Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-54207

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-30 Dec, 2025 | 12:11
Updated At-06 Feb, 2026 | 16:30
Rejected At-
Credits

HID: uclogic: Correct devm device reference for hidinput input_dev name

In the Linux kernel, the following vulnerability has been resolved: HID: uclogic: Correct devm device reference for hidinput input_dev name Reference the HID device rather than the input device for the devm allocation of the input_dev name. Referencing the input_dev would lead to a use-after-free when the input_dev was unregistered and subsequently fires a uevent that depends on the name. At the point of firing the uevent, the name would be freed by devres management. Use devm_kasprintf to simplify the logic for allocating memory and formatting the input_dev name string.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:30 Dec, 2025 | 12:11
Updated At:06 Feb, 2026 | 16:30
Rejected At:
▼CVE Numbering Authority (CNA)
HID: uclogic: Correct devm device reference for hidinput input_dev name

In the Linux kernel, the following vulnerability has been resolved: HID: uclogic: Correct devm device reference for hidinput input_dev name Reference the HID device rather than the input device for the devm allocation of the input_dev name. Referencing the input_dev would lead to a use-after-free when the input_dev was unregistered and subsequently fires a uevent that depends on the name. At the point of firing the uevent, the name would be freed by devres management. Use devm_kasprintf to simplify the logic for allocating memory and formatting the input_dev name string.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/hid/hid-uclogic-core.c
Default Status
unaffected
Versions
Affected
  • From cce2dbdf258e6b27b2b100f511531edabb77f427 before f78bb490b16ecb506d4904be4b00bf9aad6588f9 (git)
  • From cce2dbdf258e6b27b2b100f511531edabb77f427 before 51f49e3927ad545cec0c0afb86856ccacd9f085d (git)
  • From cce2dbdf258e6b27b2b100f511531edabb77f427 before f283805d984343b2f216e2f4c6c7af265b9542ae (git)
  • From cce2dbdf258e6b27b2b100f511531edabb77f427 before 4c2707dfee5847dc0b5ecfbe512c29c93832fdc4 (git)
  • From cce2dbdf258e6b27b2b100f511531edabb77f427 before 58f0d1c0e494a88f301bf455da7df4366f179bbb (git)
  • From cce2dbdf258e6b27b2b100f511531edabb77f427 before dd613a4e45f8d35f49a63a2064e5308fa5619e29 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/hid/hid-uclogic-core.c
Default Status
affected
Versions
Affected
  • 4.1
Unaffected
  • From 0 before 4.1 (semver)
  • From 5.10.249 through 5.10.* (semver)
  • From 5.15.199 through 5.15.* (semver)
  • From 6.1.53 through 6.1.* (semver)
  • From 6.4.16 through 6.4.* (semver)
  • From 6.5.3 through 6.5.* (semver)
  • From 6.6 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f78bb490b16ecb506d4904be4b00bf9aad6588f9
N/A
https://git.kernel.org/stable/c/51f49e3927ad545cec0c0afb86856ccacd9f085d
N/A
https://git.kernel.org/stable/c/f283805d984343b2f216e2f4c6c7af265b9542ae
N/A
https://git.kernel.org/stable/c/4c2707dfee5847dc0b5ecfbe512c29c93832fdc4
N/A
https://git.kernel.org/stable/c/58f0d1c0e494a88f301bf455da7df4366f179bbb
N/A
https://git.kernel.org/stable/c/dd613a4e45f8d35f49a63a2064e5308fa5619e29
N/A
Hyperlink: https://git.kernel.org/stable/c/f78bb490b16ecb506d4904be4b00bf9aad6588f9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/51f49e3927ad545cec0c0afb86856ccacd9f085d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f283805d984343b2f216e2f4c6c7af265b9542ae
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4c2707dfee5847dc0b5ecfbe512c29c93832fdc4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/58f0d1c0e494a88f301bf455da7df4366f179bbb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dd613a4e45f8d35f49a63a2064e5308fa5619e29
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:30 Dec, 2025 | 13:16
Updated At:26 Feb, 2026 | 18:44

In the Linux kernel, the following vulnerability has been resolved: HID: uclogic: Correct devm device reference for hidinput input_dev name Reference the HID device rather than the input device for the devm allocation of the input_dev name. Referencing the input_dev would lead to a use-after-free when the input_dev was unregistered and subsequently fires a uevent that depends on the name. At the point of firing the uevent, the name would be freed by devres management. Use devm_kasprintf to simplify the logic for allocating memory and formatting the input_dev name string.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.1(inclusive) to 5.10.249(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.199(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.53(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.4.16(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.5(inclusive) to 6.5.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarynvd@nist.gov
CWE ID: CWE-416
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/4c2707dfee5847dc0b5ecfbe512c29c93832fdc4416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/51f49e3927ad545cec0c0afb86856ccacd9f085d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/58f0d1c0e494a88f301bf455da7df4366f179bbb416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/dd613a4e45f8d35f49a63a2064e5308fa5619e29416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f283805d984343b2f216e2f4c6c7af265b9542ae416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f78bb490b16ecb506d4904be4b00bf9aad6588f9416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/4c2707dfee5847dc0b5ecfbe512c29c93832fdc4
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/51f49e3927ad545cec0c0afb86856ccacd9f085d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/58f0d1c0e494a88f301bf455da7df4366f179bbb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/dd613a4e45f8d35f49a63a2064e5308fa5619e29
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f283805d984343b2f216e2f4c6c7af265b9542ae
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f78bb490b16ecb506d4904be4b00bf9aad6588f9
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

3188Records found

CVE-2024-23697
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.3||HIGH
EPSS-0.03% / 8.40%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 20:09
Updated-17 Dec, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In RGXCreateHWRTData_aux of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Imagination Technologies LimitedGoogle LLC
Product-androidAndroidpowervr-gpu
CWE ID-CWE-416
Use After Free
CVE-2024-23381
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.15% / 35.89%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 14:21
Updated-26 Nov, 2024 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Graphics Linux

Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresnapdragon_8_gen_1_mobile_platformwsa8830qam8650pqam8775pqamsrv1mwsa8840wcn3950_firmwaresrv1l_firmwareqca6595au_firmwaresnapdragon_480_5g_mobile_platformvideo_collaboration_vc3_platformwcd9370qcm5430_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwareqamsrv1hwcd9385_firmwareqam8295pwcn3950fastconnect_6200qamsrv1h_firmwareqam8295p_firmwaresa9000p_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresa7255pwsa8845h_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformqca6595ausnapdragon_w5\+_gen_1_wearable_platform_firmwaresa8620p_firmwaresa6155p_firmwareqca6678aq_firmwaresa8775p_firmwareqcs6490wsa8840_firmwareqca6698aqqcs6125video_collaboration_vc5_platformwcn3988_firmwaresrv1hsa7775p_firmwarefastconnect_6700_firmwaresa8195pwsa8810_firmwaresw5100wsa8845hwcd9395_firmwaresa8255p_firmwaresa6155pqcs7230qca6698aq_firmwaresa7775pqcs5430qam8620psnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)wcd9385sa8770p_firmwaresa8255pqam8775p_firmwareqca6696_firmwareqcs6490_firmwareqca6797aqwcd9375wcd9390wsa8830_firmwarewsa8815_firmwarewcn3988wsa8835_firmwareqcm6490sa8195p_firmwarevideo_collaboration_vc5_platform_firmwaresa8295p_firmwaresa8770pqcm6125_firmwarewcd9380_firmwaresw5100psnapdragon_w5\+_gen_1_wearable_platformqca6595qcs7230_firmwarewsa8835qca6574wcd9380fastconnect_6700snapdragon_4_gen_1_mobile_platform_firmwareqca6574asnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarevideo_collaboration_vc3_platform_firmwarewcn3980wsa8845sa8650psa9000pqca6574_firmwarewsa8815wsa8845_firmwaresnapdragon_4_gen_1_mobile_platformqcs8250sa8775pqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwareqca6391sa8295pfastconnect_7800qca6678aqqcm6490_firmwaresa8650p_firmwarefastconnect_6900srv1h_firmwarefastconnect_6900_firmwarevideo_collaboration_vc1_platform_firmwareqca6797aq_firmwareqca6574ausa8155p_firmwaresrv1lsa7255p_firmwareqcs8250_firmwareqcm6125wsa8810sa8620pfastconnect_7800_firmwaresw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresrv1m_firmwareqamsrv1m_firmwareqcm5430qam8650p_firmwareqca6595_firmwarewcd9395qcs5430_firmwareqca6696qca6391_firmwarewcd9370_firmwarewcd9390_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8155psnapdragon_695_5g_mobile_platformvideo_collaboration_vc1_platformsrv1msw5100_firmwareqam8620p_firmwareqam8255pSnapdragonqam8255p_firmwarequalcomm_video_collaboration_vc1_platform_firmwarewcd9380_firmwareqcs7230_firmwarewcn3950_firmwaresrv1l_firmwareqca6595au_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqcm5430_firmwareqcs6125_firmwaresnapdragon_480_5g_mobile_platform_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwareqamsrv1h_firmwareqca6574_firmwarewsa8845_firmwareqam8295p_firmwaresa9000p_firmwareqca6574a_firmwarefastconnect_6200_firmwareqca6574au_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcd9375_firmwarewsa8845h_firmwarewcn3980_firmwaresa8620p_firmwaresa6155p_firmwareqca6678aq_firmwaresa8775p_firmwareqcm6490_firmwaresa8650p_firmwarewsa8840_firmwarefastconnect_6900_firmwaresrv1h_firmwareqca6797aq_firmwarewcn3988_firmwaresa8155p_firmwaresa7775p_firmwarefastconnect_6700_firmwaresa7255p_firmwarewsa8810_firmwareqcs8250_firmwarefastconnect_7800_firmwarewcd9395_firmwaresa8255p_firmwaresw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqamsrv1m_firmwareqca6698aq_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqam8775p_firmwareqca6696_firmwareqca6595_firmwareqcs6490_firmwareqcs5430_firmwareqca6391_firmwarewcd9370_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresw5100_firmwareqam8620p_firmwaresa8295p_firmwareqcm6125_firmware
CWE ID-CWE-416
Use After Free
CVE-2025-50153
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.39%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 17:09
Updated-13 Feb, 2026 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Desktop Window Manager Elevation of Privilege Vulnerability

Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1809windows_10_22h2windows_server_2012windows_server_2008windows_server_2019windows_10_1507windows_10_21h2windows_11_23h2windows_server_2022windows_server_2016windows_10_1607windows_11_22h2Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows Server 2012 R2Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2012Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-416
Use After Free
CVE-2025-49733
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.91%
||
7 Day CHG+0.01%
Published-08 Jul, 2025 | 16:58
Updated-26 Feb, 2026 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Win32k Elevation of Privilege Vulnerability

Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_server_2022windows_11_24h2windows_server_2022_23h2windows_11_22h2windows_11_23h2windows_10_1809windows_server_2025windows_10_21h2windows_server_2019Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 11 version 22H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows 10 Version 1809Windows Server 2025 (Server Core installation)
CWE ID-CWE-416
Use After Free
CVE-2025-49726
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.91%
||
7 Day CHG+0.01%
Published-08 Jul, 2025 | 16:57
Updated-13 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Notification Elevation of Privilege Vulnerability

Use after free in Windows Notification allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_server_2022windows_11_24h2windows_server_2022_23h2windows_11_22h2windows_11_23h2windows_10_1607windows_10_1809windows_server_2019windows_server_2025windows_10_21h2windows_server_2016Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows 10 Version 21H2
CWE ID-CWE-416
Use After Free
CVE-2025-49761
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.39%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 17:09
Updated-26 Feb, 2026 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Elevation of Privilege Vulnerability

