Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-68817

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-13 Jan, 2026 | 15:29
Updated At-09 Feb, 2026 | 08:34
Rejected At-
Credits

ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency Under high concurrency, A tree-connection object (tcon) is freed on a disconnect path while another path still holds a reference and later executes *_put()/write on it.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:13 Jan, 2026 | 15:29
Updated At:09 Feb, 2026 | 08:34
Rejected At:
â–¼CVE Numbering Authority (CNA)
ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency Under high concurrency, A tree-connection object (tcon) is freed on a disconnect path while another path still holds a reference and later executes *_put()/write on it.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/server/mgmt/tree_connect.c
  • fs/smb/server/mgmt/tree_connect.h
  • fs/smb/server/smb2pdu.c
Default Status
unaffected
Versions
Affected
  • From dd45db4d9bbc8f122a9b4db5ce94ae29fcf03d3c before 446beed646b2e426dd53d27358365f8678e1dd01 (git)
  • From 7b58ee8d0b91359554cf219cd4f33872ea2afd66 before d092de8a26c952379ded8e6b0bda31d89befac1a (git)
  • From 33b235a6e6ebe0f05f3586a71e8d281d00f71e2e before d64977495e44855f2b28d8ce56107c963a7a50e4 (git)
  • From 33b235a6e6ebe0f05f3586a71e8d281d00f71e2e before 21a3d01fc6db5129f81edb0ab7cb94fd758bcbea (git)
  • From 33b235a6e6ebe0f05f3586a71e8d281d00f71e2e before 063cbbc6f595ea36ad146e1b7d2af820894beb21 (git)
  • From 33b235a6e6ebe0f05f3586a71e8d281d00f71e2e before b39a1833cc4a2755b02603eec3a71a85e9dff926 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/server/mgmt/tree_connect.c
  • fs/smb/server/mgmt/tree_connect.h
  • fs/smb/server/smb2pdu.c
Default Status
affected
Versions
Affected
  • 6.6
Unaffected
  • From 0 before 6.6 (semver)
  • From 5.15.199 through 5.15.* (semver)
  • From 6.1.160 through 6.1.* (semver)
  • From 6.6.120 through 6.6.* (semver)
  • From 6.12.64 through 6.12.* (semver)
  • From 6.18.3 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/446beed646b2e426dd53d27358365f8678e1dd01
N/A
https://git.kernel.org/stable/c/d092de8a26c952379ded8e6b0bda31d89befac1a
N/A
https://git.kernel.org/stable/c/d64977495e44855f2b28d8ce56107c963a7a50e4
N/A
https://git.kernel.org/stable/c/21a3d01fc6db5129f81edb0ab7cb94fd758bcbea
N/A
https://git.kernel.org/stable/c/063cbbc6f595ea36ad146e1b7d2af820894beb21
N/A
https://git.kernel.org/stable/c/b39a1833cc4a2755b02603eec3a71a85e9dff926
N/A
Hyperlink: https://git.kernel.org/stable/c/446beed646b2e426dd53d27358365f8678e1dd01
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d092de8a26c952379ded8e6b0bda31d89befac1a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d64977495e44855f2b28d8ce56107c963a7a50e4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/21a3d01fc6db5129f81edb0ab7cb94fd758bcbea
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/063cbbc6f595ea36ad146e1b7d2af820894beb21
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b39a1833cc4a2755b02603eec3a71a85e9dff926
Resource: N/A
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:13 Jan, 2026 | 16:16
Updated At:26 Feb, 2026 | 18:43

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency Under high concurrency, A tree-connection object (tcon) is freed on a disconnect path while another path still holds a reference and later executes *_put()/write on it.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.15.145(inclusive) to 5.15.199(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.1.71(inclusive) to 6.1.160(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.6.1(inclusive) to 6.6.120(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.12.64(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.13(inclusive) to 6.18.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.6
cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.6
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.6
cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.6
cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarynvd@nist.gov
CWE ID: CWE-416
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/063cbbc6f595ea36ad146e1b7d2af820894beb21416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/21a3d01fc6db5129f81edb0ab7cb94fd758bcbea416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/446beed646b2e426dd53d27358365f8678e1dd01416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/b39a1833cc4a2755b02603eec3a71a85e9dff926416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/d092de8a26c952379ded8e6b0bda31d89befac1a416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/d64977495e44855f2b28d8ce56107c963a7a50e4416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/063cbbc6f595ea36ad146e1b7d2af820894beb21
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/21a3d01fc6db5129f81edb0ab7cb94fd758bcbea
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/446beed646b2e426dd53d27358365f8678e1dd01
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b39a1833cc4a2755b02603eec3a71a85e9dff926
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/d092de8a26c952379ded8e6b0bda31d89befac1a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/d64977495e44855f2b28d8ce56107c963a7a50e4
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

3188Records found

CVE-2025-47376
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-02 Mar, 2026 | 16:53
Updated-03 Mar, 2026 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Audio

Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47377
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-02 Mar, 2026 | 16:53
Updated-03 Mar, 2026 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Audio

Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47379
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-02 Mar, 2026 | 16:53
Updated-03 Mar, 2026 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Audio

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-47386
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-02 Mar, 2026 | 16:53
Updated-03 Mar, 2026 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Audio

Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2021-44968
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.43%
||
7 Day CHG~0.00%
Published-18 Feb, 2022 | 17:25
Updated-04 Aug, 2024 | 04:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Use after Free vulnerability exists in IOBit Advanced SystemCare 15 pro via requests sent in sequential order using the IOCTL driver codes, which could let a malicious user execute arbitrary code or a Denial of Service (system crash). IOCTL list: iobit_ioctl = [0x8001e01c, 0x8001e020, 0x8001e024, 0x8001e040,0x8001e044, 0x8001e048, 0x8001e04c, 0x8001e000, 0x8001e004, 0x8001e008, 0x8001e00c, 0x8001e010, 0x8001e014, 0x8001e018]

Action-Not Available
Vendor-iobitn/a
Product-advanced_systemcaren/a
CWE ID-CWE-416
Use After Free
CVE-2025-21334
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-7.56% / 91.71%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 18:04
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-02-04||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability

Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_22h2windows_10_21h2windows_11_24h2windows_11_23h2windows_10_22h2windows_server_2022_23h2windows_server_2025Windows 10 Version 21H2Windows 11 version 22H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows
CWE ID-CWE-416
Use After Free
CVE-2021-43412
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.34%
||
7 Day CHG~0.00%
Published-07 Nov, 2021 | 17:07
Updated-04 Aug, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in GNU Hurd before 0.9 20210404-9. libports accepts fake notification messages from any client on any port, which can lead to port use-after-free. This can be exploited for local privilege escalation to get full root access.

Action-Not Available
Vendor-n/aGNU
Product-hurdn/a
CWE ID-CWE-416
Use After Free
CVE-2025-21437
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:16
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Automotive Linux OS

Memory corruption while processing memory map or unmap IOCTL operations simultaneously.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6574sa8255p_firmwareqam8255psrv1m_firmwaresa8195pqam8650psa7255pqam8775p_firmwaresa8775p_firmwaresrv1h_firmwaresa7775pqam8650p_firmwaresa8770p_firmwareqam8295psa8775pqam8620p_firmwareqca6696qam8295p_firmwaresrv1hqca6595srv1l_firmwaresa8155pqam8775psa8155p_firmwareqca6595_firmwareqamsrv1hqca6574ausrv1msa8295p_firmwaresa8620p_firmwareqca6698aq_firmwareqamsrv1msa6155p_firmwareqamsrv1m_firmwareqca6595au_firmwareqca6696_firmwaresa8650p_firmwaresa9000pqamsrv1h_firmwareqca6688aqsa9000p_firmwaresa8650pqca6574a_firmwaresa7255p_firmwareqam8255p_firmwaresa8770pqca6574au_firmwaresa8620pqca6574_firmwareqca6595auqca6698aqqca6688aq_firmwareqam8620psa6155psa7775p_firmwaresa8195p_firmwaresa8255psa8295pqca6797aqqca6574aqca6797aq_firmwaresrv1lSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-21367
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 38.31%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 17:58
Updated-26 Feb, 2026 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 11 version 22H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows 10 Version 1809Windows Server 2025 (Server Core installation)
CWE ID-CWE-416
Use After Free
CVE-2025-21335
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-9.89% / 92.91%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 18:04
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-02-04||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability

Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_22h2windows_10_21h2windows_11_24h2windows_11_23h2windows_10_22h2windows_server_2022_23h2windows_server_2025Windows 10 Version 21H2Windows 11 version 22H2Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows
CWE ID-CWE-416
Use After Free
CVE-2025-21304
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.26% / 49.27%
||
7 Day CHG-0.01%
Published-14 Jan, 2025 | 18:03
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft DWM Core Library Elevation of Privilege Vulnerability

Microsoft DWM Core Library Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_1809windows_server_2016windows_10_21h2windows_server_2019windows_10_22h2Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2019Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1809
CWE ID-CWE-416
Use After Free
CVE-2025-21436
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:16
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in DSP Service

Memory corruption may occur while initiating two IOCTL calls simultaneously to create processes from two different threads.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100psm8735_firmwaresw5100p_firmwarewsa8845_firmwarewcn7880_firmwarewsa8832_firmwaresm8750p_firmwarewcd9390wsa8835sw5100_firmwarewsa8830_firmwarewcd9395wsa8845wsa8840sxr2330pfastconnect_7800wsa8845h_firmwarefastconnect_7800_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresm8750wsa8830snapdragon_w5\+_gen_1_wearable_platform_firmwarewcn7880wsa8832snapdragon_w5\+_gen_1_wearable_platformsw5100wcd9378wsa8835_firmwarewcn7860sm8735sm8750psnapdragon_8_gen_3_mobile_platformwcn7861_firmwarewsa8840_firmwarewcn7750qmp1000wcn7881wcn7860_firmwaresm8750_firmwareqmp1000_firmwarewcd9378_firmwarewsa8845hsxr2330p_firmwarewcd9390_firmwarewcd9380_firmwarewcd9395_firmwarewcn7861wcn7750_firmwarewcd9380wcn7881_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-21281
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.26% / 49.27%
||
7 Day CHG+0.03%
Published-14 Jan, 2025 | 18:03
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft COM for Windows Elevation of Privilege Vulnerability

Microsoft COM for Windows Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10_1507windows_10_22h2windows_10_1607windows_11_23h2windows_server_2019windows_server_2022windows_10_1809windows_11_24h2windows_server_2025windows_11_22h2windows_server_2012windows_10_21h2windows_server_2022_23h2Windows Server 2019 (Server Core installation)Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2Windows Server 2025 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H2Windows 11 version 22H3Windows Server 2019Windows 10 Version 1607Windows Server 2022Windows 10 Version 1507Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2016 (Server Core installation)Windows 11 Version 24H2Windows Server 2016Windows 10 Version 1809
CWE ID-CWE-416
Use After Free
CVE-2025-21456
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.47%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-26 Feb, 2026 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in NPU

Memory corruption while processing IOCTL command when multiple threads are called to map/unmap buffer concurrently.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pqam8255psa8195psa7255pqam8775p_firmwarevideo_collaboration_vc1_platformsa7775pqam8650p_firmwarewsa8810_firmwareqcs610_firmwareqca6696qcc710qam8775pqca6174a_firmwaresw5100sa6150p_firmwarewsa8835_firmwareqca6698aq_firmwarewcn3660b_firmwaresa6155p_firmwareqcs410_firmwarec-v2x_9150_firmwarewcn3680bsnapdragon_x72_5g_modem-rf_system_firmwaresa8530p_firmwareqcc710_firmwareqfw7124sa8620pwcd9370sa8295pqca8337wcd9380snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwarewsa8815_firmwarefastconnect_6900_firmwaresa8540p_firmwareqam8650psa8150p_firmwareqcn6274_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresnapdragon_w5\+_gen_1_wearable_platformwcn3980qca6574auwcn3988snapdragon_x75_5g_modem-rf_systemqca6584au_firmwaresa9000psa9000p_firmwareqca6584auqam8255p_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)ar8035sa8195p_firmwarewcd9380_firmwareqca6797aq_firmwarewsa8830_firmwaresa8540psa8255p_firmwarear8035_firmwarewsa8835qam8295psa8775pfastconnect_7800qca8081_firmwareqca8337_firmwaresa8155pwcn3660bwsa8830sa8155p_firmwarewcn3988_firmwareqcn6224video_collaboration_vc1_platform_firmwaresa8295p_firmwaresa8620p_firmwaresa6145pwcd9385snapdragon_auto_5g_modem-rf_gen_2qca6696_firmwaresa8530psa8650p_firmwaresnapdragon_x72_5g_modem-rf_systemwcd9385_firmwarewcn3680b_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pqcs610wcn3950_firmwaresa6150pwcd9370_firmwaresa7255p_firmwareqca6574au_firmwarewsa8815snapdragon_888_5g_mobile_platformsa7775p_firmwaresa8255pwcd9341wsa8810sa6145p_firmwaresnapdragon_888_5g_mobile_platform_firmwareqca6797aqsnapdragon_x75_5g_modem-rf_system_firmwareqcn6274c-v2x_9150qfw7114sw5100p_firmwareqfw7114_firmwarewcd9340sa8775p_firmwarevideo_collaboration_vc3_platformsw5100_firmwarewcn3980_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8295p_firmwarefastconnect_7800_firmwareqca8081wcd9340_firmwaresa8145p_firmwarefastconnect_6900sa8150pwcd9341_firmwaresa8650pqca6174aqca6698aqsa6155pwcn3950qfw7124_firmwareqcs410qcn6224_firmwareSnapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-21453
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.91%
||
7 Day CHG+0.04%
Published-06 May, 2025 | 08:32
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in GPS HLOS Driver

Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd865_5gsnapdragon_632_mobileqca6595sm8735qca8081_firmwaresnapdragon_670_mobileqam8620p_firmwarewcn7880_firmwarewcd9340_firmwaresa8530pwcd9395_firmwareqcn6024wcn7750qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilefastconnect_6700wcn3610sa4150psnapdragon_782g_mobile_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395qca6574au_firmwaresnapdragon_x72_5g_modem-rfsm6370qca6564_firmwareqam8295pwcd9341sd626_firmwaresnapdragon_x12_lte_modemsnapdragon_888\+_5g_mobile_firmware205_mobilewsa8810_firmwaresd730_firmwarewsa8845h_firmwaresnapdragon_212_mobilesa9000p_firmwareqcs9100fastconnect_6800_firmwareqcs5430wcn7860sd835_firmwareqcm5430_firmwaresa4155pvideo_collaboration_vc1_platform_firmwaresa8770psnapdragon_678_mobile_firmwaresnapdragon_425_mobilesnapdragon_632_mobile_firmwaresa8540pvideo_collaboration_vc1_platformsa7255pqep8111sm8635snapdragon_730_mobile_firmwarewcd9385_firmwarevision_intelligence_200qca6310wcd9360snapdragon_680_4g_mobilesa6155psnapdragon_212_mobile_firmwareqca6564au_firmwaresnapdragon_429_mobile_firmwareqam8650psa9000psnapdragon_888_5g_mobile_firmwaresxr2250p_firmwaresnapdragon_662_mobile_firmwaresa6155p_firmwaresnapdragon_685_4g_mobile_firmwaresd835snapdragon_x55_5g_modem-rfsnapdragon_4_gen_2_mobile_firmwareqca6436_firmwaresnapdragon_695_5g_mobile_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm4125_firmwaresnapdragon_x62_5g_modem-rf_firmwareqca6420wcn3910csrb31024qca9367wcn3660bqca6574asnapdragon_x72_5g_modem-rf_firmwareqca6174awcd9340qcm2290talynplussnapdragon_auto_5g_modem-rf_gen_2snapdragon_835_mobile_pc_firmwaresxr2250psm8550p_firmwarewcn3988qcm8550snapdragon_765_5g_mobile_firmwareqcn9024vision_intelligence_300_firmwareqca6574215_mobileqamsrv1hqcs410qcm2290_firmwarevision_intelligence_100sm8650qsnapdragon_765g_5g_mobile_firmwaresa8155pwsa8830smart_display_200_firmwaresm8550psa6145psnapdragon_625_mobile_firmwaresa8255p_firmwaresm7635_firmwaresnapdragon_4_gen_2_mobilewcn7750_firmwaresa8650p_firmwarewcn6450_firmwaresrv1l_firmwareqcs9100_firmwaresnapdragon_865\+_5g_mobile_firmwaresnapdragon_429_mobilewcn3950_firmwarefastconnect_6200sm7325p_firmwarewcd9360_firmwarewcd9378snapdragon_480_5g_mobile_firmwaresnapdragon_210_firmwaresnapdragon_660_mobile_firmwaresm8635p_firmwaresm6650p_firmwaresnapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarerobotics_rb3_firmwaresd670_firmwaresnapdragon_8_gen_3_mobilesnapdragon_855_mobilesnapdragon_210qcn6224_firmwarevision_intelligence_100_firmwaresd660_firmwaresdx61_firmwaresnapdragon_750g_5g_mobile_firmwaresnapdragon_480_5g_mobilesrv1lsxr2130_firmwaresrv1msm7675psnapdragon_860_mobile_firmwarear8035_firmwaresnapdragon_778g\+_5g_mobilesd888_firmwaresnapdragon_x62_5g_modem-rfqcs6125_firmwarewsa8815_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwaresm7250p_firmwaresm4635_firmwarewcn3680_firmwaresa2150p_firmwarewcn3950snapdragon_730g_mobile_firmwaresm8750qca6797aq_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaretalynplus_firmwaresnapdragon_778g\+_5g_mobile_firmwaresa8295p_firmwaresmart_audio_400_firmwaresa4155p_firmwaresnapdragon_720g_mobilesm7250pcsrb31024_firmwaresa8155sd888wcn6755_firmwaresnapdragon_675_mobile_firmwaresnapdragon_768g_5g_mobileqca6310_firmwaresd626fastconnect_6800snapdragon_865_5g_mobile_firmwarefastconnect_6900_firmwareqmp1000_firmwarewcn7880wcn6755sxr2330pwcn7881video_collaboration_vc3_platformqcm2150_firmware215_mobile_firmwareqca6698aq_firmwareqcs2290qcs2290_firmwaresnapdragon_xr2\+_gen_1_firmwarewcn3615qca9367_firmwarewcn3680sa8255pwcd9390_firmwareqep8111_firmwareqcs615_firmwareqca6430snapdragon_855\+_mobilesnapdragon_765_5g_mobilesnapdragon_860_mobilesnapdragon_auto_5g_modem-rfsm8750_firmwaresnapdragon_x65_5g_modem-rf_firmwarecsra6640_firmwareqamsrv1mwcn7861qam8650p_firmwareqca6420_firmwareqcs6490_firmwaresm6650_firmwaresd855_firmwarewcn3980_firmwareqam8620pqca6436wcd9335_firmwarewsa8835wsa8840_firmwareqca6391_firmwareqcs4290_firmwareqcs8300qca8081csra6620sd660wsa8815mdm9628qam8775pqca9377qcm4325_firmwaresnapdragon_439_mobile_firmwaresnapdragon_720g_mobile_firmwareqcm4290_firmwaresnapdragon_710_mobileqcn9274_firmwareqcs5430_firmwaresnapdragon_x32_5g_modem-rfsg4150p_firmwarecsra6620_firmwareqcs8550sa8650psnapdragon_626_mobileqam8775p_firmwaresd865_5g_firmwaresm8750p_firmwaresnapdragon_xr1wcd9375snapdragon_636_mobilesa8145psnapdragon_8\+_gen_1_mobile_firmwaresmart_display_200sm7675p_firmwarewcn3680b_firmwaresnapdragon_8_gen_1_mobile_firmwareqcm8550_firmwareapq8017sa6150p_firmwarewcn6650qcs410_firmwarerobotics_rb3sw5100psxr1120qcs610_firmwarewcd9335wcd9370qca6696wcd9341_firmwaresxr2330p_firmwarewcn7881_firmwarewcn6450wcn6740_firmwaresnapdragon_780g_5g_mobilesnapdragon_750g_5g_mobilevision_intelligence_200_firmwaresnapdragon_685_4g_mobilesnapdragon_x50_5g_modem-rf_firmwaresnapdragon_auto_4g_modemsnapdragon_690_5g_mobile_firmwareqca6574auwcd9390sa8620p_firmwarecsra6640snapdragon_778g_5g_mobile_firmwaresrv1hsm8650q_firmwarewcn3660b_firmwaresd730snapdragon_690_5g_mobileqcn6024_firmwaresnapdragon_636_mobile_firmwareqcm5430snapdragon_625_mobileqcm6125_firmwareqcc710snapdragon_x32_5g_modem-rf_firmwaresnapdragon_xr2_5g_firmwaresnapdragon_xr1_firmwaresxr1120_firmware315_5g_iot_modem_firmwarefastconnect_6900robotics_rb2snapdragon_w5\+_gen_1_wearable_firmwareqfw7114315_5g_iot_modemqam8255p_firmwaresa8155_firmwaresdx61qca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_730_mobilewsa8845snapdragon_626_mobile_firmwareqcm6125wsa8810srv1h_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwarewcd9326_firmwaresnapdragon_845_mobile_firmwarewsa8840srv1m_firmwaresnapdragon_x35_5g_modem-rf_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobileqcs8550_firmwaresnapdragon_8_gen_2_mobile_firmwareqfw7124_firmwaresm8750pqcn9012qcs4490_firmwarewcn3910_firmwaresm8635psnapdragon_460_mobilesnapdragon_8_gen_2_mobileqmp1000wcd9370_firmwarerobotics_rb2_firmwaresa7255p_firmwaresnapdragon_8\+_gen_2_mobilesa8195pqca6335_firmwaresa8540p_firmwareqcm6490sm6370_firmwaresnapdragon_662_mobileqcn9274sa8775psxr2230p_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwareqcn9011sa8775p_firmwaresmart_audio_400wsa8845hqcn9024_firmwaresa6150pwcd9326sa8155p_firmwaresnapdragon_630_mobileqca6564asnapdragon_768g_5g_mobile_firmwaresm7675_firmwarear8035qamsrv1m_firmwareqca6564sa6155qcm4325qcn6224qcs615sa7775p_firmwareqca6698aqsm6250sm7635sa8530p_firmwaresnapdragon_480\+_5g_mobilesd670wcn3680bsa8145p_firmwaresa8150p_firmwarefastconnect_6700_firmwarewcn3990snapdragon_x75_5g_modem-rf_firmwareqcs6490snapdragon_695_5g_mobilesnapdragon_778g_5g_mobilefastconnect_6200_firmwarewsa8830_firmwaresnapdragon_460_mobile_firmwareqca6678aq_firmwarewsa8845_firmwarewsa8832snapdragon_auto_4g_modem_firmwarewcd9378_firmwareqca6678aqsnapdragon_x35_5g_modem-rf205_mobile_firmwarewcn7860_firmwaresa4150p_firmwareqca6564ausm4635snapdragon_425_mobile_firmwaresa8195p_firmwareqcm4290snapdragon_xr2\+_gen_1sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresm4125qcm4490_firmwarevision_intelligence_400_firmwareqcs6125snapdragon_870_5g_mobile_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobilesnapdragon_870_5g_mobilesnapdragon_678_mobilesm6250_firmwareqca6584auqcn6274_firmwareqcn9011_firmwaresa2150psw5100_firmwarewcn6740wcn6650_firmwaresnapdragon_780g_5g_mobile_firmwaresnapdragon_845_mobilesnapdragon_8_gen_3_mobile_firmwareqfw7114_firmwareqca6595_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesm8635_firmwareapq8017_firmwarewcd9380sa6145p_firmwaresa6155_firmwareqam8255psxr2230psnapdragon_xr2_5gsa8150psnapdragon_auto_5g_modem-rf_firmwaresm6650sw5100aqt1000snapdragon_4_gen_1_mobile_firmwaresm6650pqca6688aqqam8295p_firmwaresd855wcd9330_firmwarewcn3990_firmwaresm7315snapdragon_660_mobileqca6564a_firmwarewcd9385snapdragon_888\+_5g_mobilesnapdragon_8_gen_1_mobilesnapdragon_630_mobile_firmwarewcd9330wcn3610_firmwaresnapdragon_680_4g_mobile_firmwareqcs4290snapdragon_865\+_5g_mobilesg8275psdx55_firmwarewcn3615_firmwaresxr2130qcm4490snapdragon_480\+_5g_mobile_firmwarewcn7861_firmwareqca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfsnapdragon_670_mobile_firmwareaqt1000_firmwareqca6584au_firmwareqcn6274qfw7124qca6595au_firmwareqcs8300_firmwaresw5100p_firmwareqca6696_firmwarewcd9380_firmwareqca6574_firmwaresg4150psd_8_gen1_5gqca6797aqmdm9628_firmwaresnapdragon_x75_5g_modem-rfsa8620psdx55qca6574a_firmwaresnapdragon_4_gen_1_mobilesnapdragon_865_5g_mobilesnapdragon_835_mobile_pcsnapdragon_855\+_mobile_firmwaresd_8_gen1_5g_firmwarewcd9375_firmwaresa7775pqca6391qcn9012_firmwaresnapdragon_439_mobilesa8770p_firmwaresa8295psm8735_firmwarefastconnect_7800snapdragon_8\+_gen_2_mobile_firmwareqca6688aq_firmwarevision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmwareqamsrv1h_firmwaresm7675wsa8835_firmwarevision_intelligence_400wcn3980qcm2150snapdragon_w5\+_gen_1_wearableqcs610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2019-14088
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.72%
||
7 Day CHG~0.00%
Published-07 Feb, 2020 | 05:00
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use after free issue while CRM is accessing the link pointer from device private data due to lack of resource protection in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, MDM9206, MDM9207C, MDM9607, QCS605, SDM429W, SDX24, SM8150, SXR1130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9206mdm9207csm8150_firmwaresdx24_firmwaresdm429wsdx24mdm9206_firmwareqcs605mdm9607_firmwaremdm9607sdm429w_firmwaresm8150sxr1130_firmwareapq8009_firmwaresxr1130apq8009qcs605_firmwaremdm9207c_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2017-8246
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.84%
||
7 Day CHG~0.00%
Published-12 May, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In function msm_pcm_playback_close() in all Android releases from CAF using the Linux kernel, prtd is assigned substream->runtime->private_data. Later, prtd is freed. However, prtd is not sanitized and set to NULL, resulting in a dangling pointer. There are other functions that access the same memory (substream->runtime->private_data) with a NULL check, such as msm_pcm_volume_ctl_put(), which means this freed memory could be used.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAndroid for MSM, Firefox OS for MSM, QRD Android
CWE ID-CWE-416
Use After Free
CVE-2025-21458
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.47%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-26 Feb, 2026 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in NPU

