmwareqcs410qcc2072fastconnect_6800_firmwareqep8111_firmwaresnapdragon_x75_5g_modem-rf_systemqcs4490_firmwaresnapdragon_780g_5g_mobile_platformsnapdragon_auto_4g_modem_firmwareqca6688aq_firmwaresnapdragon_wear_4100\+_platform_firmwaresm6250_firmwaresnapdragon_845_mobile_platformsa8155p_firmwareqru1062_firmwaresd670qca6426snapdragon_730g_mobile_platform_\(sm7150-ab\)qcn6024qdu1010_firmwareapq8017mdm9650_firmwareqca6698auqcs7230_firmwareqca6574a_firmwareqdx1011_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqdu1210_firmwaresd730_firmwaresg6150snapdragon_8\+_gen_1_mobile_platformsa8295p_firmwaresm7675_firmwaresrv1l_firmwareqca8337qcn6224_firmwareqcs610_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwaresnapdragon_427_mobile_platform_firmwaresnapdragon_632_mobile_platformqcn9011qamsrv1hqca6574au_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sa8155_firmwarevision_intelligence_200_platform_\(apq8053-ac\)_firmwareqcm4325qcs6490_firmwarevideo_collaboration_vc3_platform_firmwareqcm2150_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarevideo_collaboration_vc5_platform_firmwaresa6155_firmwaresdx55sa8295pqsm8350qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwarevideo_collaboration_vc1_platformsw5100qcf8001_firmwarecsra6620snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresa6155p_firmwareqca6431_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sd675_firmwarefastconnect_7800video_collaboration_vc1_platform_firmware315_5g_iot_modem_firmwareqca6564au_firmwareqca6320snapdragon_865_5g_mobile_platform9206_lte_modem_firmwaresmart_display_200_platform_\(apq5053-aa\)_firmwaremdm9628_firmwaresnapdragon_4_gen_1_mobile_platformqcs9100sa2150p_firmwareqcn9274_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)sdx85_firmwaresm6650psnapdragon_712_mobile_platformsnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwareqca6234qca6564aumdm8207snapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwaresa8530p_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_430_mobile_platform_firmwaresnapdragon_712_mobile_platform_firmwaresnapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresnapdragon_w5\+_gen_1_wearable_platformsa8145pqcn9074Snapdragon
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-27049
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.14%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-05 Nov, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Camera

Transient DOS while processing IOCTL call for image encoding.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwareqcs6490wcd9375video_collaboration_vc3_platformwcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwareqcs5430x2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcd9370xg101039fastconnect_6900qcc2072_firmwareqcm6490_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwareqcs5430_firmwareqcm6490wsa8830wsa8840wsa8845_firmwarewcd9370_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwarex2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430wcd9375_firmwarex2000092_firmwarexg101002_firmwareqcs6490_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-27048
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-05 Nov, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Untrusted Pointer Dereference in Camera

Memory corruption while processing camera platform driver IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2025-27045
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.49%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-05 Nov, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Video

Information disclosure while processing batch command execution in Video driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwarewcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwarex2000090_firmwarewsa8845wcd9385x2000077_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarexg101039fastconnect_6900qcc2072_firmwarex2000086wsa8845hx2000092xg101039_firmwarexg101002wsa8840wsa8845_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwarex2000077x2000094fastconnect_6900_firmwarexg101032_firmwarexg101002_firmwarex2000092_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-27041
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.14%
||
7 Day CHG~0.00%
Published-09 Oct, 2025 | 03:17
Updated-05 Nov, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Video

Transient DOS while processing video packets received from video firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377sa8150psxr2250pqcc710_firmwareqca6174a_firmwarewcn3990_firmwareqcs6490sg4150p_firmwarewcn3980_firmwareqca8337qcn6224_firmwaresa8150p_firmwareqcs610_firmwarewcd9385sw5100p_firmwarewsa8835_firmwaresxr2230p_firmwarewsa8810fastconnect_7800_firmwareqfw7114ar8035_firmwareqca6698aq_firmwarewcd9341_firmwareqca6574au_firmwarewsa8835sa6145psa8145p_firmwaresnapdragon_x72_5g_modem-rf_systemqca8081_firmwaresd660fastconnect_6900wcd9335_firmwareqca8081qca6174aqcn6274_firmwarewcd9340_firmwarewcd9341wsa8830qcm6490qcs6490_firmwaresa8195pwcd9340wcd9385_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_680_4g_mobile_platformar8035snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarewcn3980wsa8830_firmwarevideo_collaboration_vc3_platform_firmwarewsa8832_firmwareqca6688aqqca9367_firmwaresnapdragon_660_mobile_platform_firmwareqca9367qca9377_firmwaresa8195p_firmwarewcd9375_firmwaresa6150pwcn3988_firmwareqca6678aq_firmwaresa8155psg4150pwcd9380qca6574ausnapdragon_660_mobile_platformsa6145p_firmwareqcs410qca6696_firmwarevideo_collaboration_vc1_platformsw5100wsa8832wcn3950_firmwarewcd9375video_collaboration_vc3_platformsnapdragon_x75_5g_modem-rf_systemwcn3990qca6584au_firmwaresd660_firmwarewcd9380_firmwaresa6155p_firmwaresnapdragon_auto_5g_modem-rf_gen_2snapdragon_685_4g_mobile_platform_\(sm6225-ad\)qca6688aq_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca8337_firmwaresa8155p_firmwarefastconnect_7800video_collaboration_vc1_platform_firmwareqca6595au_firmwareqca6595auqcs410_firmwaresa6155pwsa8815qca6696wcd9370snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwarewsa8815_firmwarewcn3950sxr2250p_firmwareqcm6490_firmwareqcn6274snapdragon_x75_5g_modem-rf_system_firmwaresw5100_firmwareqcs610wcn3988wcd9335qca6678aqqcn6224snapdragon_888_5g_mobile_platformqfw7114_firmwaresa6150p_firmwarewcd9370_firmwaresnapdragon_888_5g_mobile_platform_firmwareqfw7124fastconnect_6900_firmwareqca6698aqqcc710snapdragon_x72_5g_modem-rf_system_firmwaresxr2230psa8145pqca6584ausw5100pwsa8810_firmwareqfw7124_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)Snapdragon
CWE ID-CWE-126
Buffer Over-read
  • Previous
  • 1
  • 2
  • ...
  • 284
  • 285
  • 286
  • ...
  • 6572
  • 6573
  • Next