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_11_23h2windows_10_22h2windows_server_2008windows_server_2019windows_10_1507windows_server_2022windows_server_2022_23h2windows_10_1809windows_10_21h2windows_server_2016windows_server_2025windows_11_24h2windows_11_22h2windows_server_2012Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 R2 Service Pack 1Windows Server 2012 R2Windows Server 2025 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H2Windows 11 version 22H3Windows Server 2019Windows 10 Version 1607Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2022Windows 10 Version 1507Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2016 (Server Core installation)Windows 11 Version 24H2Windows Server 2016Windows 10 Version 1809
CWE ID-CWE-416
Use After Free
CVE-2025-49725
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.91%
||
7 Day CHG+0.01%
Published-08 Jul, 2025 | 16:58
Updated-13 Feb, 2026 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Notification Elevation of Privilege Vulnerability

Use after free in Windows Notification allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_server_2022windows_11_24h2windows_server_2022_23h2windows_11_22h2windows_11_23h2windows_10_1607windows_10_1809windows_server_2019windows_server_2025windows_10_21h2windows_server_2016Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows 10 Version 21H2
CWE ID-CWE-416
Use After Free
CVE-2025-50175
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 28.75%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 17:00
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Digital Media Elevation of Privilege Vulnerability

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_22h2windows_10_21h2windows_11_23h2windows_11_24h2windows_server_2022windows_10_22h2windows_server_2022_23h2windows_10_1809windows_server_2025windows_server_2019windows_11_25h2Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 11 version 22H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows 10 Version 1809Windows Server 2025 (Server Core installation)
CWE ID-CWE-416
Use After Free
CVE-2024-21472
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.70%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:06
Updated-13 Jan, 2025 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Kernel

Memory corruption in Kernel while handling GPU operations.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8770p_firmwaresnapdragon_685_4g_mobile_firmwarewsa8840_firmwareqam8255p_firmwareqca6797aq_firmwarefastconnect_7800_firmwaresa8155pqam8255pqca6595au_firmwaresnapdragon_auto_5g_modem-rf_gen_2sg8275p_firmwarewsa8845_firmwareqam8650p_firmwareqca6574_firmwaresnapdragon_8_gen_1_mobilesa8255p_firmwareqca6595ausnapdragon_auto_5g_modem-rf_gen_2_firmwarewcd9390wsa8835snapdragon_680_4g_mobilewcn3950fastconnect_7800wsa8845h_firmwarewcd9395_firmwarewsa8830sa8295p_firmwareqca6696qcm4325sa8295pqca6584au_firmwarefastconnect_6900qca6574au_firmwaresnapdragon_685_4g_mobilewsa8845snapdragon_680_4g_mobile_firmwareqcm4325_firmwareqca6584auqca6595sa8155p_firmwarewsa8835_firmwareqca6595_firmwaresa8255pwcd9390_firmwareqca6574aqca6797aqwsa8845hqam8775p_firmwarewcd9385_firmwarefastconnect_6900_firmwareqam8295p_firmwarewcd9380wcn3950_firmwarewcd9385wcd9395qam8650psa8770psa8195p_firmwareqca6574a_firmwareqca6574qca6696_firmwaresa8775psa6155pwsa8830_firmwaresa9000p_firmwareqca6698aqsa6155p_firmwareqam8775pqam8295pwcd9380_firmwaresa9000psnapdragon_8_gen_1_mobile_firmwaresa8775p_firmwareqca6698aq_firmwarewsa8840sg8275pqca6574ausa8195pSnapdragonqam8255p_firmwaresa6155p_firmwarewcd9380_firmwaresa8775p_firmwarewsa8840_firmwaresg8275p_firmwarefastconnect_6900_firmwareqca6797aq_firmwaresa8155p_firmwarewcn3950_firmwarefastconnect_7800_firmwareqca6595au_firmwarewcd9395_firmwaresa8255p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6584au_firmwareqca6696_firmwareqca6595_firmwarewcd9385_firmwareqcm4325_firmwareqca6574_firmwarewcd9390_firmwarewsa8830_firmwarewsa8845_firmwareqam8295p_firmwaresa9000p_firmwareqca6574a_firmwarewsa8835_firmwareqca6574au_firmwaresa8195p_firmwarewsa8845h_firmwaresa8295p_firmwaresnapdragon_680_4g_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-21471
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.11% / 29.80%
||
7 Day CHG~0.00%
Published-06 May, 2024 | 14:32
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Graphics Linux

Memory corruption when IOMMU unmap of a GPU buffer fails in Linux.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_x20_lte_modemqcm8550_firmwareqcs410_firmwaresd865_5grobotics_rb3sa6150p_firmwaresw5100psxr1120qca6595qcs610_firmwarewcd9335wcd9370qca8081_firmwareqca6696wcd9340_firmwaresa8530pwcd9341_firmwarewcd9395_firmwareqcn6024qca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700wcn3610snapdragon_780g_5g_mobilesnapdragon_685_4g_mobilesa4150psnapdragon_782g_mobile_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395qca6574au_firmwaresm6370qam8295pwcd9341qca6574ausnapdragon_820_automotive205_mobilesnapdragon_888\+_5g_mobile_firmwaresnapdragon_x12_lte_modemwsa8810_firmwarewsa8845h_firmwarewcd9390sa8620p_firmwarecsra6640snapdragon_212_mobilesnapdragon_778g_5g_mobile_firmwaresa9000p_firmwaresrv1hwcn3660b_firmwaresnapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430sd835_firmwareqcn6024_firmwaresdx20mqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psa8770pqcm6125_firmwarec-v2x_9150ssg2115psnapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaresa8540psxr1120_firmwareqsm8350_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformsa7255pwcd9385_firmwareqca6310qam8255p_firmwareqca6335snapdragon_x65_5g_modem-rfqcs4490mdm9250snapdragon_680_4g_mobilewsa8845sa6155pqcm6125snapdragon_212_mobile_firmwareqca6564au_firmwarewsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresa9000psnapdragon_835_mobilesrv1h_firmwaresnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesxr2250p_firmwaresm7315_firmwarewcd9326_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwaresnapdragon_845_mobile_firmwarewsa8840srv1m_firmwareqcs8550_firmwaresnapdragon_782g_mobilesd835snapdragon_8_gen_2_mobile_firmwaresnapdragon_4_gen_2_mobile_firmwareqca6436_firmwareqcn9012mdm9650_firmwaresnapdragon_695_5g_mobile_firmwareqcs4490_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_8_gen_2_mobilewcd9370_firmwaremdm9250_firmwaresnapdragon_835_mobile_firmwarewcn3660bqca6574asa7255p_firmwaresnapdragon_8\+_gen_2_mobileqca6174asa8195pwcd9340qcs8250_firmwaretalynplusqca6335_firmwareqcm6490sa8540p_firmwaresm8550p_firmwaresxr2250pqcm8550snapdragon_x20_lte_modem_firmwarewcn3988sm6370_firmwareqcn9024sa8775pqca6574215_mobilesxr2230p_firmwareqcn9011sa8775p_firmwareqamsrv1hsmart_audio_400qcn9024_firmwarewsa8845hsa6150pwcd9326qcs410sa8155p_firmwareqca6564asa8155pwsa8830sm8550psa6145psa8255p_firmwarear8035qamsrv1m_firmwaresnapdragon_4_gen_2_mobileqrb5165m_firmwaresa8650p_firmwareqcm4325snapdragon_865\+_5g_mobile_firmwareqca6698aqwcn3950_firmwaressg2125p_firmwareqrb5165nsa8530p_firmwaresnapdragon_480\+_5g_mobilefastconnect_6200wcn3680bsm7325p_firmwaresa8145p_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_210_firmwaresnapdragon_660_mobile_firmwaresa8150p_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresnapdragon_8_gen_3_mobileqcs6490snapdragon_210qcs8250snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarewsa8830_firmwareqca6678aq_firmwarewsa8845_firmwaresd660_firmwarewsa8832snapdragon_480_5g_mobilesrv1mqca6678aqar8035_firmware205_mobile_firmwaresnapdragon_778g\+_5g_mobileqrb5165mqca6320sa4150p_firmwaresd888_firmwareqca6564auqcs6125_firmwarewsa8815_firmwaresa8195p_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresg8275p_firmwareqca9377_firmwareqcm6490_firmwareqcm4490_firmwarewcn3950qcs6125flight_rb5_5gsnapdragon_870_5g_mobile_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computetalynplus_firmwaresnapdragon_778g\+_5g_mobile_firmwaresa8295p_firmwaresmart_audio_400_firmwaresnapdragon_870_5g_mobilesa4155p_firmwaresd888qca6320_firmwareqcn9011_firmwaresw5100_firmwarewcn6740snapdragon_780g_5g_mobile_firmwareqca6310_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwarefastconnect_6800qcs7230qca6595_firmwarefastconnect_7800_firmwaresnapdragon_865_5g_mobile_firmwarefastconnect_6900_firmwarerobotics_rb5_firmwarewcd9380sa6145p_firmwareqam8255psxr2230psnapdragon_xr2_5gsa8150psnapdragon_auto_5g_modem-rf_firmwaresxr1230psw5100video_collaboration_vc3_platformsnapdragon_4_gen_1_mobile_firmware215_mobile_firmwarec-v2x_9150_firmwareqam8295p_firmwarewcn3990_firmwaresm7315snapdragon_660_mobileqca6698aq_firmwareqca6564a_firmwaresdx20m_firmwaresnapdragon_888\+_5g_mobileqsm8350wcd9385snapdragon_8_gen_1_mobilesnapdragon_680_4g_mobile_firmwarewcn3610_firmwaresa8255pqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwaresnapdragon_865\+_5g_mobilesg8275pmdm9650sdx55_firmwaresnapdragon_auto_5g_modem-rfflight_rb5_5g_firmwaressg2125pqcm4490snapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwaresnapdragon_480\+_5g_mobile_firmwareqamsrv1mrobotics_rb5qca6174a_firmwaresm7325pqam8650p_firmwarevideo_collaboration_vc5_platformqcs6490_firmwarewcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6436wsa8835wsa8840_firmwareqca6391_firmwareqca6595au_firmwareqcs610sw5100p_firmwareqca6696_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081sd660mdm9628wsa8815sg4150pqam8775pqca9377snapdragon_ar2_gen_1_firmwaresd_8_gen1_5gqca6797aqmdm9628_firmwareqcm4325_firmwaresa8620pqca6574a_firmwaresdx55snapdragon_4_gen_1_mobilesnapdragon_865_5g_mobilesd_8_gen1_5g_firmwarewcd9375_firmwareqca6391qcn9012_firmwareqcs5430_firmwaresg4150p_firmwaresa8770p_firmwarecsra6620_firmwaresa8295pqcs8550fastconnect_7800sa8650pqam8775p_firmwaresd865_5g_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_xr1wcd9375snapdragon_ar2_gen_1wcn3988_firmwareqamsrv1h_firmwaresa8145psnapdragon_8\+_gen_1_mobile_firmwarewsa8835_firmwaressg2115p_firmwarewcn3980wcn3680b_firmwaresnapdragon_w5\+_gen_1_wearablesnapdragon_8_gen_1_mobile_firmwareSnapdragonqam8255p_firmwarequalcomm_video_collaboration_vc1_platform_firmwarerobotics_rb5_platform_firmwareqca8337_firmwareqca9377_firmwaresa6150p_firmwareqcs7230_firmwaremdm9628_firmwareflight_rb5_5g_platform_firmwareqca6595au_firmwarecsra6620_firmwarecsra6640_firmwareqcm5430_firmwareqcs6125_firmwarec-v2x_9150_firmwareqca6310_firmwareqrb5165n_firmwareqcn9012_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6335_firmwareqcn6024_firmwareqcm4325_firmwareqamsrv1h_firmwareqca6574_firmwareqsm8350_firmwaremdm9650_firmwareqam8295p_firmwareqcn9011_firmwareqca6426_firmwareqca6574a_firmwarefastconnect_6200_firmwareqca6320_firmwareqca6574au_firmwareqca8081_firmwareqca6436_firmwareqca6564au_firmwaresa6155p_firmwareqcm4490_firmwareqcm8550_firmwareqca6678aq_firmwareqcs4490_firmwareqcm6490_firmwareqrb5165m_firmwaresa4155p_firmwarefastconnect_6900_firmwarerobotics_rb3_platform_firmwareqcs8550_firmwareqca6797aq_firmwaresa6145p_firmwareqca6564a_firmwareqcn9024_firmwarefastconnect_6700_firmwareqcs8250_firmwarefastconnect_7800_firmwareqcs610_firmwareqca6698aq_firmwareqamsrv1m_firmwarequalcomm_215_mobile_platform_firmwareqca6174a_firmwaremdm9250_firmwareqam8650p_firmwarequalcomm_205_mobile_platform_firmwareqam8775p_firmwareqca6696_firmwareqca6595_firmwareqcs6490_firmwareqcs5430_firmwareqca6391_firmwaresa4150p_firmwarequalcomm_video_collaboration_vc5_platform_firmwarefastconnect_6800_firmwareqcs410_firmwarear8035_firmwareqcm6125_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-38399
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.11% / 29.86%
||
7 Day CHG+0.02%
Published-07 Oct, 2024 | 12:58
Updated-16 Oct, 2024 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Graphics