Memory corruption when IOCTL interface is called to map and unmap buffers simultaneously.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-21466
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.47%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 12:49
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Display

Memory corruption while processing a private escape command in an event trigger.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8845_firmwarewsa8840wcd9370snapdragon_7c_gen_2_compute_firmwaresc8180xp-aaab_firmwarewcd9340_firmwarewcd9385sc8380xpwcd9341_firmwaresnapdragon_7c\+_gen_3_compute_firmwarefastconnect_6700qca6420sc8180xp-adsc8280xp-abbbqca6430wsa8815_firmwarewcd9370_firmwaresc8180xp-ad_firmwareqcm6490_firmwaresc8180xp-aaabwcd9340wcd9341qcm6490wsa8810_firmwarewsa8845h_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresc8180xp-acafsnapdragon_7c\+_gen_3_computewsa8835wsa8840_firmwareqca6391_firmwareqca6430_firmwarefastconnect_6800_firmwareqcs5430wsa8845hwcd9380_firmwareqcm5430sm6250_firmwaresc8180x-ad_firmwareqcm5430_firmwaresc8180x-acafwsa8815snapdragon_7c_computewsa8830snapdragon_7c_gen_2_computesc8180x\+sdx55_firmwaresnapdragon_7c_compute_firmwaresc8380xp_firmwarefastconnect_6800wcd9375_firmwarefastconnect_7800_firmwarefastconnect_6900qca6391qcs5430_firmwaresc8180x\+sdx55wcd9385_firmwaresm6250fastconnect_6900_firmwarewcd9380fastconnect_6200sc8280xp-abbb_firmwarefastconnect_7800sc8180x-acaf_firmwarewcd9375wsa8845fastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresc8180x-adwsa8835_firmwaresc8180x-aaabwsa8810sc8180x-aaab_firmwareqcs6490sc8180xp-acaf_firmwarefastconnect_6200_firmwarewsa8830_firmwarevideo_collaboration_vc3_platformaqt1000Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2025-20705
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.36%
||
7 Day CHG~0.00%
Published-01 Sep, 2025 | 05:12
Updated-26 Feb, 2026 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In monitor_hang, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09989078; Issue ID: MSV-3964.

Action-Not Available
Vendor-OpenWrtThe Linux FoundationMediaTek Inc.Google LLC
Product-mt6990mt6883mt6879mt8696mt6765mt6781mt8169mt6985mt8676mt6886mt6983mt8678mt6880mt8186mt8796mt6877mt6895mt6893mt6980dmt2735androidyoctomt6768mt6885mt6889openwrtmt6761mt6897mt8792mt6991mt8188mt6855mt2718mt6890mt6835mt8775mt6878mt6789mt6853mt6739mt6989mt6899MT2718, MT2735, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6899, MT6980D, MT6983, MT6985, MT6989, MT6990, MT6991, MT8169, MT8186, MT8188, MT8676, MT8678, MT8696, MT8775, MT8792, MT8796
CWE ID-CWE-416
Use After Free
CVE-2025-20781
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.38%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:46
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10182914; Issue ID: MSV-4699.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6833mt6886mt6765mt8795tandroidmt6879mt6989mt6991mt6893mt6895mt6835mt6897mt6985mt6899mt8678mt8196mt6877mt8768mt6983mt8792mt8793mt8667mt6878mt6768mt8796mt8798mt6789mt6739mt8676mt8771mt6761mt6855mt8766mt6853mt6889mt8186mt8188mt6883mt8765mt8791tmt8873mt6885mt8673mt8883mt6781mt8781MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883
CWE ID-CWE-416
Use After Free
CVE-2025-20799
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.38%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 01:46
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In c2ps, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10274607; Issue ID: MSV-5049.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6899mt6993androidmt8793mt6991MT6899, MT6991, MT6993, MT8793
CWE ID-CWE-416
Use After Free
CVE-2020-11124
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.76%
||
7 Day CHG~0.00%
Published-09 Sep, 2020 | 06:25
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Possible use-after-free while accessing diag client map table since list can be reallocated due to exceeding max client limit.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9607, Nicobar, QCS404, QCS405, QCS610, Rennell, SA6155P, SA8155P, Saipan, SC8180X, SDM660, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa6155p_firmwareqcs610sdm660qcs404_firmwaremdm9607_firmwaresm8250_firmwaresc8180x_firmwareqcs405sm7150_firmwaresa8155p_firmwaresm6150mdm9607sm7150sa6155pqcs610_firmwaresxr2130sc8180xqcs404sm8150_firmwaresxr2130_firmwareqcs405_firmwarerennellrennell_firmwaresdx55sa8155psaipan_firmwaresm6150_firmwaresm8250sm8150sdx55_firmwarenicobar_firmwaresaipansdm660_firmwarenicobarSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
CWE ID-CWE-416
Use After Free
CVE-2021-1927
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.04% / 10.76%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 09:10
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible use after free due to lack of null check while memory is being freed in FastRPC driver in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qca9377_firmwareqpm5679_firmwaresm6250p_firmwareipq4028_firmwareqca8337qdm5579ar9380ipq8173_firmwareqfs2608_firmwareqfs2530qpm8870_firmwareqln1030pm6125qcn5124qat5522_firmwarewcn3950_firmwarepm8150aqdm5670qca6595au_firmwareqpm5541_firmwareqpa5581_firmwaresa6155pm7150lqcc1110_firmwarepm8998_firmwareqpa8821wtr5975_firmwareqcs6125_firmwarepm456_firmwareqpa5580_firmwaresa415mwcn3998wcd9371_firmwarewcn3950qcn6024_firmwaresd720gsm4125qsw8573_firmwarewcn3660bsd450_firmwareqfe4320qsw8574_firmwaresd460_firmwaresmb2351_firmwarepm8953_firmwaresd6905gqpa4360_firmwareqca8081_firmwareqfe2520_firmwarewcn3998_firmwareapq8009w_firmwarepm855papq8053_firmwareqca6420pm6150aqpm6670_firmwareipq8070_firmwareipq8065ipq8078a_firmwarepm660_firmwarepm8150bipq8072_firmwaresa8155_firmwareipq8068qfe2101qca6430qat3522pmr735awcd9340sdm830_firmwaresd765gsdr660qfs2630_firmwaresdr865qdm5620_firmwaresmb1358qca9888_firmwaresmr545qca6696_firmwareqln5020wcd9371sd870_firmwareqcn5154_firmwarepmm855au_firmwaresa8150ppm6350qdm5621qfe3340qtc800sqat3514_firmwareqca9992_firmwaresd660qet6105pm640p_firmwaresd660_firmwareqcn5121qcn5022_firmwareqat5516_firmwarepm6150lsd450sd8885gpm855l_firmwareqca6428_firmwareqca9985_firmwareqtc410sipq4018_firmwarewcn3991qca9980_firmwareqpa8801sdm429wipq8078pm8150l_firmwareipq8173qat5533_firmwaresdx55m_firmwaresdxr25gqpa8673_firmwarepm6150smb1354_firmwaresd670_firmwareqca6574sd632_firmwareqfs2630qpa8842csr8811_firmwaresdr052_firmwarewcd9380qualcomm215qln4640qcs410qpm5579_firmwaresmb1380_firmwareqfe4309_firmwarepmk8350_firmwareqcn5024pm855p_firmwaresmb1381pm7250qca9379_firmwarewtr4905qpa8803sdx24_firmwareqca9985qcn9012_firmwaresd439_firmwaresdxr25g_firmwareqdm2301ipq6018_firmwarewcd9340_firmwarewsa8815wcn6850qfe2101_firmwarepmp8074_firmwareqdm5621_firmwareqdm2301_firmwareqpm6375ipq6028ipq8064pmp8074wcn3980_firmwaresd730pm660l_firmwarepm6250_firmwarewcn6740_firmwarepm8008pm8350b_firmwareqtm525_firmwarepme605_firmwareqcn5064_firmwarepme605sd678_firmwareipq8078_firmwareqpm5621_firmwareqcn5054qln1021aq_firmwareqcs603qca9896rsw8577qpa6560_firmwareqca9994qpa8802_firmwareqln4640_firmwareqfe4308_firmwareqca9980qpm5621qcn9024_firmwareipq8174_firmwareapq8009wpm8009_firmwareqfe4303qfs2580_firmwareqpm6582sd670qcm4290_firmwarewcn6855pm8150lpmi8998_firmwareqcs610_firmwaresa6145ppm660a_firmwarepm215pm4250qca9886_firmwarear8031qpm5577wtr2965sa2150pqca6391_firmwarepm8150qca4024pmi8937_firmwarewcd9370_firmwareqat3516_firmwaresdx55apq8053qcn5021_firmwarecsra6640pm8350bhsqat3555_firmwareqpa8803_firmwarewcn3660qca9379pm855bsmb2351qln1031qsm8250_firmwareqpm5870pm8909qcn5500wsa8830pm660qca9561qet6110_firmwareqdm5579_firmwareqpm6325pm6125_firmwareqbt1500qpa5581csrb31024qca9563_firmwarepmx24_firmwarefsm10055_firmwareqbt1500_firmwareqpm5870_firmwareqca9992qcs4290pmm855auqet6100qca6420_firmwaresmb1394_firmwareapq8009_firmwaresmb1396pm7150asd675_firmwareipq8072pm8350qpa5461_firmwareqpa4361_firmwarepm8350c_firmwareqca6426wcn3990_firmwareqca9984_firmwareqca9377qpm5641qpa5373_firmwarewcd9385_firmwareqdm5650_firmwareqpa4340_firmwarewcd9326_firmwarewcn3615_firmwarewtr2955pm7250_firmwaresdr845_firmwareqdm5620qln1021aqipq8074asmb1380qca9982pmk8002_firmwareqsw6310_firmwaresa8155qln1031_firmwareqdm4650_firmwareqcn5122_firmwarepmm6155au_firmwareqat5533sdx55_firmwareqcn6023_firmwarewcn3615sm7250p_firmwarewcn3610_firmwareqsm7250_firmwareqpm6670pm7150l_firmwareqca6584auqpm4641qat5515_firmwareipq8174pm855qpm8830_firmwaresd429pm8250qcn5052qdm4643qfs2530_firmwaresa415m_firmwarepmx55qpm4641_firmwareqcn9074sd205sd429_firmwarepm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwaresa8195psdr735_firmwarepm8953qat5515qpm5677qat3514wcd9326wcd9335qca9982_firmwarepm6350_firmwareqcn6023pm8004_firmwaresdr8150_firmwareqcs4290_firmwarepm439qtc800h_firmwarepmk7350_firmwareqpm5620qpm4630qca6390qca9898_firmwaresd750g_firmwareaqt1000wcd9375sm6250_firmwarepmm8195auqln4642msm8917_firmwareqpm5677_firmwareipq5010_firmwareipq8074a_firmwarewsa8815_firmwarepmi8937pm8998pmk7350sdw3100qpm8820_firmwaresmr525_firmwarewtr3925_firmwareqfe4301_firmwareapq8017qln1020_firmwareqpm6621_firmwarepm670a_firmwareqcm6125_firmwarepmx55_firmwarewtr2955_firmwareqfe4373fc_firmwarepm8150_firmwaresmb1398_firmwareqpm8830qat5522qca9896_firmwareipq8065_firmwarepm8150cpmr735bsd665_firmwareqpa4360pmk8003_firmwareqcn5154qca8075_firmwareqpa4361ipq6005_firmwareqpm4640_firmwareqpm5577_firmwarewcn6855_firmwareqdm5679_firmwarepm8350csmr525qca9888qca6310_firmwareqfe4305_firmwareipq8070a_firmwarepm6150l_firmwarepmr525pm8150a_firmwareqca6574_firmwareqca9886qcn5502_firmwareqln1036aq_firmwaresd665pm6150a_firmwarepm6150_firmwaresd765qca6574a_firmwareqpm4630_firmwareqat3555apq8009qpa5461sd8c_firmwarewtr2965_firmwarepm670_firmwarecsrb31024_firmwareqfs2608qcn9070_firmwaresd480_firmwareqln1036aqqtc801sipq6028_firmwareipq8072a_firmwareqca9531qpm5641_firmwareqca9889_firmwaresd710qcn5122pm8008_firmwareqpm6621pmr735a_firmwarepmw3100pmx50qcn5022sdr8250sd768gqln1030_firmwarewcn6740pmw3100_firmwarepm8004pm640lpmk8002qca8075qcn6024qcn9022sd845sdm830ipq6000_firmwareqcs410_firmwareqpa5580qpm5579fsm10055qfe2550sa6150p_firmwareqcs610qcn5550qpm5620_firmwareqdm2307qca6431_firmwareqpa8802wcd9360_firmwareqpm6585_firmwareqca9561_firmwareqat3519qbt2000_firmwareqca4024_firmwarepm855a_firmwareipq8078aqtc800hsa8150p_firmwareqcs2290sdr8250_firmwareqca6335msm8917qcn5064csra6620_firmwareqcs605_firmwareqln1020smr546_firmwareqdm5671csra6640_firmwarepmc1000hqpm4650_firmwareqat3518sd8csd632sdr425_firmwaresmr526_firmwareipq8076aqpa5460pm640a_firmwarewgr7640_firmwareqdm2305_firmwareqpm5670_firmwaresd710_firmwareqca4020qca6428qdm5652qca6574au_firmwareqcn5164_firmwareipq8071qpm8870wcd9375_firmwareqpm5679qbt2000sa6155_firmwaremsm8909wwcd9360qca6438_firmwarepmx50_firmwareqpa8675_firmwaresdr735gqpa5460_firmwarewcn3999qdm3301_firmwareqca7500qsm7250ipq4029_firmwareqcs6125ipq6010sd662_firmwareqcc1110qcs405smb1360qualcomm215_firmwarersw8577_firmwareqdm2308_firmwarefsm10056_firmwarepm439_firmwareqca4020_firmwareqca6436sa6155pwcn6851qcs603_firmwareqpa6560sdr675_firmwarewcn3660_firmwarewcd9341ipq8068_firmwarepmi8952pm8937_firmwareqca6431qdm4643_firmwaresm7350_firmwareqet4100_firmwaresd750gqfe4320_firmwareqdm3302wcn3910_firmwareqpm5657qpm5875_firmwarewsa8830_firmwaresd855_firmwareqdm5650wcn3988qca6438wtr3925sdr052sa8195p_firmwaresmb1390sdw3100_firmwareqca9898ipq4028qet4100wcn3610qpa8686_firmwareipq5018_firmwareqpm6585qca8337_firmwaresda429w_firmwarewcd9380_firmwaresmb1355ipq8072aqca7500_firmwareqln4650sdr735g_firmwarepm8350bhs_firmwarewgr7640ipq8076a_firmwareqat5568qdm5671_firmwareqet5100qca6564auqpa8801_firmwareqtm527_firmwarewcn6856_firmwarepm8005_firmwareqcn5164qca9558qet4101_firmwarepm7250bqln4642_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwareqcn5054_firmwareipq4019_firmwaresdx50m_firmwaresdr735smb1395pm660lsmr526qca8072_firmwarewtr5975qca6430_firmwarepmk8003qcn5052_firmwareqtc801s_firmwareqat3522_firmwarewcd9335_firmwarewcn3980pm7350c_firmwareqca6335_firmwareqsw8573qcs605wcn3910smb1394qca6426_firmwarepm8350_firmwarewcn3660b_firmwarewcn3680qca9984qfe4309qcn9024pm8009qpa8675qcn5550_firmwaresdr051_firmwaresdx55mipq8064_firmwarepm670aqca6421_firmwareqfe4373fcmsm8953qat3518_firmwarepmi8998qfe2520qsw8574sd6905g_firmwarear8031_firmwarewcn3680_firmwarepm855lwcn6851_firmwareqdm5670_firmwareipq8070sd8655gqcn5502pm7150a_firmwarepm8150b_firmwareqca9887_firmwareqfe4302smr545_firmwarepmc1000h_firmwareqca6564a_firmwareqdm2310_firmwarepm4250_firmwareqca9880sd480sd870qcn5121_firmwaresd8885g_firmwarepm670sd210_firmwareqdm5677pm8005qsm8250ipq6018pm855_firmwareqdm2302pmm6155ausdxr1pm855b_firmwareqcs405_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwareqln4650_firmwareqpm5875qet5100msd888_firmwaresa8155psd675sd439qet4101qca9531_firmwareqat3516pm670lqpm5658ar8035_firmwareqcm2290qpm5658_firmwareqcn5024_firmwarewcn3991_firmwareqdm5652_firmwarepmm8155au_firmwaresd678qcn9070sdr051qln5030qcs2290_firmwarepm4125fsm10056pmi632qpa2625_firmwarepm456pm8350bh_firmwarecsra6620pmr735b_firmwareqet5100_firmwareqpa5373qpm4621qcn9072smb1360_firmwareqca9880_firmwareqet6100_firmwarepm670l_firmwaresdr660gsd765g_firmwareqpa8686smb1358_firmwareqca6390_firmwareipq6000sd730_firmwarewcd9370qcn5152_firmwaresdr425pmr525_firmwareqca6584au_firmwareqcn9000_firmwareqfe3340_firmwareipq5018pmi632_firmwareqpm5541qat5516qca9563sd662qpa8821_firmwareqfe4308qcn5124_firmwaresdr660g_firmwarepm8350bhpm3003awcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwaresm7350smb1354ipq5010qca6564au_firmwareqdm2305sa6155p_firmwareqca6310qpm8820pm8937qpm2630qln5020_firmwaresa515m_firmwareqca9990smb1398sa6145p_firmwaresdr675sm6250apq8017_firmwarewsa8810_firmwaresd765_firmwareqdm5677_firmwareqca8081ipq8071aqca6174a_firmwareipq8071a_firmwarewcd9385qpm6325_firmwareqdm2302_firmwareqat3550_firmwarepmm8155auqln5040_firmwarepm4125_firmwarear8035csr8811qpa8673ipq4019qdm2310qfe2550_firmwaremsm8953_firmwareqcn9100_firmwareqln5030_firmwaresda429wsd210wcn3620_firmwareqfe4302_firmwaresmb1396_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareqca6564asmr546pmx24qet6110pmi8952_firmwareqca8072qcm2290_firmwareqln5040qpm8895sdr845qpm5670wcn3990qcn9000qtm527ar9380_firmwarepmk8350sdx24qcn9012qdm3302_firmwaresd888qca9558_firmwarepm8350bqdm2307_firmwaremsm8909w_firmwarewsa8835sdm429w_firmwareqpm5657_firmwaresm6250ppm855asdr660_firmwarepm8909_firmwareqca6574aipq4018pm8916_firmwareqca9889qca6174asmb1390_firmwareipq8074qfe4303_firmwareqca9994_firmwareqpm4640pm7350cqet5100m_firmwareipq8076_firmwareqpm4650qtm525sa515msa2150p_firmwarewtr6955sd855sm4125_firmwaresd8cxqfe4305ipq8076wtr6955_firmwareqca9887pm640pqcn5021qcn5152sd768g_firmwaresdr865_firmwarepm8250_firmwaresd460qca6391sd8cx_firmwaresdxr1_firmwaresmb1351ipq6005aqt1000_firmwarepm215_firmwareqcn9100qpm8895_firmwarepm660aqpa4340qcm4290sdx50mpm640asdr8150pm8916smb1395_firmwareqdm4650pmd9655ipq8074_firmwareqca6574ausa8155p_firmwaresd205_firmwareqsw6310qet6105_firmwaresd8655g_firmwarewcd9341_firmwareqcm6125wsa8810qtc410s_firmwareqpm2630_firmwareqcn5500_firmwareqat5568_firmwareqdm2308qat3550wtr4905_firmwarewcn6856qdm5679wcn3680bipq6010_firmwarepm3003a_firmwareqca6696qfe4301qtc800s_firmwaresmb1381_firmwaresd845_firmwareqpa2625sa6150pqcn9022_firmwareqca9990_firmwareipq8070apmm8195au_firmwareqcn9072_firmwaresm7250psd720g_firmwareipq8071_firmwareqcn9074_firmwareqpm4621_firmwarewcn3988_firmwareipq4029pm6250Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-416
Use After Free
CVE-2020-11120
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.38%
||
7 Day CHG~0.00%
Published-08 Sep, 2020 | 09:31
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Calling thread may free the data buffer pointer that was passed to the callback and later when event loop executes the callback, data buffer may not be valid and will lead to use after free scenario' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8096AU, APQ8098, Bitra, Kamorta, MSM8917, MSM8953, MSM8998, QCM2150, QCS405, QCS605, QM215, Rennell, Saipan, SDM429, SDM439, SDM450, SDM632, SM6150, SM7150, SM8150, SM8250, SXR2130