Memory corruption while processing user packets to generate page faults.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresnapdragon_8_gen_1_mobile_platformwsa8830wcd9380_firmwareqam8650pqca6595qam8775pqamsrv1mwsa8835wcn3950_firmwarewcd9380snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwareqca6595au_firmwaresnapdragon_685_4g_mobile_platform_\(sm6225-ad\)wcd9370qamsrv1hqam8295pwcn3950sa8650pqamsrv1h_firmwaresa9000pqca6688aqqam8295p_firmwaresa9000p_firmwaresa8775pqca6574au_firmwaresa7255pwcd9375_firmwareqca6595ausnapdragon_680_4g_mobile_platform_firmwaresa8295pfastconnect_7800sa8620p_firmwaresa6155p_firmwaresa8775p_firmwaresa8650p_firmwareqca6698aqfastconnect_6900srv1h_firmwarefastconnect_6900_firmwareqca6797aq_firmwareqca6574ausrv1hsa8155p_firmwaresa7775p_firmwaresa8195psa7255p_firmwarewsa8810_firmwarefastconnect_7800_firmwarewsa8810sa8620psa8255p_firmwaresg4150psa6155psnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_680_4g_mobile_platformqca6698aq_firmwaresrv1m_firmwaresa7775pqamsrv1m_firmwareqam8650p_firmwaresa8770p_firmwaresa8255pqam8775p_firmwareqca6696_firmwareqca6595_firmwareqca6696qca6797aqwcd9375wcd9370_firmwaresa8155pwsa8830_firmwarewsa8835_firmwaresrv1msa8195p_firmwaresa8295p_firmwareqam8255psg4150p_firmwaresa8770pqca6688aq_firmwareSnapdragonqam8255p_firmwaresa8620p_firmwaresa6155p_firmwarewcd9380_firmwaresa8775p_firmwaresa8650p_firmwarefastconnect_6900_firmwaresrv1h_firmwareqca6797aq_firmwaresa8155p_firmwaresa7775p_firmwaresa7255p_firmwarewcn3950_firmwarewsa8810_firmwarefastconnect_7800_firmwareqca6595au_firmwaresa8255p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqam8775p_firmwareqca6696_firmwareqca6595_firmwareqamsrv1h_firmwarewcd9370_firmwarewsa8830_firmwareqam8295p_firmwaresa9000p_firmwarewsa8835_firmwareqca6574au_firmwaresa8195p_firmwarewcd9375_firmwaresa8295p_firmwaresg4150p_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6688aq_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-38085
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-4.33% / 88.76%
||
7 Day CHG-0.11%
Published-09 Jul, 2024 | 17:02
Updated-10 Feb, 2026 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Graphics Component Elevation of Privilege Vulnerability

Windows Graphics Component Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2008 Service Pack 2Windows 11 version 21H2Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows Server 2012 R2Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 Service Pack 2Windows Server 2012Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-416
Use After Free
CVE-2022-36847
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4.9||MEDIUM
EPSS-0.02% / 4.97%
||
7 Day CHG~0.00%
Published-09 Sep, 2022 | 14:39
Updated-03 Aug, 2024 | 10:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free vulnerability in mtp_send_signal function of MTP driver prior to SMR Sep-2022 Release 1 allows attackers to perform malicious actions.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-416
Use After Free
CVE-2022-36855
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 5.27%
||
7 Day CHG~0.00%
Published-09 Sep, 2022 | 14:40
Updated-03 Aug, 2024 | 10:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use after free vulnerability in iva_ctl driver prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-416
Use After Free
CVE-2024-21468
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.06% / 18.70%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 15:06
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Kernel