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-kamorta_firmwareqcm2150_firmwaremsm8953sdm450sdm632_firmwareapq8098_firmwaresdm450_firmwaremsm8998_firmwaresdm632qcm2150sdm439sm8250_firmwaresdm429qcs405sm7150_firmwaresm6150qm215sm7150msm8917sxr2130qcs605_firmwaresm8150_firmwaresxr2130_firmwareapq8096ausdm439_firmwareqcs405_firmwarerennellbitraapq8098rennell_firmwareqm215_firmwareqcs605msm8953_firmwareapq8096au_firmwaresaipan_firmwaresm6150_firmwaremsm8917_firmwarebitra_firmwaremsm8998sdm429_firmwaresm8150sm8250kamortasaipanSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2020-10838
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.04%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 17:20
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. PROCA allows a use-after-free and arbitrary code execution. The Samsung ID is SVE-2019-16132 (February 2020).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-416
Use After Free
CVE-2020-11175
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.76%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 10:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

u'Use after free issue in Bluetooth transport driver when a method in the object is accessed after the object has been deleted due to improper timer handling.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009W, MSM8909W, QCS605, QM215, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6350, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sm6350sa6155p_firmwaresm7250sxr2130p_firmwaresda640sm6125sdm640sdx50msdm845sm7250_firmwaresa8155_firmwaresdx55m_firmwaresm8250_firmwaresm6125_firmwaresm6350_firmwaresa8155p_firmwaremsm8909w_firmwareqm215sdm710apq8009wsdm710_firmwaresxr1120sda670_firmwaresa6155sa6155psdm670sda640_firmwareqcs605_firmwaresxr2130sdx50m_firmwaresdm670_firmwaresm8150_firmwaresxr2130_firmwaresdx55msxr2130psda670sm7225qm215_firmwareqcs605sda855sdx55sa8155psm8250sm8150p_firmwaresm7250p_firmwaresm7225_firmwaresm8150sdm1000_firmwaresa8155sm7250psxr1130_firmwaresdx55_firmwaresdm640_firmwaresa6155_firmwaresxr1120_firmwaresda855_firmwaremsm8909wsdm1000apq8009w_firmwaresxr1130sm8150psdm845_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2020-11295
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 13.38%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 09:10
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free in camera If the threadmanager is being cleaned up while the worker thread is processing objects in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580fsm10055qpm5679_firmwaresa6150p_firmwareqcs610qca6431_firmwareqfs2608_firmwareqfs2530qpm8870_firmwareqpa8802qpm6585_firmwarepm6125qat3519qbt2000_firmwareqat5522_firmwarewcn3950_firmwarepm8150aqtc800hqdm5670sa8150p_firmwareqca6595au_firmwaresdr8250_firmwareqpa5581_firmwaresa6155qpa8821smr546_firmwareqdm5671qpm4650_firmwareqat3518qpa5580_firmwaresdr425_firmwaresmr526_firmwarewcn3950wgr7640_firmwareqpm5670_firmwaresd710_firmwaresd460_firmwareqca6574au_firmwareqpm8870wcd9375_firmwareqpm5679qbt2000sa6155_firmwarepm6150aqpm6670_firmwaresdr735gpm660_firmwarepm8150bqdm3301_firmwaresa8155_firmwaresd662_firmwarepmr735afsm10056_firmwaresdr660qca6436wcn6851sa6155pqfs2630_firmwaresdr865qdm5620_firmwarewcd9341smr545qdm4643_firmwareqca6696_firmwareqca6431qln5020sd870_firmwarepmm855au_firmwaresa8150ppm6350qdm5621qtc800sqpm5875_firmwarewsa8830_firmwareqet6105wcn3988wtr3925sa8195p_firmwaresmb1390wcn6750_firmwareqat5516_firmwarepm6150lsd8885gqpm6585wcn3991wcd9380_firmwaresmb1355qln4650qpa8801sdr735g_firmwarewgr7640qat5568qet5100qdm5671_firmwareqpa8801_firmwareqca6564aupm8150l_firmwaresdx55m_firmwarewcn6856_firmwaresdxr25gpm6150smb1354_firmwaresd670_firmwareqca6574pm7250bqln4642_firmwareqfs2630qpa8842wcd9380smb1355_firmwarepm7250b_firmwaresmb1351_firmwareqcs410pmk8350_firmwaresdr735pm660lqpa8803smr526wcn3980pmk8003qtc801s_firmwaresdxr25g_firmwarewsa8815wcn6850qdm5621_firmwareqca6426_firmwarepm8350_firmwarepm8009wcn3980_firmwarepm660l_firmwaresdx55mqca6421_firmwarepm8008pm8350b_firmwareqtm525_firmwareqat3518_firmwareqpm5621_firmwarewcn6851_firmwareqdm5670_firmwaresd8655gqpa8802_firmwarepm8150b_firmwareqpm5621sd670smr545_firmwarepm8009_firmwareqca6564a_firmwareqfs2580_firmwareqcm4290_firmwaresd480sd870wcn6855sd8885g_firmwarepm8150lqcs610_firmwaresa6145ppmm6155ausdxr1qca6595_firmwarewtr2965qca6391_firmwarewcd9370_firmwareqln4650_firmwareqat3516_firmwareqpm5875qet5100msd888_firmwaresa8155pqat3555_firmwareqat3516qpa8803_firmwareqpm5870wcn3991_firmwarewsa8830pmm8155au_firmwarepm660qet6110_firmwareqln5030pm6125_firmwareqbt1500fsm10056qpa5581pmi632qpa2625_firmwarepm8350bh_firmwarepmr735b_firmwarefsm10055_firmwareqbt1500_firmwareqpm5870_firmwareqet5100_firmwareqpm4621qet6100_firmwareqcs4290qet6100pmm855ausdr660gqca6390_firmwaresmb1396wcd9370pm8350qpa5461_firmwaresdr425pm8350c_firmwarepmr525_firmwareqca6426wcn3990_firmwareqpm5641pmi632_firmwarewcd9385_firmwarewcd9326_firmwareqat5516qdm5620sd662qpa8821_firmwaresdr660g_firmwarepm8350bhpmk8002_firmwarepm3003asa8155qdm4650_firmwarepmm6155au_firmwareqca6595auqca6436_firmwareqpm6670smb1354qca6564au_firmwaresa6155p_firmwareqpm8820qpm4641qat5515_firmwareqln5020_firmwarepm8250smb1398qdm4643qfs2530_firmwarewcn3988_firmwarepmx55qpm4641_firmwaresa6145p_firmwarepm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwaresa8195psdr735_firmwarewsa8810_firmwareqpm5677qat5515wcd9326pm6350_firmwareqcs4290_firmwarewcd9385qtc800h_firmwarepmm8155auqln5040_firmwareqpm4630qca6390wcd9375pmm8195auqln5030_firmwareqln4642qpm5677_firmwarewsa8815_firmwarewtr3925_firmwaresmr525_firmwaresmb1396_firmwarewcn6850_firmwarewsa8835_firmwareqpm8820_firmwareqpm6621_firmwareqca6564asmr546qet6110qln5040qpm5670wcn3990pmx55_firmwareqca6595pmk8350smb1398_firmwaresd888pm8350bqat5522wsa8835pm8150cpmr735bpmk8003_firmwaresdr660_firmwareqca6574aqpm4640_firmwarewcn6855_firmwaresmb1390_firmwarepm8350csmr525qpm4640wcn6750pm6150l_firmwarepmr525pm8150a_firmwareqet5100m_firmwareqpm4650qtm525qca6574_firmwarepm6150a_firmwarepm6150_firmwareqca6574a_firmwareqpm4630_firmwaresdr865_firmwareqat3555pm8250_firmwaresd460qca6391sdxr1_firmwaresmb1351qpa5461wtr2965_firmwareqcm4290qfs2608sd480_firmwareqtc801sqdm4650qca6574auqpm5641_firmwaresd710sa8155p_firmwareqet6105_firmwarepm8008_firmwaresd8655g_firmwarewcd9341_firmwareqpm6621wsa8810pmr735a_firmwareqat5568_firmwarewcn6856sdr8250pm3003a_firmwareqca6696qtc800s_firmwareqpa2625pmk8002sa6150ppmm8195au_firmwareqpm4621_firmwareqcs410_firmwareqpa5580Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-416
Use After Free
CVE-2025-20706
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.36%
||
7 Day CHG~0.00%
Published-01 Sep, 2025 | 05:12
Updated-26 Feb, 2026 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In mbrain, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09924624; Issue ID: MSV-3826.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt8676mt8678mt6991androidmt6989mt6899MT6899, MT6989, MT6991, MT8676, MT8678
CWE ID-CWE-416
Use After Free
CVE-2020-11234
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.04% / 10.76%
||
7 Day CHG~0.00%
Published-07 Apr, 2021 | 07:55
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When sending a socket event message to a user application, invalid information will be passed if socket is freed by other thread resulting in a Use After Free condition in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfe3100qfe2080fc_firmwareqca9377_firmwareqfs2580qpm5679_firmwaremdm9640_firmwarepmd9607_firmwareqfe4455fc_firmwareqca8337qfs2530qln1030pm6125qat5522_firmwarewcn3950_firmwarepm8150aqdm5670qca6595au_firmwareqpm5541_firmwaresa6155pm7150lqcc1110_firmwarepm8998_firmwareqpa8821wtr5975_firmwareqpa5580_firmwaremsm8108wcn3998wcd9371_firmwaremsm8108_firmwarewcn3950mdm9206_firmwareqsw8573_firmwarewcn3660bsd450_firmwareqfe4320qsw8574_firmwaresmb2351_firmwarepm8953_firmwareqpa4360_firmwarewcn3998_firmwareqfe2520_firmwareapq8009w_firmwarepm855papq8053_firmwareqca6420wtr4605_firmwareqca9367_firmwarepm660_firmwarepm8150bsa8155_firmwareqfe2101qca6430qat3522qfe4455fcwcd9340sdm830_firmwaresd765gsdr660msm8209_firmwaresdr865mdm9250_firmwareqdm5620_firmwaresmb1358qca6696_firmwareqln5020wcd9371sd870_firmwaresmb1350pmm855au_firmwarewtr3950qfe3340qdm5621qtc800sqat3514_firmwaresd660sd712pm640p_firmwaresd660_firmwareqcn7606_firmwareqat5516_firmwaresd450pm855l_firmwareqtc410swcn3991qpa8801sdm429wpm8150l_firmwareqat5533_firmwaresdx55m_firmwaresdxr25gqpa8673_firmwarepm6150sd670_firmwareqca6574sd632_firmwareqpa8842sdr052_firmwarepmm8996auwcd9380qualcomm215qpm5579_firmwaresmb1380_firmwareqfe4309_firmwaresmb1381pm855p_firmwareqfe3100_firmwarepm7250qca9379_firmwarewtr4905qpa8803sdx24_firmwaresd439_firmwaresdxr25g_firmwarepmd9645qdm2301wcd9340_firmwarewsa8815qfe2101_firmwareqca6584_firmwareqdm2301_firmwareqdm5621_firmwareqpm6375sd835wcn3980_firmwaresd730qfe3320_firmwarepm660l_firmwarepm8008qtm525_firmwarepme605_firmwarepme605sd678_firmwareapq8064au_firmwareqpm5621_firmwareqln1021aq_firmwareqcs603rsw8577qpa6560_firmwareqpa8802_firmwareqfe4308_firmwareqpm5621qpm6582sd670pm8009_firmwareapq8009wqfe4303qfs2580_firmwareqcn7605_firmwarepm8150lpmi8998_firmwarepm660a_firmwarepm215ar8031qpm5577wtr2965sdm630_firmwaresa2150pqca6391_firmwaresd820_firmwarepmx20_firmwarepm8150pmi8937_firmwarewcd9370_firmwareqat3516_firmwaresdx55apq8053csra6640qat3555_firmwarepmi8994qpa8803_firmwarewcn3660qca9379pm855bsmb2351qln1031qcn7606pm8909pm660qet6110_firmwareqpm6325pm6125_firmwareqbt1500mdm9628_firmwaremdm9650pmx24_firmwareqbt1500_firmwarepmk8001pmm855aumdm9250qca6420_firmwareapq8009_firmwarepm7150asd675_firmwareqpa4361_firmwareqca6426wcn3990_firmwareqca9377qpa5373_firmwaresdw2500_firmwarewcd9385_firmwareqdm5650_firmwareqpa4340_firmwarewcd9326_firmwarewhs9410wcn3615_firmwarewtr2955rgr7640au_firmwarepm7250_firmwaresdr845_firmwareqdm5620qln1021aqsmb1380pmk8002_firmwareqsw6310_firmwaresa8155qca6584qln1031_firmwaresdx55_firmwareqat5533wcn3615sm7250p_firmwarewcn3610_firmwareqsm7250_firmwarepm7150l_firmwareqca6584aumsm8208qat5515_firmwarepm855qpm8830_firmwaresd429pm8250qca9367qfe2082fc_firmwaresdm630mdm9607_firmwaremdm9655_firmwareqfs2530_firmwarepmx55sd205sd429_firmwarepm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwarepm8953qat5515qpm5677qat3514wcd9326wcd9335pm8004_firmwaresdr8150_firmwarepm439qtc800h_firmwareqca6390wcd9375aqt1000qln4642msm8917_firmwareqpm5677_firmwaresdx20_firmwarewsa8815_firmwarewtr3925_firmwarepmi8937pm8998sdw3100smr525_firmwareqfe4301_firmwareapq8017qln1020_firmwarepm670a_firmwarepmx55_firmwarewtr2955_firmwareqbt1000_firmwareqfe4373fc_firmwareqca6595pm8150_firmwareqpm8830pmm8996au_firmwareqat5522pm8150csd665_firmwareqpa4360qpa4361mdm9206qpm5577_firmwareqdm5679_firmwaresmr525qca6310_firmwareqfe4305_firmwarepmr525pm8150a_firmwareqca6574_firmwarewtr3950_firmwareqln1036aq_firmwaresd665pm6150_firmwareqca6175asd765pmx20pmd9607qca6574a_firmwareqat3555apq8009qfe2082fcsd8c_firmwarewtr2965_firmwarepm670_firmwareqln1036aqqtc801sqfe3320sd710mdm9607pm8008_firmwareqln1035bd_firmwaresdx20m_firmwarepmw3100pmx50sdr8250sd768gqln1030_firmwaresmb1350_firmwarepmw3100_firmwarepm8004pm640lpmk8002sdw2500apq8096au_firmwaresd845sdm830smb1357qca6175a_firmwareqpa5580qpm5579qfe2550pmi8996qca6431_firmwareqpa8802wcd9360_firmwareqpm6585_firmwareqat3519qbt2000_firmwarepm855a_firmwareqtc800hsdr8250_firmwareqca6335msm8917csra6620_firmwareqcs605_firmwareqln1020wtr3905qdm5671csra6640_firmwarepmc1000hqpm4650_firmwareqat3518sd8csd632smr526_firmwaremdm9628pm640a_firmwareqpa5460wgr7640_firmwareqdm2305_firmwareqpm5670_firmwaresd710_firmwareqca4020qdm5652qca6574au_firmwarewcd9375_firmwareqpm5679qbt2000sa6155_firmwaremsm8909wwcd9360sdx20mpmx50_firmwarewhs9410_firmwareqpa5460_firmwarewcn3999qdm3301_firmwarepm8996qsm7250qcc1110qcs405smb1360qualcomm215_firmwareqfe3440fcrsw8577_firmwarepm439_firmwareqca4020_firmwareqca6436sa6155pqcs603_firmwareqpa6560wcn3660_firmwarewcd9341pmi8952mdm9655pm8937_firmwareqca6431qet4100_firmwareqfe4320_firmwaresd855_firmwareqdm5650wtr3925qfe2080fcsdr052smb1390sdw3100_firmwaremsm8208_firmwareqet4100wcn3610msm8608mdm9640qpa8686_firmwareqpm6585qca8337_firmwarewcd9380_firmwaresmb1355qln4650qtc800t_firmwarewcd9330msm8996au_firmwarewgr7640csr6030qet5100qdm5671_firmwareqpa8801_firmwareqca6564ausd636pm8005_firmwareqet4101_firmwarepm7250bqln4642_firmwarepmk8001_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwarepm8996_firmwareqet4200aq_firmwaresdx50m_firmwaresmb1395smb358spm660lsmb358s_firmwarear8151smr526wtr5975qca6174qca6430_firmwareqtc801s_firmwarewcd9335_firmwareqat3522_firmwarewcn3980qca6335_firmwareqsw8573qcs605qbt1000qca6320mdm9650_firmwareqca6426_firmwarewcn3660b_firmwarewcn3680qfe4309pm8009sdr051_firmwarewcd9330_firmwaresdx55mpm670aqca6421_firmwarewtr3905_firmwareqfe4373fcmsm8953qat3518_firmwarepmi8998qfe2520qsw8574sd821_firmwarear8031_firmwarewcn3680_firmwarepm855lqdm5670_firmwaresd8655gpm7150a_firmwarepm8150b_firmwareqfe4302pmc1000h_firmwareqca6564a_firmwarepmd9645_firmwaresd870pm670sd210_firmwareqdm5677pm8005pm855_firmwareqdm2302sdxr1pm855b_firmwareapq8096auqca6595_firmwareqcs405_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwarepmi8996_firmwareqln4650_firmwareqet5100msa8155psd675wtr4605sd439qet4101qat3516pm670lqpm5658ar8035_firmwareqpm5658_firmwarewcn3991_firmwareqdm5652_firmwareqfe4465fcsd678sdr051qln5030pmi632qpa2625_firmwareqfe2081fc_firmwaresmb1360_firmwarecsra6620qet5100_firmwareqpa5373pm670l_firmwaresdr660gsd765g_firmwareqpa8686smb1358_firmwareqca6390_firmwareqca6174_firmwaresd730_firmwarewcd9370pmr525_firmwareqca6584au_firmwareqfe3340_firmwarear8151_firmwarepmi632_firmwareqcn7605qpm5541qat5516qpa8821_firmwareqfe4308sdr660g_firmwarepm3003aqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareqtc800tqca6564au_firmwareqdm2305sa6155p_firmwareqca6310pm8937qfe2081fcqln5020_firmwaresa515m_firmwaresd821sd712_firmwareapq8017_firmwarewsa8810_firmwaresmb231sd765_firmwareqdm5677_firmwareqet4200aqqca6174a_firmwarewcd9385qpm6325_firmwareqdm2302_firmwareqat3550_firmwareqln5040_firmwarear8035apq8064auqpa8673qfe2550_firmwareqln5030_firmwaremsm8953_firmwaresd210wcn3620_firmwareqfe4302_firmwaresd820wcn3620csr6030_firmwareqca6564apmx24qet6110pmi8952_firmwareqln5040qpm8895sdr845qpm5670wcn3990qfe3440fc_firmwaresdx24pmi8994_firmwaremsm8909w_firmwaremsm8996ausdm429w_firmwarergr7640auqln1035bdpm855asdr660_firmwarepm8909_firmwareqca6574apm8916_firmwaresmb1390_firmwareqca6174aqfe4303_firmwareqet5100m_firmwareqpm4650qtm525sa515msa2150p_firmwaresd855sd8cxqfe4305pm640psd768g_firmwaresdr865_firmwaremsm8209qfe4465fc_firmwarepm8250_firmwaresmb1351qca6391sd8cx_firmwaresdxr1_firmwaresmb1357_firmwareaqt1000_firmwarepm215_firmwareqpm8895_firmwarepm660aqpa4340sdx50mpm640asdr8150sdx20pm8916smb1395_firmwarepmd9655qca6574ausa8155p_firmwaresd205_firmwareqsw6310sd8655g_firmwarewcd9341_firmwarewsa8810qtc410s_firmwaresmb231_firmwarewtr4905_firmwareqat3550qdm5679wcn3680bsd835_firmwarepm3003a_firmwareqca6696qfe4301qtc800s_firmwaresmb1381_firmwaresd845_firmwaremsm8608_firmwareqpa2625sm7250psd636_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2020-11239
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.55%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 05:00
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use after free issue when importing a DMA buffer by using the CPU address of the buffer due to attachment is not cleaned up properly in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qfs2580qca9377_firmwareqpm5679_firmwaresm6250p_firmwarepmd9607_firmwareqca8337qdm5579qfs2608_firmwareqfs2530qpm8870_firmwareqln1030pm6125qat5522_firmwarewcn3950_firmwarepm8150aqdm5670qca6595au_firmwareqpm5541_firmwareqpa5581_firmwaresa6155pm7150lqcc1110_firmwarepm8998_firmwareqpa8821sd_455_firmwareapq8076wtr5975_firmwareqcs6125_firmwarepm456_firmwareqpa5580_firmwaresa415mwcn3998wcd9371_firmwarewcn3950sm4125sd720gmdm9206_firmwareqsw8573_firmwarewcn3660bsd450_firmwareqfe4320qsw8574_firmwaresd460_firmwaresmb2351_firmwarepm8953_firmwareqpa4360_firmwarewcn3998_firmwareqfe2520_firmwareapq8009w_firmwarepm855papq8053_firmwareqca6420pm6150aqpm6670_firmwareqca9367_firmwarepm660_firmwarepm8150bsa8155_firmwareqfe2101qca6430qat3522pmr735awcd9306_firmwarewcd9340sdm830_firmwaresd765gsdr660qfs2630_firmwaresdr865mdm9250_firmwareqdm5620_firmwaresmb1358qca6696_firmwareqln5020wcd9371smb1350pmm855au_firmwaresm4350_firmwaresd_8cxwtr3950pm6350qdm5621qfe3340qtc800sqat3514_firmwaresd660sd865_5g_firmwarepm640p_firmwaresd660_firmwarewcn6750_firmwareqat5516_firmwarepm6150lsd450pm855l_firmwareqtc410swcn3991qpa8801sdm429wpm8150l_firmwareqat5533_firmwaresdx55m_firmwareqpa8673_firmwarepm6150smb1354_firmwaresd670_firmwareqca6574sd632_firmwareqfs2630qpa8842sdr052_firmwarepmm8996auwcd9380qualcomm215qln