Memory corruption when there is failed unmap operation in GPU.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_wear_3100_firmwaresdm429w_firmwaresnapdragon_x20_lte_modemrobotics_rb3sd865_5gapq8017qcs8155_firmwareqcs410_firmwaresnapdragon_632_mobilesa6150p_firmwaresw5100pqca6595sxr1120qcs610_firmwarewcd9335wcd9370qca8081_firmwaresnapdragon_670_mobileqca6696wcd9340_firmwarewcd9341_firmwareqcn6024qca6426wcn6740_firmwarefastconnect_6700wcn3610snapdragon_780g_5g_mobilesnapdragon_750g_5g_mobilevision_intelligence_200_firmwaresnapdragon_685_4g_mobilesa4150psnapdragon_782g_mobile_firmwaresnapdragon_x50_5g_modem-rf_firmwaresnapdragon_wear_4100\+_firmwareqca8337qca6426_firmwaresnapdragon_auto_4g_modemsnapdragon_665_mobile_firmwareqca6574au_firmwaresnapdragon_690_5g_mobile_firmwareqca6564_firmwaresm6370qam8295pwcd9341sd626_firmwareqca6574ausnapdragon_820_automotive205_mobilesnapdragon_888\+_5g_mobile_firmwaresnapdragon_x12_lte_modemwsa8810_firmwaresd730_firmwarecsra6640snapdragon_212_mobilemsm8209_firmwaresnapdragon_778g_5g_mobile_firmwarewcn3660b_firmwaresd730snapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430snapdragon_690_5g_mobilesd835_firmwareqcn6024_firmwaresdx20msnapdragon_636_mobile_firmwareqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_625_mobilesnapdragon_210_processor_firmwareqcm6125_firmwarec-v2x_9150snapdragon_678_mobile_firmwaresnapdragon_425_mobilesd821snapdragon_xr2_5g_firmwaresnapdragon_632_mobile_firmwaremsm8108snapdragon_xr1_firmwaresxr1120_firmwareqsm8250_firmwaresnapdragon_x5_lte_modem_firmwareqsm8350_firmwaresnapdragon_wear_4100\+315_5g_iot_modem_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformsnapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200315_5g_iot_modemqca6310sa8155_firmwarewcd9360qca6335snapdragon_x65_5g_modem-rfsnapdragon_730_mobilesd821_firmwaresnapdragon_wear_3100mdm9250snapdragon_680_4g_mobilesnapdragon_626_mobile_firmwaresa6155pqca6421_firmwareqcm6125snapdragon_212_mobile_firmwareqca6564au_firmwaresd820snapdragon_429_mobile_firmwarewsa8810video_collaboration_vc5_platform_firmwaresnapdragon_835_mobileqsm8250snapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwaresnapdragon_wear_2500snapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwarewcd9326_firmwaremdm9640_firmwaresnapdragon_845_mobile_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesd835snapdragon_x55_5g_modem-rfqca6436_firmwareqcn9012mdm9650_firmwaresnapdragon_695_5g_mobile_firmwarewcd9371_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewcn3910_firmwaresm4125_firmwaresnapdragon_460_mobileqca6420qca6174_firmwarewcn3910apq8064au_firmwarewcd9370_firmwarecsrb31024qca9367mdm9250_firmwaresnapdragon_835_mobile_firmwarewcn3660bqca6574awcn3620_firmwareqca6174aqca6584_firmwaresa8195pwcd9340qcs8250_firmwareqcm2290snapdragon_1200_wearable_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6335_firmwareqcm6490snapdragon_x20_lte_modem_firmwarewcn3988snapdragon_765_5g_mobile_firmwaresm6370_firmwaresnapdragon_662_mobileqcn9024vision_intelligence_300_firmwareqca9379qca6574215_mobilesd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwareqcn9011smart_audio_400qcn9024_firmwaresa6150pwcd9326qcs410qcm2290_firmwarevision_intelligence_100sa8155p_firmwaresnapdragon_630_mobilesa8155phome_hub_100snapdragon_765g_5g_mobile_firmwaresnapdragon_wear_2100_firmwaresmart_display_200_firmwarewsa8830qca6564asa6145psnapdragon_wear_2100qcn9074_firmwaresnapdragon_768g_5g_mobile_firmwaresnapdragon_625_mobile_firmwarear8035msm8996auqca6564sa6155qrb5165m_firmwaresnapdragon_820_mobile_firmwarewcn3620snapdragon_208_processor_firmwaresnapdragon_865\+_5g_mobile_firmwaresnapdragon_x5_lte_modemsnapdragon_429_mobileapq8064auqca6698aqwcn3950_firmwaresm6250qrb5165nsnapdragon_480\+_5g_mobilefastconnect_6200sd670wcn3680bsm7325p_firmwaresa8145p_firmwarewcd9360_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_660_mobile_firmwareqcs8155sa8150p_firmwarefastconnect_6700_firmwaresnapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresd670_firmwaresnapdragon_855_mobileqcs6490qcs8250snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarear8031_firmwarehome_hub_100_firmwaresnapdragon_460_mobile_firmwarewsa8830_firmwarevision_intelligence_100_firmwareqca6431sd660_firmwarewcd9385snapdragon_auto_4g_modem_firmwaresnapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwareqca9379_firmwaresxr2130_firmwaresnapdragon_860_mobile_firmwarear8035_firmware205_mobile_firmwaresnapdragon_778g\+_5g_mobileqrb5165mqca6320sa4150p_firmwaremsm8608_firmwaresd888_firmwaremsm8209qca6564auqcs6125_firmwaresnapdragon_820_mobilesnapdragon_425_mobile_firmwareqcn9074wsa8815_firmwaresa8195p_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwareqcm4290msm8608ar8031snapdragon_xr2\+_gen_1qca9377_firmwareqcm6490_firmwaresnapdragon_665_mobilesm7250p_firmwarewcn3680_firmwaresm4125vision_intelligence_400_firmwarewcn3950qcs6125flight_rb5_5gsnapdragon_870_5g_mobile_firmwaresnapdragon_730g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobilesnapdragon_778g\+_5g_mobile_firmwaresa8295p_firmwaresmart_audio_400_firmwaresd_675_firmwaresnapdragon_870_5g_mobilesmart_audio_200_firmwaresa4155p_firmwaresnapdragon_720g_mobilesnapdragon_678_mobilesm7250pcsrb31024_firmwaresa8155sm6250_firmwareqca6584ausd888qca6320_firmwareqcn9011_firmwaresnapdragon_675_mobile_firmwaresnapdragon_wear_2500_firmwaresw5100_firmwarewcn6740snapdragon_768g_5g_mobilesnapdragon_780g_5g_mobile_firmwareqca6310_firmwaresnapdragon_845_mobilesd626fastconnect_6800qca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesnapdragon_865_5g_mobile_firmwarewcd9371fastconnect_6900_firmwarerobotics_rb5_firmwareapq8017_firmwarewcd9380sa6145p_firmwaresa6155_firmwaresmart_audio_200snapdragon_xr2_5gsa8150psnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_1200_wearablesnapdragon_auto_5g_modem-rf_firmwaresw5100video_collaboration_vc3_platformaqt1000snapdragon_4_gen_1_mobile_firmware215_mobile_firmwarec-v2x_9150_firmwareqam8295p_firmwaresd855qca6431_firmwarewcd9330_firmwareqca6174wcn3990_firmwaresm7315snapdragon_660_mobileqca6698aq_firmwareqcs2290sdx20m_firmwareqca6564a_firmwaresnapdragon_888\+_5g_mobileqcs2290_firmwareqsm8350snapdragon_xr2\+_gen_1_firmwarewcn3615qca9367_firmwaremsm8909w_firmwaresnapdragon_8_gen_1_mobilesnapdragon_630_mobile_firmwarewcd9330wcn3680snapdragon_680_4g_mobile_firmwarewcn3610_firmwareqcs4290snapdragon_821_mobilesnapdragon_865\+_5g_mobilesd820_firmwareqca6430snapdragon_855\+_mobilemdm9650snapdragon_765_5g_mobilesnapdragon_860_mobilesdx55_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_208_processorwcn3615_firmwareflight_rb5_5g_firmwaresnapdragon_210_processorsxr21309206_lte_modem_firmwaremsm8108_firmwaresnapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwaresnapdragon_480\+_5g_mobile_firmwarerobotics_rb5qca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfvideo_collaboration_vc5_platformsnapdragon_670_mobile_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresdm429wsd855_firmwarewcd9335_firmwaremdm9640qca6436qrb5165n_firmwarewcn3980_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwareqca6584au_firmwareqca6595au_firmwareqcs610sw5100p_firmwareqca6696_firmwareqcs4290_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081sd660mdm9628wsa8815qca9377mdm9628_firmwaresnapdragon_439_mobile_firmware9206_lte_modemqca6574a_firmwaresdx55snapdragon_4_gen_1_mobileqcm4290_firmwaresnapdragon_720g_mobile_firmwaresnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675snapdragon_821_mobile_firmwarewcd9375_firmwareqca6391snapdragon_710_mobileqcn9012_firmwareqcs5430_firmwaresnapdragon_439_mobileqca6584csra6620_firmwaresa8295pfastconnect_7800snapdragon_626_mobilesd865_5g_firmwaresnapdragon_xr1wcd9375vision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmwaresnapdragon_636_mobilesa8145psd_675vision_intelligence_400wsa8835_firmwaresmart_display_200wcn3980msm8909wwcn3680b_firmwaresnapdragon_w5\+_gen_1_wearablesnapdragon_8_gen_1_mobile_firmwareSnapdragonqca9377_firmwaresnapdragon_662_mobile_platform_firmwaremdm9640_firmwaresa6150p_firmwaresa8145p_firmware315_5g_iot_modem_firmwareqcs2290_firmwaresnapdragon_x24_lte_modem_firmwareqca6431_firmwaremdm9628_firmwaresnapdragon_820_automotive_platform_firmwarewcd9360_firmwareflight_rb5_5g_platform_firmwaresnapdragon_wear_2100_platform_firmwaresnapdragon_x20_lte_modem_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_xr1_platform_firmwareqca6174_firmwaresd730_firmwaresnapdragon_auto_4g_modem_firmwarecsra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwareqca6584au_firmwarewcn3990_firmwareqrb5165n_firmwarequalcomm_video_collaboration_vc3_platform_firmwaremsm8108_firmwarewcd9371_firmwarewcd9385_firmwareqcn6024_firmwarewcd9326_firmwarewcn3615_firmwaresnapdragon_1200_wearable_platform_firmwareqsm8350_firmwaresnapdragon_660_mobile_platform_firmwareqam8295p_firmwareqcn9011_firmwaresm7315_firmwareqca6320_firmwaresnapdragon_429_mobile_platform_firmwareqca6574au_firmwaresdx55_firmwaresnapdragon_208_processor_firmwaresnapdragon_212_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca8081_firmwaresa6155_firmwaresnapdragon_835_mobile_pc_platform_firmwaresm7250p_firmwarewcd9375_firmwarewcn3610_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa6155p_firmwareqca9367_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_821_mobile_platform_firmwaresmart_audio_400_platform_firmwaresnapdragon_x5_lte_modem_firmwareqrb5165m_firmwaresa4155p_firmwaresa8155_firmwarerobotics_rb3_platform_firmwarevision_intelligence_300_platform_firmwarewcn3988_firmwaresa6145p_firmwarefastconnect_6700_firmwareapq8017_firmwaresd626_firmwaresnapdragon_626_mobile_platform_firmwarewsa8810_firmwarehome_hub_100_platform_firmwareqca6698aq_firmwaremsm8209_firmwareqca6174a_firmwaremdm9250_firmwareqcs4290_firmwarequalcomm_205_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_x12_lte_modem_firmwaresnapdragon_665_mobile_platform_firmwarewcn3910_firmwaresnapdragon_855_mobile_platform_firmwaresnapdragon_210_processor_firmwaresm6250_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3620_firmwarewsa8815_firmwarewsa8835_firmwaresd660_firmwaresnapdragon_636_mobile_platform_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresxr1120_firmwaresa8295p_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqcm6125_firmwaresnapdragon_675_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc1_platform_firmwarerobotics_rb5_platform_firmwareqca8337_firmwarewcd9380_firmwaresnapdragon_778g_5g_mobile_platform_firmwaremsm8996au_firmwaresnapdragon_670_mobile_platform_firmwaremsm8909w_firmwaresd670_firmwaresdm429w_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_425_mobile_platform_firmwareqca9379_firmwarec-v2x_9150_firmwareqca6310_firmwareqca6430_firmwareqcn9012_firmwaresm6370_firmwarewcd9335_firmwareqca6335_firmwareqca6574_firmwarewcd9340_firmwaresm4125_firmwarewcn3680b_firmwaresm7325p_firmwareqca6584_firmwaremdm9650_firmwaresnapdragon_630_mobile_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6426_firmwaresnapdragon_xr2_5g_platform_firmwarewcn3660b_firmwareqca6574a_firmwarefastconnect_6200_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcd9330_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd821_firmwaresnapdragon_690_5g_mobile_platform_firmwaresnapdragon_845_mobile_platform_firmwaresnapdragon_632_mobile_platform_firmwareapq8064au_firmwarear8031_firmwarecsrb31024_firmwareqcm6490_firmwarewcn3680_firmwarefastconnect_6900_firmware9206_lte_modem_firmwaresa8155p_firmwaresmart_audio_200_platform_firmwareqca6564a_firmwareqcn9024_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwaresdx20m_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarequalcomm_215_mobile_platform_firmwaresd835_firmwareqca6564_firmwaresnapdragon_wear_2500_platform_firmwareqca6595_firmwareqcs5430_firmwaresd820_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresa4150p_firmwaremsm8608_firmwarewcd9370_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwaresnapdragon_820_mobile_platform_firmwaresnapdragon_wear_3100_platform_firmwareqcs8155_firmwareqcn9074_firmwareqcs410_firmwaresw5100_firmwaresnapdragon_720g_mobile_platform_firmwarear8035_firmwareqsm8250_firmwaresnapdragon_625_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2020-1712
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.72%
||
7 Day CHG~0.00%
Published-31 Mar, 2020 | 16:44
Updated-09 Jun, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.

Action-Not Available
Vendor-systemd_project[UNKNOWN]Debian GNU/LinuxRed Hat, Inc.
Product-ceph_storagemigration_toolkitdebian_linuxopenshift_container_platformenterprise_linuxsystemddiscoverysystemd
CWE ID-CWE-416
Use After Free
CVE-2024-38147
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-5.17% / 89.77%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 17:30
Updated-10 Jul, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft DWM Core Library Elevation of Privilege Vulnerability

Microsoft DWM Core Library Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_server_2022_23h2windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_11_23h2Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2022Windows 11 version 22H2Windows 11 Version 24H2Windows 11 Version 23H2Windows 11 version 21H2Windows 10 Version 22H2Windows 10 Version 21H2
CWE ID-CWE-416
Use After Free
CVE-2025-48806
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.91%
||
7 Day CHG+0.01%
Published-08 Jul, 2025 | 16:57
Updated-26 Feb, 2026 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability

Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2012windows_10_22h2windows_server_2022_23h2windows_10_21h2windows_11_24h2windows_server_2019windows_server_2025windows_server_2022windows_10_1607windows_11_23h2windows_10_1809windows_server_2016windows_server_2008windows_10_1507windows_11_22h2Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows Server 2012 R2Windows Server 2025 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2016Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H2Windows 11 version 22H3Windows Server 2019Windows 10 Version 1607Windows Server 2022Windows 10 Version 1507Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2016 (Server Core installation)Windows 11 Version 24H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809
CWE ID-CWE-416
Use After Free
CVE-2024-20681
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.25% / 48.52%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 17:57
Updated-03 Jun, 2025 | 14:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Subsystem for Linux Elevation of Privilege Vulnerability

Windows Subsystem for Linux Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_server_2022_23h2windows_11_22h2windows_11_21h2windows_10_22h2windows_server_2022windows_11_23h2Windows 11 Version 23H2Windows 11 version 22H2Windows 10 Version 21H2Windows Server 2022Windows 10 Version 22H2Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 21H2
CWE ID-CWE-416
Use After Free
CVE-2024-38249
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.63% / 69.94%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 16:53
Updated-31 Dec, 2024 | 23:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Graphics Component Elevation of Privilege Vulnerability

Windows Graphics Component Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 1607Windows 11 version 22H3Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2Windows 11 Version 24H2
CWE ID-CWE-416
Use After Free
CVE-2022-36849
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4.9||MEDIUM
EPSS-0.02% / 4.97%
||
7 Day CHG~0.00%
Published-09 Sep, 2022 | 14:39
Updated-03 Aug, 2024 | 10:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free vulnerability in sdp_mm_set_process_sensitive function of sdpmm driver prior to SMR Sep-2022 Release 1 allows attackers to perform malicious actions.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-416
Use After Free
CVE-2024-38059
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-8.96% / 92.49%
||
7 Day CHG-0.71%
Published-09 Jul, 2024 | 17:02
Updated-10 Feb, 2026 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Win32k Elevation of Privilege Vulnerability

Win32k Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_server_2022_23h2windows_11_22h2windows_11_21h2windows_10_22h2windows_server_2022windows_11_23h2Windows Server 2022Windows 11 version 21H2Windows 11 Version 23H2Windows 11 version 22H2Windows 10 Version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows 10 Version 22H2
CWE ID-CWE-416
Use After Free
CVE-2024-20683
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-2.92% / 86.22%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 17:56
Updated-03 Jun, 2025 | 14:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Win32k Elevation of Privilege Vulnerability

Win32k Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows 11 Version 23H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows 10 Version 1809Windows Server 2012 (Server Core installation)Windows Server 2022Windows Server 2016 (Server Core installation)Windows Server 2008 Service Pack 2Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2Windows 10 Version 1507Windows 11 version 22H2Windows Server 2012Windows Server 2008 R2 Service Pack 1Windows 10 Version 1607Windows 10 Version 21H2Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows Server 2019Windows Server 2019 (Server Core installation)Windows 10 Version 22H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2016Windows 11 version 21H2
CWE ID-CWE-416
Use After Free
CVE-2024-38415
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.20% / 41.95%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-07 Nov, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Computer Vision