4640qcs410qpm5579_firmwaresmb1380_firmwareqfe4309_firmwarepmk8350_firmwaresmb1381pm855p_firmwaresd690_5g_firmwarepm7250qca9379_firmwarewtr4905qpa8803sdx24_firmwaresd439_firmwareqdm2301wcd9340_firmwarewsa8815wcn6850qfe2101_firmwareqdm5621_firmwareqdm2301_firmwaremsm8937_firmwareqpm6375sd_8c_firmwaresd835wcn3980_firmwaresd730pm660l_firmwarepm6250_firmwarewcn6740_firmwarepm8008pm8350b_firmwareqtm525_firmwarepme605_firmwarepme605apq8064au_firmwareqpm5621_firmwareqln1021aq_firmwareqcs603rsw8577qpa6560_firmwareqpa8802_firmwareqln4640_firmwareqfe4308_firmwareqpm5621qpm6582sd670pm8009_firmwareapq8009wqfe4303qfs2580_firmwarepm8150lpmi8998_firmwareqcs610_firmwaresa6145ppm660a_firmwarepm215ar8031qpm5577wtr2965sdm630_firmwaresd820_firmwareqca6391_firmwarepmx20_firmwarepm8150pmi8937_firmwarewcd9370_firmwareqat3516_firmwaresdx55apq8053csra6640pm8350bhsqat3555_firmwarepmi8994qpa8803_firmwarewcn3660qca9379pm855bsmb2351qln1031qsm8250_firmwareqpm5870pm8909wsa8830pm660qet6110_firmwareqdm5579_firmwareqpm6325pm6125_firmwareqbt1500qpa5581csrb31024mdm9650sd_636pmx24_firmwarefsm10055_firmwareqbt1500_firmwareqpm5870_firmwarepmk8001qet6100pmm855aumdm9250qca6420_firmwaresmb1394_firmwareapq8009_firmwaresd690_5gsmb1396pm7150asd675_firmwarepm8350qca6564qpa4361_firmwarepm8350c_firmwareqpa5461_firmwareqca6426wcn3990_firmwareqca9377qpm5641qpa5373_firmwaresdw2500_firmwarewcd9385_firmwareqdm5650_firmwareqpa4340_firmwaresdxr2_5g_firmwarewcd9326_firmwarewcn3615_firmwarewtr2955rgr7640au_firmwarepm7250_firmwaresdr845_firmwareqdm5620qln1021aqsmb1380pmk8002_firmwareqsw6310_firmwaresa8155qln1031_firmwareqdm4650_firmwaresdx55_firmwarepmm6155au_firmwareqat5533wcn3615sm7250p_firmwarewcn3610_firmwarepm8940qpm6670qsm7250_firmwarepm7150l_firmwarewcd9306qca6584auqpm4641qat5515_firmwarepm855qpm8830_firmwaresd429pm8250qca9367sdm630mdm9655_firmwareqdm4643qfs2530_firmwaresa415m_firmwarepmx55qpm4641_firmwarewcn3988_firmwaresd205sd429_firmwarepm8150c_firmwareqca6421qdm3301qpa8842_firmwareqat3519_firmwaresdr735_firmwarepm8953qat5515qpm5677qat3514wcd9326wcd9335pm6350_firmwarepm8004_firmwaresdr8150_firmwarepm439qtc800h_firmwarepmk7350_firmwareqpm5620qpm4630qca6390wcd9375sd750g_firmwareaqt1000sm6250_firmwareqln4642msm8917_firmwareqpm5677_firmwaresdx20_firmwarewsa8815_firmwaresd888_5g_firmwarepmi8937pm8998pmk7350sdw3100qpm8820_firmwaresmr525_firmwarewtr3925_firmwareqfe4301_firmwareapq8017qln1020_firmwareqpm6621_firmwarepm670a_firmwareqcm6125_firmwarepmx55_firmwarewtr2955_firmwareqbt1000_firmwareqfe4373fc_firmwaresd865_5gpm8150_firmwaresmb1398_firmwareqpm8830pmm8996au_firmwareqat5522pm8150cpmr735bsd665_firmwareqpa4360pmk8003_firmwareqpa4361qpm4640_firmwaremdm9206qpm5577_firmwareqdm5679_firmwarepm8350csmr525qca6310_firmwareqfe4305_firmwarepm6150l_firmwarepmr525pm8150a_firmwareqca6574_firmwarewtr3950_firmwareqln1036aq_firmwaresd665pm6150a_firmwarepm6150_firmwaresd765pmx20pmd9607qca6574a_firmwareqpm4630_firmwareqat3555apq8009qpa5461wtr2965_firmwarepm670_firmwarecsrb31024_firmwareqfs2608qln1036aqqtc801sqpm5641_firmwaresd710pm8008_firmwaresdx20m_firmwareqpm6621pmr735a_firmwarepmw3100pmx50qca6564_firmwaresdr8250sd768gqln1030_firmwaresmb1350_firmwarewcn6740pmw3100_firmwarepm8004pm640lmsm8940pmk8002apq8096au_firmwaresdw2500sd845sdm830smb1357qcs410_firmwareqpa5580qpm5579fsm10055qfe2550qcs610pmi8996qpm5620_firmwareqdm2307qca6431_firmwareqpa8802qpm6585_firmwareqat3519qbt2000_firmwarepm855a_firmwareqtc800hsdr8250_firmwareqca6335msm8917csra6620_firmwareqcs605_firmwareqln1020sd_675_firmwarewtr3905qdm5671csra6640_firmwarepmc1000hqpm4650_firmwareqat3518sd632sdr425_firmwaresmr526_firmwareqpa5460pm640a_firmwarewgr7640_firmwareqdm2305_firmwareqpm5670_firmwaresd710_firmwareqca4020qdm5652qca6574au_firmwareqpm8870wcd9375_firmwareqpm5679qbt2000sa6155_firmwaremsm8909wsdx20mpmx50_firmwareqpa8675_firmwaresdr735gqpa5460_firmwarewcn3999pm8940_firmwareqdm3301_firmwarepm8996qsm7250qcs6125sd662_firmwareqcc1110qcs405smb1360qualcomm215_firmwarersw8577_firmwareqdm2308_firmwarefsm10056_firmwarepm439_firmwareqca4020_firmwareqca6436sa6155pwcn6851qcs603_firmwareqpa6560msm8937sdr675_firmwarewcn3660_firmwarewcd9341pmi8952qdm4643_firmwaremdm9655pm8937_firmwareqca6431sm7350_firmwareqet4100_firmwaresd750gqfe4320_firmwareqdm3302wcn3910_firmwareqpm5657qpm5875_firmwarewsa8830_firmwaresd855_firmwareqdm5650wcn3988wtr3925sdr052smb1390sdw3100_firmwareqet4100wcn3610qpa8686_firmwareqpm6585qca8337_firmwaresda429w_firmwarewcd9380_firmwaresmb1355qln4650qtc800t_firmwarewcd9330msm8996au_firmwaresdr735g_firmwarepm8350bhs_firmwarewgr7640qat5568qet5100qdm5671_firmwareqpa8801_firmwareqca6564auqtm527_firmwarewcn6856_firmwarepm8005_firmwaremsm8940_firmwareqet4101_firmwarepm7250bqln4642_firmwarepmk8001_firmwaresmb1355_firmwarepm7250b_firmwarepmd9655_firmwaresmb1351_firmwarepm8996_firmwareqet4200aq_firmwaresdx50m_firmwaresdr735smb1395pm660lar8151smr526wtr5975qca6430_firmwarepmk8003qtc801s_firmwarewcd9335_firmwareqat3522_firmwarewcn3980pm7350c_firmwareqca6335_firmwareqsw8573qcs605qbt1000wcn3910qca6320mdm9650_firmwaresmb1394qca6426_firmwarepm8350_firmwarewcn3660b_firmwarewcn3680qfe4309pm8009qpa8675sdr051_firmwarewcd9330_firmwaresdx55mpm670aqca6421_firmwarewtr3905_firmwareqfe4373fcmsm8953qat3518_firmwarepmi8998qfe2520qsw8574sd821_firmwarear8031_firmwarewcn3680_firmwarepm855lwcn6851_firmwareqdm5670_firmwarepm7150a_firmwarepm8150b_firmwareqfe4302sd_636_firmwarepmc1000h_firmwareqca6564a_firmwareqdm2310_firmwarepm670sd210_firmwareqdm5677pm8005qsm8250pm855_firmwareqdm2302pmm6155ausdxr1pm855b_firmwareapq8096auqcs405_firmwareqpm6582_firmwareqpm6375_firmwarepm640l_firmwarepmi8996_firmwareqln4650_firmwareqpm5875qet5100msa8155psd675sd439qet4101pm8952qat3516pm670lqpm5658ar8035_firmwareqpm5658_firmwarewcn3991_firmwareqdm5652_firmwarepmm8155au_firmwaresdr051qln5030pm4125fsm10056pmi632qpa2625_firmwarepm456pm8350bh_firmwarecsra6620pmr735b_firmwareqet5100_firmwareqpa5373qpm4621smb1360_firmwareqet6100_firmwarepm670l_firmwaresdr660gsd765g_firmwareqpa8686smb1358_firmwareqca6390_firmwaresd730_firmwarewcd9370sdr425pmr525_firmwareqca6584au_firmwareapq8076_firmwareqfe3340_firmwarear8151_firmwarepmi632_firmwaresd_8cx_firmwareqpm5541qat5516sd662qpa8821_firmwareqfe4308sdr660g_firmwarepm8350bhapq8037pm3003aqca6320_firmwarewcn3680b_firmwareqca6595auwcn3999_firmwareqca6436_firmwareqtc800tsm7350smb1354qca6564au_firmwareqdm2305sa6155p_firmwareqca6310qpm8820pm8937qpm2630qln5020_firmwaresa515m_firmwaresdxr2_5gsmb1398sd821sa6145p_firmwaresdr675sm6250apq8017_firmwarewsa8810_firmwaresmb231sd765_firmwareqdm5677_firmwareqet4200aqqca6174a_firmwarewcd9385qpm6325_firmwareqdm2302_firmwareqat3550_firmwarepmm8155auqln5040_firmwarepm4125_firmwarear8035apq8064auqpa8673qdm2310qfe2550_firmwaremsm8953_firmwareqln5030_firmwarepm8952_firmwaresda429wsd210wcn3620_firmwareqfe4302_firmwaresd820smb1396_firmwarewcn6850_firmwarewcn3620wsa8835_firmwareqca6564apmx24qet6110pmi8952_firmwareqln5040qpm8895sdr845qpm5670wcn3990sd_675qtm527pmk8350sdx24qdm3302_firmwarepmi8994_firmwarepm8350bqdm2307_firmwaremsm8909w_firmwarewsa8835msm8996ausdm429w_firmwareqpm5657_firmwaresd888_5gsm6250prgr7640aupm855asdr660_firmwarepm8909_firmwareqca6574apm8916_firmwaresmb1390_firmwareqca6174aqfe4303_firmwareqpm4640wcn6750pm8956_firmwarepm7350cqet5100m_firmwareqpm4650qtm525sa515mwtr6955sd855sm4125_firmwareqfe4305wtr6955_firmwarepm640psd768g_firmwaresdr865_firmwarepm8250_firmwaresd460qca6391sdxr1_firmwaresmb1351smb1357_firmwareaqt1000_firmwarepm215_firmwaremsm8920qpm8895_firmwarepm660aqpa4340sdx50mpm640asdr8150sdx20pm8916msm8920_firmwareqdm4650smb1395_firmwaresd_455pmd9655qca6574ausa8155p_firmwaresd205_firmwareqsw6310wcd9341_firmwareqcm6125wsa8810qtc410s_firmwareqpm2630_firmwaresmb231_firmwareqat5568_firmwareqdm2308qat3550wtr4905_firmwarewcn6856qdm5679sd_8cwcn3680bsd835_firmwarepm3003a_firmwareqca6696qfe4301qtc800s_firmwaresm4350sd845_firmwaresmb1381_firmwareqpa2625apq8037_firmwaresm7250psd720g_firmwareqpm4621_firmwarepm8956pm6250Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-416
Use After Free
CVE-2024-43701
Matching Score-4
Assigner-Imagination Technologies
ShareView Details
Matching Score-4
Assigner-Imagination Technologies
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.52%
||
7 Day CHG~0.00%
Published-14 Oct, 2024 | 08:17
Updated-15 Oct, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GPU DDK - PowerVR: TLB invalidate UAF of dma_buf imported into multiple GPU devices