Memory corruption while handling session errors from firmware.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresnapdragon_8_gen_1_mobile_platformsa6150p_firmwareqcs610qca8337sg8275p_firmwareqca6431_firmwaresnapdragon_778g\+_5g_mobile_platformsnapdragon_870_5g_mobile_platform_firmwaresnapdragon_888_5g_mobile_platformwsa8840wcn3950_firmwaresa8150p_firmwarewcn6755_firmwareqcs2290qca6595au_firmwaresnapdragon_480_5g_mobile_platformvideo_collaboration_vc3_platformcsra6620_firmwarecsra6640_firmwaresnapdragon_460_mobile_platform_firmwareqcm5430_firmwaresnapdragon_480_5g_mobile_platform_firmwareqam8295pwcn3950sm4125qcn6024_firmwaremdm9628sd_8_gen1_5g_firmwarewcn3660bqsm8350_firmwaresnapdragon_660_mobile_platform_firmwaresnapdragon_460_mobile_platformqsm8350sm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwarewcd9375_firmwareqca8081_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_xr2\+_gen_1_platformsnapdragon_782g_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_firmwarewcn7881smart_audio_400_platform_firmwareqrb5165m_firmwarewsa8840_firmwaresa4155p_firmwareqca6698aqsm8635snapdragon_765g_5g_mobile_platformsnapdragon_8\+_gen_1_mobile_platformsw5100snapdragon_780g_5g_mobile_platformwcn6755qca6436sm8750p_firmwaresm8750_firmwaresa6155psnapdragon_765_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformqca6698aq_firmwaresxr2250pwcd9341qca6431qca6696_firmwaresnapdragon_x12_lte_modemwcn3910_firmwaresa8150probotics_rb5_platformwsa8830_firmwaresd865_5g_firmwaresd660snapdragon_7c\+_gen_3_compute_firmwarewcn3988sd660_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresnapdragon_685_4g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresa8295p_firmwaresnapdragon_750g_5g_mobile_platform_firmwarewcd9380_firmwareqca8337_firmwaressg2125psnapdragon_778g_5g_mobile_platform_firmwaresw5100psnapdragon_w5\+_gen_1_wearable_platformqcm8550qca6564ausnapdragon_670_mobile_platform_firmwaresd670_firmwareqca6574snapdragon_7c\+_gen_3_computewcd9380snapdragon_782g_mobile_platformfastconnect_6700qcs410sm8635_firmwaresxr1230pvideo_collaboration_vc3_platform_firmwaresg8275pqcn9012_firmwarewcn3980qcn9274_firmwarewcd9335_firmwaresm6370_firmwarewsa8845wsa8815wcn3910snapdragon_865\+_5g_mobile_platformsnapdragon_4_gen_1_mobile_platformqcs8250qca6426_firmwarewcn3680sm8750pwcn3660b_firmwaresnapdragon_670_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwareqcn9024wcn3980_firmwaresnapdragon_xr2\+_gen_1_platform_firmwaresa8295pqca6421_firmwarewcn6740_firmwareqcs4490_firmwaresnapdragon_xr2_5g_platformsnapdragon_x65_5g_modem-rf_systemwcn7861_firmware215_mobile_platformwcn3680_firmwarefastconnect_6900fastconnect_6900_firmwaresnapdragon_660_mobile_platformsd670qcn9024_firmwareqca6564a_firmwaresnapdragon_8\+_gen_2_mobile_platformqcm4290_firmwarewsa8832sw5100p_firmwaresa8540pqcs610_firmwareqsm8250sa6145pqcm5430sm8750qcs4490wcn7860_firmwareqca6595_firmwarewcn7861wcd9395qcs5430_firmwaresnapdragon_750g_5g_mobile_platformsnapdragon_888\+_5g_mobile_platform_firmwareqca6391_firmwaresa8145psnapdragon_710_mobile_platform_firmwaresa4150p_firmwarewcd9370_firmwaresm8550p_firmwaresdx55sd888_firmwaresa8155pcsra6640snapdragon_695_5g_mobile_platformvideo_collaboration_vc1_platformssg2115p_firmwaresa4155par8035_firmwareqcm2290qsm8250_firmwaresnapdragon_480\+_5g_mobile_platformtalynplus_firmwarewsa8830snapdragon_662_mobile_platform_firmwaresxr2230p_firmwaresa8145p_firmwareqcs2290_firmwaremdm9628_firmwaresnapdragon_865_5g_mobile_platformflight_rb5_5g_platformcsra6620flight_rb5_5g_platform_firmwareqcs4290snapdragon_888_5g_mobile_platform_firmwarewcd9370ssg2115psnapdragon_480\+_5g_mobile_platform_firmwareqca6426wcn3990_firmwareqrb5165n_firmwaresnapdragon_8_gen_2_mobile_platformqca9377sa8530pwcd9385_firmwarewcn7881_firmwarewcd9326_firmwarefastconnect_6200wcn3615_firmwaretalynplusqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresnapdragon_x55_5g_modem-rf_systemwcn3680b_firmwaresdx55_firmwaresnapdragon_4_gen_2_mobile_platformsnapdragon_778g_5g_mobile_platformwsa8845h_firmwarewcn3615snapdragon_8_gen_3_mobile_platformqca6595ausm7250p_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwarewcn7860qrb5165nsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_870_5g_mobile_platformqcm8550_firmwareqcn9274qcs6490snapdragon_439_mobile_platformvideo_collaboration_vc5_platformqcs8550_firmwarewcn3988_firmwarewcn7880_firmwaresa6145p_firmwareqca6421fastconnect_6700_firmwaresa8195psxr1120wsa8810_firmwarevision_intelligence_400_platformwsa8845hsnapdragon_x62_5g_modem-rf_systemwcd9395_firmwarewcd9335wcd9326snapdragon_ar2_gen_1_platform_firmwareqcs7230qca8081qcm4490snapdragon_888\+_5g_mobile_platformqcs5430qca6174a_firmwareqcs4290_firmwarewcd9385sxr2130_firmwareqcs6490_firmwaresnapdragon_x12_lte_modem_firmwarear8035wcd9375wcd9390vision_intelligence_400_platform_firmwaresnapdragon_662_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_768g_5g_mobile_platform_firmwarewsa8815_firmwareqcm6490wsa8835_firmwarevideo_collaboration_vc5_platform_firmwaresxr1120_firmwaresxr2250p_firmwareqca6564asa4150pwcn7880snapdragon_8_gen_2_mobile_platform_firmwareqcm2290_firmwarerobotics_rb5_platform_firmwareqcm2150_firmwarewcn3990sd865_5gfastconnect_6800qca6595qcs7230_firmwareqcn9012sd888sa8530p_firmwarewsa8835sxr1230p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresa8540p_firmwaresnapdragon_auto_5g_modem-rfsd_8_gen1_5gsnapdragon_4_gen_1_mobile_platform_firmwaresxr2130snapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwaresmart_audio_400_platformqca6574aqca6174asm7325psa9000pqca6574_firmwaresm4125_firmwaresm7325p_firmwaresxr2230pwsa8845_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6574a_firmwarefastconnect_6200_firmwareqcs9100_firmwareqrb5165msnapdragon_x55_5g_modem-rf_system_firmwaresm7315qca6391snapdragon_710_mobile_platformfastconnect_7800snapdragon_865\+_5g_mobile_platform_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwareqcm4290qcm6490_firmwarewsa8832_firmwaresnapdragon_xr1_platformqcm2150qcn9011video_collaboration_vc1_platform_firmwareqca6574ausa8155p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810snapdragon_765g_5g_mobile_platform_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresm8550psnapdragon_680_4g_mobile_platformsm6370snapdragon_ar2_gen_1_platformwcn3680bsdx61wcn6740qca6696215_mobile_platform_firmwareqcs8550sa6150psnapdragon_8_gen_3_mobile_platform_firmwareqcs9100wcd9390_firmwareqcn6024snapdragon_768g_5g_mobile_platformsnapdragon_765_5g_mobile_platformsm7250psnapdragon_8\+_gen_1_mobile_platform_firmwaresw5100_firmwareqcs410_firmwaresdx61_firmwaresnapdragon_xr1_platform_firmwareSnapdragonqca9377_firmwaretalynplus_firmwaresnapdragon_662_mobile_platform_firmwaresa6150p_firmwaresa8145p_firmwaresxr2230p_firmwareqcs2290_firmwaresg8275p_firmwareqca6431_firmwaremdm9628_firmwareflight_rb5_5g_platform_firmwarewcn3950_firmwaresnapdragon_888_5g_mobile_platform_firmwaresa8150p_firmwarewcn6755_firmwareqca6595au_firmwaresnapdragon_xr1_platform_firmwarecsra6620_firmwarecsra6640_firmwareqcm5430_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwareqrb5165n_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcn7881_firmwareqcn6024_firmwarewcd9326_firmwarewcn3615_firmwaresd_8_gen1_5g_firmwareqsm8350_firmwaresnapdragon_660_mobile_platform_firmwareqam8295p_firmwareqcn9011_firmwaresa9000p_firmwaresm7315_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresdx55_firmwarewcn3680b_firmwarewcd9375_firmwareqca8081_firmwarewsa8845h_firmwaresm7250p_firmwareqca6436_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6564au_firmwaresnapdragon_auto_5g_modem-rf_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwaresmart_audio_400_platform_firmwareqrb5165m_firmwarewsa8840_firmwaresa4155p_firmwareqcs8550_firmwarewcn3988_firmwarewcn7880_firmwaresa6145p_firmwarefastconnect_6700_firmwarewsa8810_firmwaresnapdragon_ar2_gen_1_platform_firmwarewcd9395_firmwaresm8750_firmwaresm8750p_firmwareqca6698aq_firmwareqca6174a_firmwareqcs4290_firmwaresxr2130_firmwareqca6696_firmwareqcs6490_firmwaresnapdragon_x12_lte_modem_firmwarewcn3910_firmwarevision_intelligence_400_platform_firmwarewsa8830_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresd660_firmwaresnapdragon_780g_5g_mobile_platform_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwarefastconnect_6800_firmwaresxr1120_firmwaresa8295p_firmwaresxr2250p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_750g_5g_mobile_platform_firmwareqcm2290_firmwarequalcomm_video_collaboration_vc1_platform_firmwarerobotics_rb5_platform_firmwareqca8337_firmwareqcm2150_firmwaresnapdragon_778g_5g_mobile_platform_firmwarewcd9380_firmwareqcs7230_firmwaresnapdragon_670_mobile_platform_firmwaresa8530p_firmwaresd670_firmwaresxr1230p_firmwaresa8540p_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwaresm8635_firmwareqcn9012_firmwaresm6370_firmwareqcn9274_firmwarewcd9335_firmwareqca6574_firmwaresm4125_firmwaresm7325p_firmwarewsa8845_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_439_mobile_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwarefastconnect_6200_firmwareqcs9100_firmwaresnapdragon_x62_5g_modem-rf_system_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqca6421_firmwarewcn6740_firmwareqcm4490_firmwaresnapdragon_690_5g_mobile_platform_firmwareqcs4490_firmwarewcn7861_firmwarewcn3680_firmwareqcm6490_firmwarewsa8832_firmwarefastconnect_6900_firmwaresa8155p_firmwareqca6564a_firmwareqcn9024_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm4290_firmwaresw5100p_firmwareqcs610_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarequalcomm_215_mobile_platform_firmwarewcn7860_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresa4150p_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwaresd888_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwaresdx61_firmwaressg2115p_firmwaresw5100_firmwareqcs410_firmwarear8035_firmwareqsm8250_firmware
CWE ID-CWE-416
Use After Free
CVE-2025-48000
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.32%
||
7 Day CHG+0.01%
Published-08 Jul, 2025 | 16:57
Updated-13 Feb, 2026 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_server_2022_23h2windows_10_21h2windows_11_24h2windows_server_2019windows_server_2025windows_server_2022windows_10_1607windows_11_23h2windows_10_1809windows_server_2016windows_11_22h2Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows 10 Version 21H2
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-416
Use After Free
CVE-2025-47976
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.91%
||
7 Day CHG+0.01%
Published-08 Jul, 2025 | 16:57
Updated-13 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability

Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2008windows_server_2022_23h2windows_server_2025windows_11_22h2windows_server_2016windows_server_2022windows_10_22h2windows_11_23h2windows_10_1607windows_11_24h2windows_server_2019windows_10_1507windows_10_1809windows_server_2012windows_10_21h2Windows Server 2025Windows Server 2008 R2 Service Pack 1Windows 11 Version 23H2Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 11 version 22H2Windows Server 2012 R2Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 Service Pack 2Windows Server 2012Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-416
Use After Free
CVE-2025-47375
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 3.09%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 16:53
Updated-03 Mar, 2026 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Audio

Memory corruption while handling different IOCTL calls from the user-space simultaneously.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47386
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 3.09%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 16:53
Updated-03 Mar, 2026 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Audio

Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47359
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.29%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 15:20
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Secure Processor

Memory Corruption when multiple threads simultaneously access a memory free API.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_6200wcd9378cqcc2072wsa8845fastconnect_6800_firmwarex2000077_firmwarefastconnect_6800wsa8845_firmwarex2000094wsa8840_firmwareaqt1000_firmwareqca6391_firmwaresc8180xp-aaab_firmwarewcd9378c_firmwareqca6420wcd9385sc8180xp-acaffastconnect_7800sc8180x-aaab_firmwarex2000090qca6430_firmwaresc8180xp-adx2000086_firmwaresc8180xp-ad_firmwarewsa8830wsa8835_firmwarewcd9385_firmwaresc8180xp-aaabwsa8815_firmwaresc8280xp-abbbsc8180xp-acaf_firmwarex2000092_firmwarewsa8810_firmwarexg101002_firmwarewsa8845h_firmwarexg101039_firmwarex2000077wsa8845hfastconnect_6900_firmwarewcd9340_firmwarex2000090_firmwareaqt1000sc8180x-acaf_firmwarefastconnect_6900wcd9340qca6430sc8280xp-abbb_firmwaresc8380xpwcd9341_firmwareqca6391wcd9341xg101032wcd9380sc8180x-acafwsa8835wcd9380_firmwaresc8380xp_firmwarewsa8840xg101032_firmwaresc8180x-ad_firmwarewsa8830_firmwarewsa8815fastconnect_6200_firmwaresc8180x-aaabx2000092xg101002qcc2072_firmwarexg101039qca6420_firmwarex2000086x2000094_firmwarefastconnect_7800_firmwaresc8180x-adwsa8810Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2024-12837
Matching Score-4
Assigner-Imagination Technologies
ShareView Details
Matching Score-4
Assigner-Imagination Technologies
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.03%
||
7 Day CHG~0.00%
Published-07 Mar, 2025 | 07:45
Updated-07 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GPU DDK - Exploitable kernel double free on apsFenceSyncCheckpoints allocated with arbitrary size

Software installed and run as a non-privileged user may conduct improper GPU system calls to corrupt kernel heap memory.

Action-Not Available
Vendor-Imagination Technologies Limited
Product-Graphics DDK
CWE ID-CWE-416
Use After Free
CVE-2025-47350
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.88%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 05:29
Updated-23 Dec, 2025 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Service

Memory corruption while handling concurrent memory mapping and unmapping requests from a user-space application.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcd9378c_firmwarewcd9378cwsa8840_firmwarex2000090_firmwarewsa8840x2000077_firmwarex2000094_firmwarex2000092_firmwarex2000092wcd9385_firmwarewsa8845h_firmwarex2000090x2000086_firmwarexg101002_firmwarefastconnect_6900_firmwarexg101039qca0000qca0000_firmwarefastconnect_7800x2000086fastconnect_6900wsa8845_firmwaresc8380xpwsa8845sc8380xp_firmwarewcd9385wcd9380xg101039_firmwarewcd9380_firmwarex2000094xg101032x2000077fastconnect_7800_firmwarexg101032_firmwarewsa8845hxg101002Snapdragon
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-23382
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.15% / 35.89%
||
7 Day CHG~0.00%
Published-05 Aug, 2024 | 14:21
Updated-26 Nov, 2024 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Graphics Linux

Memory corruption while processing graphics kernel driver request to create DMA fence.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwaresnapdragon_8_gen_1_mobile_platformtalynplus_firmwaresnapdragon_662_mobile_platform_firmwarewsa8830sxr2230p_firmwareqam8650psg8275p_firmwareqam8775pqamsrv1mflight_rb5_5g_platformflight_rb5_5g_platform_firmwarewsa8840wcn3950_firmwaresrv1l_firmwareqca6595au_firmwaresnapdragon_480_5g_mobile_platformvideo_collaboration_vc3_platformwcd9370ssg2115pqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwareqrb5165n_firmwaresnapdragon_8_gen_2_mobile_platformqamsrv1hwcd9385_firmwareqam8295pwcn3950talynplusfastconnect_6200qamsrv1h_firmwaresd_8_gen1_5g_firmwaresnapdragon_460_mobile_platformqam8295p_firmwaresa9000p_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwaresa7255psnapdragon_4_gen_2_mobile_platformqca6595ausnapdragon_8_gen_3_mobile_platformwcd9375_firmwarewsa8845h_firmwaresnapdragon_680_4g_mobile_platform_firmwareqrb5165nsnapdragon_w5\+_gen_1_wearable_platform_firmwaresa8620p_firmwaresa6155p_firmwareqcm8550_firmwareqca6678aq_firmwaresa8775p_firmwareqcs6490wsa8840_firmwareqca6698aqqcs6125video_collaboration_vc5_platformqcs8550_firmwarewcn3988_firmwaresrv1hsa7775p_firmwaresnapdragon_8\+_gen_1_mobile_platformfastconnect_6700_firmwaresa8195pwsa8810_firmwarevision_intelligence_400_platformsw5100wsa8845hsnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresa6155pqcs7230sg4150pwcd9335wcd9395_firmwareqca6698aq_firmwareqcm4490sa7775pqam8620pqcs5430snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sxr2250psa8770p_firmwarewcd9341qam8775p_firmwaresa8255pwcd9385qca6696_firmwareqcs6490_firmwareqca6797aqwcd9375wcd9390robotics_rb5_platformvision_intelligence_400_platform_firmwaresnapdragon_662_mobile_platformwsa8830_firmwareqcm6490wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwarevideo_collaboration_vc5_platform_firmwaresa8295p_firmwaresxr2250p_firmwaresg4150p_firmwaresa8770psnapdragon_8_gen_2_mobile_platform_firmwareqcm6125_firmwareqcm4325robotics_rb5_platform_firmwarewcd9380_firmwaressg2125pwcn3990sw5100psnapdragon_w5\+_gen_1_wearable_platformqca6595qcm8550qcs7230_firmwarewsa8835qca6574sxr1230p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresd_8_gen1_5gwcd9380snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwarefastconnect_6700snapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqca6574asxr1230psnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarevideo_collaboration_vc3_platform_firmwaresg8275pwcd9335_firmwarewcn3980wsa8845qcm4325_firmwaresa8650pqca6574_firmwaresa9000pwsa8815sxr2230pwsa8845_firmwaresnapdragon_4_gen_1_mobile_platformqcs8250qca6574a_firmwarefastconnect_6200_firmwaresa8775pwcn3980_firmwareqca6391sa8295pfastconnect_7800qcm4490_firmwareqcs4490_firmwareqca6678aqqcm6490_firmwaresa8650p_firmwarewsa8832_firmwarefastconnect_6900fastconnect_6900_firmwaresrv1h_firmwarevideo_collaboration_vc1_platform_firmwareqca6797aq_firmwareqca6574ausa8155p_firmwaresrv1lsa7255p_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwareqcm6125sa8620psnapdragon_8\+_gen_2_mobile_platformwsa8810wsa8832sw5100p_firmwaresm8550psnapdragon_680_4g_mobile_platformsnapdragon_8_gen_1_mobile_platform_firmwareqamsrv1m_firmwaresnapdragon_ar2_gen_1_platformqcm5430srv1m_firmwareqam8650p_firmwareqcs4490qca6595_firmwarewcd9395qca6696qcs5430_firmwareqca6391_firmwareqcs8550wcd9370_firmwaresm8550p_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwaresa8155psnapdragon_695_5g_mobile_platformvideo_collaboration_vc1_platformsrv1msnapdragon_8\+_gen_1_mobile_platform_firmwaressg2115p_firmwaresw5100_firmwareqam8620p_firmwareqam8255psnapdragon_685_4g_mobile_platform_\(sm6225-ad\)Snapdragonqam8255p_firmwarequalcomm_video_collaboration_vc1_platform_firmwaretalynplus_firmwaresnapdragon_662_mobile_platform_firmwarerobotics_rb5_platform_firmwarewcd9380_firmwaresxr2230p_firmwaresg8275p_firmwareqcs7230_firmwareflight_rb5_5g_platform_firmwaresxr1230p_firmwarewcn3950_firmwaresrv1l_firmwareqca6595au_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresa8295p_firmwaresnapdragon_4_gen_2_mobile_platform_firmwaressg2125p_firmwareqcm5430_firmwareqcs6125_firmwaresnapdragon_460_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwareqrb5165n_firmwarewcd9335_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwareqcm4325_firmwareqamsrv1h_firmwareqca6574_firmwaresd_8_gen1_5g_firmwarewsa8845_firmwareqam8295p_firmwaresa9000p_firmwareqca6574a_firmwaresnapdragon_695_5g_mobile_platform_firmwareqca6574au_firmwarefastconnect_6200_firmwarewcd9375_firmwarewsa8845h_firmwarewcn3980_firmwaresnapdragon_680_4g_mobile_platform_firmwaresa8620p_firmwaresa6155p_firmwareqcm8550_firmwareqcm4490_firmwareqca6678aq_firmwareqcs4490_firmwaresa8775p_firmwareqcm6490_firmwarewsa8840_firmwaresa8650p_firmwarewsa8832_firmwarefastconnect_6900_firmwaresrv1h_firmwareqcs8550_firmwarewcn3988_firmwareqca6797aq_firmwaresa8155p_firmwaresa7775p_firmwarefastconnect_6700_firmwaresa7255p_firmwarewsa8810_firmwareqcs8250_firmwarewcd9341_firmwarefastconnect_7800_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwaresw5100p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqam8775p_firmwareqca6696_firmwareqcs6490_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwarevision_intelligence_400_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwaresw5100_firmwareqam8620p_firmwaresxr2250p_firmwaresg4150p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqcm6125_firmware
CWE ID-CWE-416
Use After Free
CVE-2022-34705
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.85% / 74.75%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 19:53
Updated-04 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Defender Credential Guard Elevation of Privilege Vulnerability

Windows Defender Credential Guard Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2019windows_server_2022windows_10windows_server_2016windows_11Windows 10 Version 1809Windows 10 Version 21H1Windows Server 2022Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 10 Version 20H2Windows Server version 20H2Windows Server 2019Windows 11 version 21H2
CWE ID-CWE-416
Use After Free
CVE-2022-34707
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.61% / 69.58%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 19:54
Updated-24 Jul, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Elevation of Privilege Vulnerability

Windows Kernel Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_8.1windows_rt_8.1windows_server_2019windows_server_2022windows_server_2012windows_7windows_10windows_server_2016windows_server_2008windows_11Windows Server 2019 (Server Core installation)Windows Server 2022Windows 10 Version 21H2Windows Server 2019Windows 11 version 21H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1Windows Server 2016Windows Server 2016 (Server Core installation)Windows 10 Version 21H1Windows Server 2008 Service Pack 2Windows Server 2012 R2Windows Server 2012Windows Server version 20H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 (Server Core installation)Windows 7Windows Server 2008 Service Pack 2Windows 7 Service Pack 1Windows 10 Version 1809Windows Server 2012 R2 (Server Core installation)Windows 10 Version 1507Windows 10 Version 20H2Windows 10 Version 1607Windows 8.1
CWE ID-CWE-416
Use After Free
CVE-2025-47315
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.30%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Software platform based on QNX