Software installed and run as a non-privileged user may conduct GPU system calls to read and write freed physical memory from the GPU.

Action-Not Available
Vendor-Imagination Technologies Limited
Product-Graphics DDKgraphics_ddk
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-1905
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-1.06% / 77.42%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 09:10
Updated-28 Oct, 2025 | 13:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.

Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-pm8150msm8996auqbt2000_firmwarewcn3990_firmwareqca6426_firmwareqfe4373fc_firmwaresd710_firmwareqpm6621wsa8835_firmwarepm640l_firmwareqcs605pm7250_firmwarewcd9341_firmwarewcn3660bqat3550_firmwareqtc800t_firmwarepmi8937_firmwaresd8885g_firmwarewsa8830wcd9340apq8009w_firmwarepmi632_firmwareqat3514pm855_firmwareqet4100_firmwareqdm4650_firmwareqca6564aqpm6621_firmwarepm7150a_firmwareqsw8573wtr6955wcn6856_firmwareqca6420_firmwareqet4101sd632_firmwareqpm6670_firmwaresd888apq8064au_firmwareqpa4361_firmwarepm7150lsmb1396_firmwarepm7250b_firmwarewcd9326_firmwarewcd9380_firmwarepm660l_firmwareqdm2307smr526pm670l_firmwareqdm2310sdr660qca6595ausd662_firmwaresda429wqca6390pm8004smb231pmc1000h_firmwarepm6350sm6250qpa8801_firmwaresmr525sdr425qfe4303_firmwareqtm525qcm6125qat5515_firmwaremsm8996au_firmwareqdm5621qfe2101_firmwarepm8350qpa8802sa6150p_firmwareqat3519_firmwareqcs603wcd9370_firmwarepm8350_firmwarear8151_firmwarepm439qca9377apq8053_firmwareqca4020qtc800spm8009_firmwareqdm5671_firmwarepm8004_firmwarepmw3100_firmwarewcn3620pm8909wcn6850_firmwareqat5516_firmwareqfs2580qet6100_firmwarewcd9360smr525_firmwareqpm6585_firmwarepmi8937pm855a_firmwarewsa8810smr546_firmwareqdm5670_firmwareqpm5620sdr845qpm4641qpa6560_firmwarewtr4905pmm8920ausd8cx_firmwaresd665sdr865_firmwarecsra6620_firmwareqat3516qtc800s_firmwaresdr425_firmwarepmr735bqpm8820_firmwareqca6335qfs2530_firmwareqcm2290_firmwarepmm8920au_firmwareqpa5581_firmwareqca9367_firmwareqca9367qca9377_firmwaresa8195p_firmwareqdm2302sa6150pqpm4650_firmwarepm456sa8155ppm6150a_firmwareqpa5580pmi8952qpm5670pmm6155au_firmwareqca6696_firmwarepm8150lpm8150a_firmwarepm8005qfe4309wcn3950_firmwareqcs2290qpm8830apq8017_firmwarepmm8996auqdm2310_firmwarewcn3998_firmwareqfe3100_firmwaresdx20_firmwarewcn3610qdm2302_firmwaresdr660gsmb1358_firmwarewsa8815pmm6155auqpm5577_firmwareqpa5580_firmwareqet6100wsa8815_firmwareqpa8675sd765_firmwaresdw2500_firmwaresdxr2_5g_firmwarepme605qpa8821_firmwaresdxr2_5gwcd9335smb231_firmwaresm6250pqca6335_firmwarewcn3660pm640p_firmwarepm4125_firmwareqdm5670sd888_firmwaremsm8909w_firmwareqca6421_firmwarewcn3991pm660asd750g_firmwareqca6584auqln5040_firmwarepmx50_firmwaresmb1360_firmwareqsw6310mdm9650qpa8803_firmwareqfe3340_firmwarepm8909_firmwareqdm2301_firmwarepm8150b_firmwaresdr052_firmwarepmk8350_firmwarewcn3615qpm4640qca6420qca6430_firmwarepm6125pm3003a_firmwarepm215_firmwareqpm8830_firmwareqpa8801pm4125qca6391_firmwareqln1030sdr735sd439_firmwareqfs2608csra6640sd678_firmwaremsm8917_firmwarewcn6855_firmwaresd678qcs605_firmwaresd8cxsmb1381qet5100_firmwarewcn3615_firmwarepm855p_firmwaresdr735gapq8009_firmwaresa6155sa2150pwcd9385_firmwareqcm2290qat5516qtm527wtr2965_firmwareqfe4301_firmwarepm8916_firmwaresmb1354_firmwaresdr8150qpm5577sdw3100wtr5975_firmwarewgr7640qca9379qpm2630_firmwareqca6584au_firmwarepmi632sda429w_firmwarepmr525_firmwareqca6421sd210apq8009wsd835_firmwaresmb1395pm6150_firmwarepm8350bpmx20_firmwareqfs2630qca6390_firmwaresd765qca6310_firmwareqca6595au_firmwaresa6155pqcs410_firmwaresmb1350_firmwaresd710qat3518_firmwareqat3550qpa5460apq8053pmr735afsm10056_firmwarepm7250qbt1000qcs610smb1357_firmwareapq8064ausdr660g_firmwaresd636_firmwareqpm6375_firmwarepmm855ausd8655g_firmwarepm855l_firmwareqpm5677_firmwaresmb358spm4250_firmwaresmr546qdm2305_firmwareqet6105_firmwaresa515m_firmwareqbt1500qpa2625_firmwareqat3522_firmwareqfe3340wcn3620_firmwareqfe3100qfs2530sd6905gpmr735a_firmwarewtr2955_firmwarewcn3991_firmwaresdr675qpm5679_firmwaresd835wcn3680b_firmwareqcm4290_firmwareqpa8686qln4640_firmwarepm215sdr845_firmwareqca6564_firmwarepm855psd455_firmwareqet6110qfe2550sdxr1_firmwarepmk8003_firmwareqca6310rsw8577_firmwareqet6105qpa8686_firmwareqpm5621_firmwareqpm5620_firmwaresa6145pwcd9335_firmwareqpa8821qsw6310_firmwaresd8c_firmwarefsm10055_firmwarepm855qca6174aqfs2630_firmwaresmb1398_firmwareqdm2307_firmwaresdx24pm6350_firmwareqdm5677sdr735g_firmwarewcd9340_firmwaresd6905g_firmwareqat5533_firmwareqat5522sd8csa8195ppmk8002_firmwareqpm6375sd750gsdw3100_firmwarewcd9375_firmwarewcd9330qca6564a_firmwareqcs2290_firmwareqdm5620_firmwarepm670a_firmwaresd636wcd9380qbt2000qfe4373fcmdm9628qtm527_firmwarepmk8002qca6436pmm855au_firmwareqcs603_firmwareqpm5621wcn3660_firmwarepm6150sm7250psdx24_firmwarepm8008_firmwareqca8337_firmwarepm8150c_firmwareqpm5658_firmwarewtr3925sdx50mwcd9360_firmwareqpa5461qln5040qca6696qsw8574pm8916qbt1500_firmwareqet4101_firmwaresmb1350smb1380_firmwareqca6574asd460qpm4630qpm8895_firmwareqpm5579qpm6325apq8009sdm830smb1355pm670qdm5679mdm9206_firmwarepm8937_firmwarepm8937sd210_firmwarewcd9371_firmwaresdm630qat5568_firmwareqpm6670wcn3999qpa5373pm8350b_firmwarepm8150awcn3950sd845smb1395_firmwareaqt1000_firmwareqdm5650_firmwareqdm5652pmk8003qdm2308_firmwaremdm9626_firmwareqca6174qpm8870_firmwaresa8150p_firmwarepmx24sd720g_firmwarepm6250wcd9385rgr7640au_firmwaresd870pm8150bwgr7640_firmwaresdxr1wcn3680_firmwarepm6150aqfe4308ar8035_firmwareqca6391qln1030_firmwareqca4020_firmwareqdm2308pmm8195au_firmwaresd765gqca6574qca6431qfs2580_firmwareqpm5658qpm8820wtr5975qca6436_firmwarepm8350csdr675_firmwaresmb358s_firmwareqpm5677qpa6560qpm8895pm8998_firmwareqpa2625qfe2520_firmwaresmb2351wtr2955ar8151qcm6125_firmwareqpa4361sd730qca6430qdm4643_firmwareqpa4340_firmwarepm8250_firmwareqpm5657_firmwareqet5100qsm7250_firmwareqcs405qln4650sd660_firmwarewcn3999_firmwaresdr8150_firmwareqpm5579_firmwareqfs2608_firmwareqat3519qcs4290sd205_firmwareqdm5620qpa5460_firmwarepmd9655_firmwarepmc1000hpmm8195aupmd9607_firmwarewtr4905_firmwareqbt1000_firmwaresd8655gqfe4302_firmwareqtc800h_firmwarepmi8952_firmwareqln5020qpa8803sm7250p_firmwaresd855wtr6955_firmwareqat3555_firmwareqpm5870pm8350c_firmwarepm4250sdr8250_firmwarepm855b_firmwareqcm4290qln4650_firmwaresmb1381_firmwarepm670argr7640aupmx24_firmwareqcs6125_firmwareqpa4360sdm830_firmwaresdr051_firmwaresd460_firmwareqpm6325_firmwareqca9379_firmwarewsa8810_firmwareqfe4301qln4640qln4642sa8150ppm6250_firmwareqca6174a_firmwareqpm4621_firmwareqtc410spm855awcn3610_firmwareqtc800hpm8350bh_firmwaresdx55m_firmwareqtm525_firmwareapq8096au_firmwaremdm9206smr526_firmwarequalcomm215qsw8574_firmwaresm4125_firmwareqpm4640_firmwaresdm429w_firmwaresdw2500wcn3680bmsm8953pm8953_firmwarepmm8155au_firmwareqpa8842_firmwarewcn6851ar8031qdm2301smb1396sd439qat5568sd455qat3516_firmwarewcd9341qpm5541_firmwareqpm5657pmr735b_firmwarepm456_firmwareqsm7250pmk8350ar8035pm439_firmwarepm8150l_firmwarewcn3680qat3522qpm2630sdm429wqfe4320wcn3660b_firmwarewcn3988_firmwareqpa8675_firmwaresd429sd720gsd768g_firmwaresdx55_firmwareqpm4630_firmwarewcd9375qca6564qdm5650qpa4360_firmwarepmw3100sm4125wcn6856pm8998sd450_firmwaresd765g_firmwarepmm8996au_firmwarepm670_firmwareqcs4290_firmwareqpa8673aqt1000qsm8250pm8953sd665_firmwareqdm3301_firmwarewcd9370qpm8870qdm5652_firmwarepm640lwcn3988pmx50qfe4305smr545sd675qfe2520qat5533msm8953_firmwarepm855lsa515mqca6574_firmwareqat3555pmm8155ausa8155sm6250p_firmwareqfe4303qpa5461_firmwarepm8250qdm4643qfe4308_firmwareqca6320_firmwareqfe4320_firmwareqpm5641_firmwaresd670_firmwaresd662sd480wcd9330_firmwarewcd9371sd855_firmwarepm7150l_firmwarepm8350bhqcc1110sd768gqfe4309_firmwareqsm8250_firmwaresmb1398sd480_firmwareqln1020pm6150l_firmwarepm8150csd660smb1380ar8031_firmwaresdr8250sdx50m_firmwaresd205pme605_firmwareqdm4650qtc800tpmx55csra6640_firmwareqfe2550_firmwaresd845_firmwaresdx20mqpa8842wsa8830_firmwareqpa4340qcs6125qln5020_firmwareqet5100msmb1351_firmwareqet4100pm660qat5522_firmwareqcs410smb2351_firmwarepm640a_firmwaresd429_firmwareqpm6585qpm5875_firmwareqca6174_firmwarewcn3998pm855bmdm9607_firmwaresmb1355_firmwareqpm5641sm6250_firmwaresmb1358wcn6850pmd9607sa8155p_firmwareqdm5671wtr2965mdm9626pm640pwtr3925_firmwaresmb1360pm670lpmr525qpa5373_firmwarewcn3910_firmwaresd670qpa8673_firmwareqdm3301qln1020_firmwareqca6426qln4642_firmwarepm3003aapq8017mdm9650_firmwareqpm6582wcn3910apq8096ausd870_firmwareqca6574a_firmwareqat5515sd450pm660lqualcomm215_firmwarewcd9326qet5100m_firmwaresdx55mpm6150lpmi8998qfe4305_firmwaresd730_firmwareqpm5679sdr051sdr052wcn3980_firmwaresdr735_firmwarepm8009mdm9607qca8337pmx20qcs610_firmwareqpm4621qpm5870_firmwareqdm2305qca6574au_firmwareqtc410s_firmwarewsa8835sdx20m_firmwaresa8155_firmwaremsm8909wfsm10056qpm4641_firmwareqpm5541smb1357qtc801sqdm5679_firmwareqat3518qpm5670_firmwaresdr660_firmwarepm8150_firmwarepmd9655qpm5875qfe2101sd8885gsmb1390qfe4302wcn3980qdm5621_firmwaresa6155_firmwarepm7250bpm660a_firmwaresdx55qcs405_firmwareqet6110_firmwareqca6574ausdm630_firmwaresa6145p_firmwareqtc801s_firmwarepm6125_firmwareqat3514_firmwarepm660_firmwaresmb1351smb1390_firmwarecsra6620smb1354smr545_firmwarewcn3990sa6155p_firmwareqln5030_firmwareqca6431_firmwaresd675_firmwareqca6564au_firmwareqca6320pm640aqpa8802_firmwarepm8005_firmwarepmi8998_firmwareqsw8573_firmwaremdm9628_firmwareqpm4650qpm6582_firmwaresa2150p_firmwaresdr865qcc1110_firmwarepm8008wcn6855qca6564ausd632msm8917sdx20wcn6851_firmwarepm7150afsm10055qdm5677_firmwarepmx55_firmwareqpa5581rsw8577qln5030Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon WearablesMultiple Chipsets
CWE ID-CWE-416
Use After Free
CVE-2021-42706
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.61%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 14:00
Updated-16 Sep, 2024 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AzeoTech DAQFactory