Memory corruption while handling repeated memory unmap requests from guest VM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6698aqsrv1h_firmwaresa8540p_firmwaresa8650p_firmwaresa8255pqamsrv1m_firmwareqca6574ausa8775p_firmwaresrv1m_firmwareqam8620p_firmwaresa8770p_firmwareqamsrv1h_firmwareqam8255p_firmwaresa8295pqca6696_firmwareqca6797aq_firmwareqam8775p_firmwaresa8255p_firmwareqam8255pqam8775pqam8295p_firmwaresa7255p_firmwaresa7775psrv1msa8540psa8770pqca6688aq_firmwareqca6595_firmwareqam8295pqca6595ausa9000psa8620p_firmwaresa8650pqca6797aqqamsrv1mqca6696qam8620psa8295p_firmwaresrv1l_firmwaresrv1hqca6688aqqca6595au_firmwareqca6574au_firmwareqam8650p_firmwaresa9000p_firmwaresa7775p_firmwaresrv1lqca6595qam8650psa7255psa8620pqca6698aq_firmwaresa8775pqamsrv1hSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2022-33245
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.83%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 04:43
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in WLAN

Memory corruption in WLAN due to use after free

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610csrb31024wcd9360_firmwaremdm9650csra6620wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwaresa6155sd690_5gwcd9370csra6620_firmwarecsra6640_firmwareqca6564wcn3990_firmwaresa415mwcn3998qcn7605wcd9385_firmwarewcn3950wcn3660bsa8155qca6320_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwareqca6420wcd9360qca6564au_firmwaresa6155p_firmwareqca6310sa515m_firmwaresd429sa8155_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwareqcn9074sa6145p_firmwaresd429_firmwarewcd9340sa8195pwsa8810_firmwaresd765gsd765_firmwarewcn6851wcd9335sa6155pwcd9385wcd9341qca6696_firmwaresd750gwcd9375sd750g_firmwareapq8064auaqt1000sa8150pwsa8830_firmwaresd855_firmwarewcn3620_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewcn3620wsa8835_firmwaresa8195p_firmwareqcn7606_firmwareqca6564awcn3991wcd9380_firmwarewcn3990sdm429wmsm8996au_firmwareqca6564auwsa8835qca6574msm8996ausdm429w_firmwarewcd9380qcs410qca6574asd690_5g_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sa515mqca6574_firmwarewcd9340_firmwaresd855wsa8815wcn6850qca6320mdm9650_firmwareqca6175asd765wcn3660b_firmwareqca6574a_firmwaresd768g_firmwaresd835wcn3980_firmwareaqt1000_firmwareapq8064au_firmwarear8031_firmwarecsrb31024_firmwarewcn6851_firmwareqca6574ausa8155p_firmwareqca6564a_firmwarewcd9341_firmwarewsa8810qcn7605_firmwareqcs610_firmwaresa6145psd835_firmwareqca6564_firmwaresd768gapq8096auar8031qcs405_firmwaresa8145pqca6696wcd9370_firmwaresa6150psdx55apq8096au_firmwarecsra6640sa8155psm7250pqcn9074_firmwareqcs410_firmwareqca6175a_firmwareqcn7606Snapdragonwcn3991_firmwarewcd9380_firmwaresa6150p_firmwaresa8145p_firmwaremsm8996au_firmwarewcd9360_firmwaresdm429w_firmwarewcn3950_firmwaresa8150p_firmwaresd765g_firmwareqca6420_firmwareqca6595au_firmwarecsra6620_firmwaresd690_5g_firmwarecsra6640_firmwarewcn3990_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcd9385_firmwareqca6574_firmwarewcd9340_firmwaremdm9650_firmwarewcn3660b_firmwareqca6320_firmwareqca6574a_firmwareqca6574au_firmwaresd768g_firmwaresdx55_firmwarewcd9375_firmwaresa6155_firmwarewcn3980_firmwarewcn3998_firmwaresm7250p_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwaresa515m_firmwarear8031_firmwareapq8064au_firmwarecsrb31024_firmwarewcn6851_firmwaresa8155_firmwaresa415m_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwaresd429_firmwareqca6564a_firmwarewsa8810_firmwarewcd9341_firmwaresd765_firmwareqcn7605_firmwareqcs610_firmwaresd835_firmwareqca6564_firmwareqca6696_firmwareqcs405_firmwaresd750g_firmwarewcd9370_firmwareapq8096au_firmwarewsa8830_firmwaresd855_firmwarewcn3620_firmwarewsa8815_firmwarewcn6850_firmwarewsa8835_firmwaresa8195p_firmwareqcn9074_firmwareqcs410_firmwareqcn7606_firmwareqca6175a_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-34747
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.04% / 13.22%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 17:13
Updated-17 Dec, 2024 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DevmemXIntMapPages of devicemem_server.c, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Imagination Technologies LimitedGoogle LLC
Product-androidAndroidpowervr-gpu
CWE ID-CWE-416
Use After Free
CVE-2024-11155
Matching Score-4
Assigner-Rockwell Automation
ShareView Details
Matching Score-4
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.04% / 13.55%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 17:32
Updated-14 Apr, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Arena® Use After Free Vulnerability

A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®arena
CWE ID-CWE-416
Use After Free
CVE-2022-33298
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 8.82%
||
7 Day CHG~0.00%
Published-04 Apr, 2023 | 04:46
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Modem

Memory corruption due to use after free in Modem while modem initialization.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830sa6150p_firmwaresa8145p_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwareqca6390_firmwaresd730_firmwarewcd9370snapdragon_835_mobile_platform_firmwareqca6564qca6426wcn685x-1wcn3990_firmwaresm4375wcn3998sm8250-abwcd9385_firmwarewcn3950wcd9326_firmwaresm6375_firmwarewcn3660bsm7150-acqca6320_firmwaresnapdragon_x55_5g_modem-rf_systemqca6574au_firmwaresdx55_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcd9375_firmwarewcn3610_firmwareqca6420qca6436_firmwaresm4350-acsnapdragon_w5\+_gen_1_wearable_platform_firmwareqca6564au_firmwaresa6155p_firmwareqca6310sm8250_firmwaresm8250-acwcn3988_firmwareqca6430sa6145p_firmwaresm6250wcd9340sa8195psxr1120sdm710_firmwarewsa8810_firmwaresm4375_firmwaresw5100qca6436wcd9326wcd9335sa6155pwcn685x-1_firmwarewcd9385sm8150_firmwaresxr2130_firmwarewcd9341qca6696_firmwaresm7150-abqca6390sm4350_firmwarewcd9375aqt1000sa8150psm6250_firmwaresm6150_firmwaresm8250-ac_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwaresm8150wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresxr1120_firmwarewcn3610sm6375wcd9380_firmwarewcn3990sw5100psd865_5gsnapdragon_w5\+_gen_1_wearable_platformqca6564ausm8150-acsm6150wsa8835snapdragon_835_mobile_platformwcd9380snapdragon_wear_4100\+_platform_firmwaresxr2130qca6574asnapdragon_wear_4100\+_platformwcn685x-5_firmwaresm7150-aa_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcn3980sm7150-ac_firmwarewcd9340_firmwaresd855sm6150-ac_firmwarewsa8815qca6320snapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd835wcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresd730qca6391sm8250-ab_firmwaresnapdragon_x50_5g_modem-rf_system_firmwaresm7150-aasm7125aqt1000_firmwaresnapdragon_xr2_5g_platformsnapdragon_xr1_platformsm7150-ab_firmwarewcn685x-5qca6574ausa8155p_firmwaresdm710wcd9341_firmwarewsa8810sw5100p_firmwaresm8150-ac_firmwaresa6145pwcn3680bsd835_firmwareqca6564_firmwaresa8145pqca6696qca6391_firmwaresm4350wcd9370_firmwaresm6150-acsm4350-ac_firmwaresm7125_firmwaresa6150psdx55snapdragon_x50_5g_modem-rf_systemsa8155psm8250sw5100_firmwaresnapdragon_xr1_platform_firmwareSnapdragonwcd9380_firmwaresa6150p_firmwaresa8145p_firmwarewcn3950_firmwaresa8150p_firmwareqca6420_firmwareqca6595au_firmwaresd730_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_835_mobile_platform_firmwaresnapdragon_480_5g_mobile_platform_firmwarewcn3990_firmwareqca6310_firmwareqca6430_firmwarewcd9335_firmwarewcd9385_firmwarewcd9326_firmwarewcd9340_firmwaresnapdragon_xr2_5g_platform_firmwareqca6426_firmwarewcn3660b_firmwareqca6320_firmwarefastconnect_6200_firmwarewcn3680b_firmwareqca6574a_firmwareqca6574au_firmwaresdx55_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcd9375_firmwarewcn3980_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3610_firmwareqca6436_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareaqt1000_firmwareqca6564au_firmwaresa6155p_firmwarefastconnect_6900_firmwarewcn3988_firmwaresa6145p_firmwaresa8155p_firmwarewsa8810_firmwarewcd9341_firmwaresw5100p_firmwaresd835_firmwareqca6564_firmwaresxr2130_firmwareqca6696_firmwareqca6391_firmwaresnapdragon_710_mobile_platform_firmwaresnapdragon_855_mobile_platform_firmwarewcd9370_firmwaresm6250_firmwarewsa8830_firmwaresd855_firmwaresd865_5g_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresnapdragon_865_5g_mobile_platform_firmwaresw5100_firmwarefastconnect_6800_firmwaresxr1120_firmwaresnapdragon_720g_mobile_platform_firmwaresnapdragon_xr1_platform_firmwaresnapdragon_675_mobile_platform_firmware
CWE ID-CWE-416
Use After Free
CVE-2022-33292
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.79%
||
7 Day CHG~0.00%
Published-02 May, 2023 | 05:08
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Qualcomm IPC

Memory corruption in Qualcomm IPC due to use after free while receiving the incoming packet and reposting it.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm6225sm6225-ad_firmwarewcn3950wcd9375wcd9370_firmwaresm6225_firmwarewcn3988_firmwarewcn3950_firmwarewcn3988wsa8810_firmwarewsa8810wcd9375_firmwaresm6225-adsg4150pwcd9370sg4150p_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2022-33263
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.52%
||
7 Day CHG~0.00%
Published-06 Jun, 2023 | 07:38
Updated-07 Jan, 2025 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Core

Memory corruption due to use after free in Core when multiple DCI clients register and deregister.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwareqam8255p_firmwarewcn3991wsa8830wcd9380_firmwaresw5100psnapdragon_w5\+_gen_1_wearable_platformwcn785x-5sm8350-ac_firmwaresm8150-acwsa8835wcn3950_firmwaresd_8_gen1_5gwcd9380sm4450_firmwareqca6420_firmwareqca6595au_firmwaresnapdragon_wear_4100\+_platform_firmwaresm8350wcd9370snapdragon_wear_4100\+_platformwcn685x-5_firmwarewcn685x-1sm8450wcn6750qca6430_firmwarewcn3998wcn3980wcd9385_firmwarewcn3950sd_8_gen1_5g_firmwarewcn3660bsd855wsa8815sm4450wcn3660b_firmwareqca6574au_firmwarewcn3680b_firmwareqca6595auwcn3998_firmwarewcn785x-5_firmwarewcn3980_firmwarewcn3610_firmwareqca6420snapdragon_w5\+_gen_1_wearable_platform_firmwaresm8475_firmwareaqt1000_firmwarewcn6740_firmwaresa6155p_firmwareqcs8155wsa8832_firmwareqca6698aqsm8350_firmwarewcn685x-5wcn3988_firmwareqca6430qca6797aq_firmwarewcn785x-1_firmwareqca6574ausa8155p_firmwaresa8195pwsa8810_firmwarewcd9341_firmwaresm8450_firmwaresw5100wsa8810wsa8832sa8255p_firmwaresa6155psw5100p_firmwaresm8150-ac_firmwareqca6698aq_firmwarewcn3680bsm8350-acwcn685x-1_firmwarewcd9385sm8150_firmwaresa8255pwcd9341wcn6740qca6797aqwcd9370_firmwareaqt1000sa8155pwsa8830_firmwaresd855_firmwaresm8150wcn785x-1wcn3988wsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqcs8155_firmwaresw5100_firmwaresm8475wcn6750_firmwareqam8255pwcn3610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2020-1382
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.38% / 59.31%
||
7 Day CHG~0.00%
Published-14 Jul, 2020 | 22:54
Updated-04 Aug, 2024 | 06:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1381.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10Windows 10 Version 2004 for x64-based SystemsWindows 10 Version 1903 for x64-based SystemsWindows Server, version 2004 (Server Core installation)Windows 10 Version 2004 for 32-bit SystemsWindows 10 Version 2004 for ARM64-based SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows Server, version 1909 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows Server, version 1903 (Server Core installation)Windows 10 Version 1909 for 32-bit SystemsWindows 10 Version 1909 for x64-based Systems
CWE ID-CWE-416
Use After Free
CVE-2020-1381
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.71% / 72.10%
||
7 Day CHG~0.00%
Published-14 Jul, 2020 | 22:54
Updated-04 Aug, 2024 | 06:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1382.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10Windows 10 Version 2004 for x64-based SystemsWindows 10 Version 1903 for x64-based SystemsWindows Server, version 2004 (Server Core installation)Windows 10 Version 2004 for 32-bit SystemsWindows 10 Version 2004 for ARM64-based SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows Server, version 1909 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows Server, version 1903 (Server Core installation)Windows 10 Version 1909 for 32-bit SystemsWindows 10 Version 1909 for x64-based Systems
CWE ID-CWE-416
Use After Free
CVE-2022-33225
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.96%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 06:58
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use after free in Trusted Application Environment

Memory corruption due to use after free in trusted application environment.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6564au_firmwarewcd9380_firmwaresdm429wmsm8996au_firmwaresd429sdxr2_5gsd865_5gwcn6851_firmwareqca6564ausdx55m_firmwaremdm9628_firmwareqca6574ausd205sd429_firmwaremsm8996ausd205_firmwareqca6564a_firmwaresdm429w_firmwarewcd9340wsa8810_firmwarequalcomm215_firmwarewcd9380wsa8810sd870qca6390_firmwareqca6436qualcomm215wcn6851sd210_firmwareqca6574aqca6426apq8096ausd870_firmwareqca6391_firmwaresdxr2_5g_firmwareqca6390mdm9628wcd9340_firmwarewcn3660bwsa8815wcn6850apq8096au_firmwaresd210sd865_5g_firmwarewcn3620_firmwareqca6426_firmwarewcn3660b_firmwarewcn6850_firmwareqca6574a_firmwarewcn3620qca6574au_firmwarewsa8815_firmwarewcn3610_firmwareqca6564aqca6391sdx55mqca6436_firmwarewcn3610Snapdragonqca6564au_firmwarewcd9380_firmwaremsm8996au_firmwaresd870_firmwareqca6391_firmwaresdxr2_5g_firmwarewcn6851_firmwaresdx55m_firmwaremdm9628_firmwarewcd9340_firmwareapq8096au_firmwaresd429_firmwaresd205_firmwaresdm429w_firmwareqca6564a_firmwaresd865_5g_firmwarewcn3620_firmwareqca6426_firmwarewsa8810_firmwarequalcomm215_firmwarewcn3660b_firmwarewcn6850_firmwareqca6574a_firmwarewsa8815_firmwareqca6574au_firmwareqca6390_firmwarewcn3610_firmwaresd210_firmwareqca6436_firmware
CWE ID-CWE-416
Use After Free
CVE-2024-10074
Matching Score-4
Assigner-OpenHarmony
ShareView Details
Matching Score-4
Assigner-OpenHarmony
CVSS Score-8.8||HIGH
EPSS-0.13% / 32.45%
||
7 Day CHG~0.00%
Published-03 Dec, 2024 | 12:15
Updated-11 Dec, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Liteos_a has an use after free vulnerability

in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free.

Action-Not Available
Vendor-OpenAtom FoundationOpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmonyopenharmony
CWE ID-CWE-416
Use After Free
CVE-2025-47322
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.88%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 05:29
Updated-28 Jan, 2026 | 17:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Linux OS

Memory corruption while handling IOCTL calls to set mode.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qrb5165n_firmwareqca6696_firmwareqca8081_firmwareqca6797aq_firmwaresa8775pwsa8832wcn3910wcd9340sa6155psnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwaresmart_audio_400_platform_firmwarewcd9390robotics_rb5_platform_firmwarefastconnect_6900_firmwareqca6174a_firmwarewcn3950qcc710_firmwarewcd9385qcn9011snapdragon_x32_5g_modem-rf_system_firmwareqcn6224_firmwaresa8620psm8550p_firmwarewcn3980_firmwarear8031_firmwarewcd9378_firmwarewsa8835_firmwarewsa8845sa9000p_firmwareqfw7124csra6620qca6678aqsa8295p_firmwaresg4150p_firmwarewcd9378snapdragon_auto_5g_modem-rf_gen_2flight_rb5_5g_platform_firmwareqfw7114snapdragon_680_4g_mobile_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platformsw5100p_firmwaresa7775psrv1mqdx1011snapdragon_662_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8845h_firmwareqca6574_firmwareqcm6125_firmwareqamsrv1mqca6584au_firmwareqca6595au_firmwareqca6688aq_firmwaresa8650p_firmwarewcd9335_firmwaresmart_audio_400_platformcsra6620_firmwarewcd9380_firmwareqdx1010sg8275_firmwareflight_rb5_5g_platformqca2066_firmwaresnapdragon_680_4g_mobile_platformsa8650pqca6696wcd9395csra6640sa7775p_firmwaresnapdragon_x75_5g_modem-rf_systemqcs8250wsa8832_firmwaresnapdragon_8\+_gen_2_mobile_platformsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_x72_5g_modem-rf_system_firmwarerobotics_rb5_platformwcd9375_firmwareqam8295psrv1m_firmwarewcd9390_firmwaresnapdragon_x35_5g_modem-rf_systemqca2066snapdragon_8_gen_2_mobile_platformvideo_collaboration_vc5_platform_firmwarefastconnect_7800qca8337snapdragon_x72_5g_modem-rf_systemsa8770p_firmwareqcs8250_firmwarewsa8810_firmwareqam8255p_firmwarear8035_firmwarewcd9340_firmwareqcn9011_firmwaresg8275p_firmwarewcd9370_firmwaresa8770pvideo_collaboration_vc5_platformcsra6640_firmwarefastconnect_7800_firmwareqca6574a_firmwareqcm2290_firmwareqam8775pwcd9335qcs2290qam8775p_firmwarevideo_collaboration_vc1_platform_firmwareqcn9012qca6174aqrb5165nsnapdragon_x75_5g_modem-rf_system_firmwareqca6698aqqdx1011_firmwareqcs7230qfw7114_firmwarewcd9380qca6391_firmwaresnapdragon_460_mobile_platform_firmwarewcd9395_firmwaresm8550pqdu1010sa8295pqamsrv1hsa6155p_firmwaresm7550p_firmwaresa8255p_firmwaresnapdragon_460_mobile_platformsnapdragon_8_gen_2_mobile_platform_firmwareqcs6125_firmwareqcn9012_firmwareqcs6125sg8275pqca6698aq_firmwareqamsrv1m_firmwarewcd9370wsa8830_firmwarewcn3988sm7550pwsa8815_firmwarewsa8830qam8295p_firmwareqfw7124_firmwareqcs2290_firmwareqcs8550_firmwareqam8650pwcd9371_firmwarewsa8845hqcs7230_firmwarewcn6650_firmwaresa8155p_firmwareqamsrv1h_firmwaresm7550sa8255pqca6595qca6574au_firmwareqep8111_firmwareqdu1010_firmwaresw5100_firmwarewcd9385_firmwarewcn6650qcn6224qca6595_firmwareqep8111qca6574auwcn6755_firmwarewcn6755sa9000pqdx1010_firmwareqca6595auqcm8550snapdragon_x35_5g_modem-rf_system_firmwarewsa8815qca8081qca6797aqqcm2290srv1hsa8195p_firmwaresg8275srv1h_firmwaresm7550_firmwareqcm8550_firmwareqcn6274video_collaboration_vc1_platformsw5100qca6574aqcc710snapdragon_8\+_gen_2_mobile_platform_firmwaresa8195psnapdragon_x32_5g_modem-rf_systemsg4150pqcn6274_firmwareqcm6125wsa8835qcs8550sa8775p_firmwarewcn3980qca6678aq_firmwarewcd9375ar8035sa7255p_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwarewcn3910_firmwarewcn3950_firmwaresa7255pqca6574wsa8840wsa8840_firmwareqam8255psnapdragon_662_mobile_platformwsa8845_firmwarefastconnect_6900sa8155psa8620p_firmwarear8031qca8337_firmwarewcn3988_firmwareqca6688aqqca6584auqca6391wsa8810wcd9371qam8650p_firmwaresw5100pSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-30400
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.75% / 72.99%
||
7 Day CHG-0.08%
Published-13 May, 2025 | 16:58
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-06-03||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Microsoft DWM Core Library Elevation of Privilege Vulnerability

Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_22h2windows_10_21h2windows_11_23h2windows_11_24h2windows_server_2022windows_10_22h2windows_server_2022_23h2windows_10_1809windows_server_2025windows_server_2019Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 11 version 22H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows 10 Version 1809Windows Server 2025 (Server Core installation)Windows
CWE ID-CWE-416
Use After Free
CVE-2024-0155
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7||HIGH
EPSS-0.09% / 25.65%
||
7 Day CHG~0.00%
Published-04 Mar, 2024 | 13:00
Updated-08 Jan, 2025 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Digital Delivery, versions prior to 5.2.0.0, contain a Use After Free Vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to application crash or execution of arbitrary code.

Action-Not Available
Vendor-Dell Inc.
Product-digital_deliveryDell Digital Delivery (D3)digital_delivery
CWE ID-CWE-416
Use After Free
CVE-2020-14363
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.49%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 18:02
Updated-04 Aug, 2024 | 12:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.

Action-Not Available
Vendor-The X11 ProjectFedora ProjectX.Org Foundation
Product-libx11fedoralibX11
CWE ID-CWE-416
Use After Free
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-47327
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.30%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 15:33
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Camera

Memory corruption while encoding the image data.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs5430snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwarewcd9340_firmwareqca6430_firmwarefastconnect_6900snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_8c_compute_platform_\(sc8180x-ad\)wcd9370_firmwarevideo_collaboration_vc3_platformwsa8830_firmwareqcs5430_firmwarefastconnect_7800snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)wcd9380_firmwarewsa8845hwsa8830aqt1000wcd9375_firmwarewsa8840_firmwarefastconnect_6700qca6391wcd9340wsa8840qca6391_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)qcm5430_firmwarewcd9370snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarewsa8845h_firmwarefastconnect_6200fastconnect_6800qca6430aqt1000_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)wsa8810_firmwareqcm6490snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareqca6420snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwarefastconnect_6700_firmwarewcd9380wcd9341snapdragon_8cx_compute_platform_\(sc8180x-ab\)snapdragon_7c\+_gen_3_compute_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresc8380xp_firmwarewsa8815snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)snapdragon_8cx_compute_platform_\(sc8180xp-af\)wcd9341_firmwarewcd9385_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)wsa8835snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarewcd9385wcd9375snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarewsa8845_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8835_firmwarefastconnect_6200_firmwareqcm5430qcm6490_firmwarewsa8815_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwareqcs6490_firmwarefastconnect_6900_firmwarefastconnect_6800_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwareqcs6490wsa8810snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)fastconnect_7800_firmwaresc8380xpwsa8845qca6420_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
  • Previous
  • 1
  • 2
  • ...
  • 58
  • 59
  • 60
  • ...
  • 63
  • 64
  • Next
Details not found