This vulnerability could allow an attacker to disclose information and execute arbitrary code on affected installations of WebAccess/MHI Designer

Action-Not Available
Vendor-Advantech (Advantech Co., Ltd.)
Product-webaccess_hmi_designerHMI Designer
CWE ID-CWE-416
Use After Free
CVE-2021-0587
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.32%
||
7 Day CHG~0.00%
Published-14 Jul, 2021 | 13:46
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185259758

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-787
Out-of-bounds Write
CVE-2021-0936
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 6.07%
||
7 Day CHG~0.00%
Published-25 Oct, 2021 | 13:20
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In acc_read of f_accessory.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173789633References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-0496
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.78%
||
7 Day CHG-0.00%
Published-11 Jun, 2021 | 16:42
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In memory management driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183467912

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2020-0634
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.50% / 65.85%
||
7 Day CHG~0.00%
Published-14 Jan, 2020 | 23:11
Updated-04 Aug, 2024 | 06:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008WindowsWindows 10 Version 1909 for x64-based SystemsWindows 10 Version 1903 for x64-based SystemsWindows ServerWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows Server, version 1909 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows Server, version 1903 (Server Core installation)Windows 10 Version 1909 for 32-bit Systems
CWE ID-CWE-416
Use After Free
CVE-2023-33094
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.08% / 23.25%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 05:38
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use After Free in Linux Graphics

Memory corruption while running VK synchronization with KASAN enabled.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwareqcs410_firmwaresa6150p_firmwaresd660_firmwaresd865_5gsw5100pwsa8845_firmwareqca6595qcs610_firmwarewcd9335sxr2130_firmwarewcd9370qca8081_firmwarear8035_firmwareqca6696qrb5165msnapdragon_888_5g_mobile_platformwcd9341_firmwaresnapdragon_w5\+_gen_1_wearable_platform_firmwaresa4150p_firmwarewcd9395_firmwareqcn6024sd888_firmwareqca6426wcn6740_firmwarefastconnect_6700snapdragon_768g_5g_mobile_platform_firmwaresa4150pwsa8815_firmwaresa8195p_firmwareqca8337_firmwareqca8337qca6426_firmwaresnapdragon_680_4g_mobile_platformwcd9395sg8275p_firmwareqcm6490_firmwareqca6574au_firmwaresm7250p_firmwareqam8295pwcd9341qca6574auwcd9390flight_rb5_5g_platformwcn3950wsa8810_firmwaresnapdragon_xr2_5g_platformwsa8845h_firmwarecsra6640snapdragon_x65_5g_modem-rf_system_firmwareqca6797aq_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_765g_5g_mobile_platform_firmwaresnapdragon_xr2\+_gen_1_platform_firmwarewcn3660b_firmwaresnapdragon_780g_5g_mobile_platformfastconnect_6800_firmwaresa8295p_firmwareqcn6024_firmwaresa4155p_firmwaresm7250psnapdragon_695_5g_mobile_platformsnapdragon_4_gen_1_mobile_platform_firmwarevideo_collaboration_vc1_platform_firmwaresa4155psnapdragon_778g\+_5g_mobile_platformsnapdragon_780g_5g_mobile_platform_firmwaresd888qcn9011_firmwaresw5100_firmwaresnapdragon_765_5g_mobile_platform_firmwarewcn6740snapdragon_480\+_5g_mobile_platform_firmwaresnapdragon_695_5g_mobile_platform_firmwarefastconnect_6800qca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900snapdragon_685_4g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platformvideo_collaboration_vc1_platformsnapdragon_782g_mobile_platform_firmwarewcd9385_firmwaresnapdragon_x55_5g_modem-rf_systemfastconnect_6900_firmwareqam8255p_firmwarewcd9380sa6145p_firmwareqam8255psnapdragon_888_5g_mobile_platform_firmwaresnapdragon_xr2_5g_platform_firmwaresnapdragon_4_gen_1_mobile_platformsa8150psnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_778g_5g_mobile_platformsnapdragon_685_4g_mobile_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155psnapdragon_auto_5g_modem-rf_firmwaresnapdragon_768g_5g_mobile_platformwsa8810qam8650pvideo_collaboration_vc5_platform_firmwaresnapdragon_865\+_5g_mobile_platformsnapdragon_8\+_gen_2_mobile_platformwcn3950_firmwaresw5100qca6595auvideo_collaboration_vc3_platformsm7315_firmwaresnapdragon_865_5g_mobile_platform_firmwaresa6155p_firmwarewcd9326_firmwarewsa8840qam8295p_firmwareqcs8550_firmwarewcn3990_firmwaresm7315snapdragon_870_5g_mobile_platform_firmwareqca6698aq_firmwareqca6436_firmwarewcd9385qcn9012wcn3615snapdragon_8_gen_2_mobile_platformsnapdragon_7c\+_gen_3_compute_firmwaresa8255pqcs7230_firmwarewcd9390_firmwaresnapdragon_778g\+_5g_mobile_platform_firmwaresnapdragon_865\+_5g_mobile_platform_firmwaresnapdragon_690_5g_mobile_platformsg8275pwcd9370_firmwaresnapdragon_auto_5g_modem-rfsnapdragon_750g_5g_mobile_platform_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3615_firmwaresnapdragon_660_mobile_platformwcn3660bqca6574asxr2130sa8195pcsra6640_firmwareqcs8250_firmwaresnapdragon_xr2\+_gen_1_platformsm7325pqcm6490qam8650p_firmwarevideo_collaboration_vc5_platformsm8550p_firmwareqcm8550wcn3988qcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024wcd9335_firmwarewcn3980_firmwareqrb5165n_firmwareqca6436qca6574snapdragon_480_5g_mobile_platform_firmwarewsa8835qca6595au_firmwareqca6391_firmwarewsa8840_firmwaresnapdragon_870_5g_mobile_platformqcn9011sw5100p_firmwaresnapdragon_782g_mobile_platformqca6696_firmwareqcn9024_firmwaresnapdragon_865_5g_mobile_platformwsa8845hwcd9380_firmwaresa6150pqca6574_firmwarewcd9326qcs410sa8155p_firmwarecsra6620qca8081sd660sa8155psg4150pwsa8815qam8775pqca6797aqwsa8830sm8550psa6145pqcm4325_firmwaresnapdragon_765_5g_mobile_platformsa8255p_firmwareflight_rb5_5g_platform_firmwarear8035qca6574a_firmwaresnapdragon_750g_5g_mobile_platformsnapdragon_480\+_5g_mobile_platformqrb5165m_firmwareqcm4325wcd9375_firmwarerobotics_rb5_platformqca6391qualcomm_215_mobile_platformqcn9012_firmwaresmart_audio_400_platform_firmwareqca6698aqsg4150p_firmwaresnapdragon_480_5g_mobile_platformsnapdragon_778g_5g_mobile_platform_firmwareqrb5165ncsra6620_firmwaresa8295psnapdragon_8_gen_1_mobile_platformrobotics_rb5_platform_firmwareqcs8550snapdragon_8_gen_2_mobile_platform_firmwarefastconnect_6200fastconnect_7800sa8145p_firmwaresm7325p_firmwareqam8775p_firmwaresd865_5g_firmwarewcn3680bsnapdragon_888\+_5g_mobile_platformqualcomm_215_mobile_platform_firmwarewcd9375sa8150p_firmwaresmart_audio_400_platformsnapdragon_w5\+_gen_1_wearable_platformwcn3988_firmwarefastconnect_6700_firmwarevideo_collaboration_vc3_platform_firmwaresa8145pwcn3990snapdragon_888\+_5g_mobile_platform_firmwarewsa8835_firmwaresnapdragon_680_4g_mobile_platform_firmwaresnapdragon_660_mobile_platform_firmwareqcs6490qcs8250wcn3980snapdragon_690_5g_mobile_platform_firmwarefastconnect_6200_firmwarewsa8830_firmwarewcn3680b_firmwareqcs610Snapdragon
CWE ID-CWE-416
Use After Free
CVE-2021-0531
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.19%
||
7 Day CHG-0.00%
Published-21 Jun, 2021 | 16:01
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In memory management driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-185195272

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2025-15570
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 0.50%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 13:02
Updated-27 Feb, 2026 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ckolivas lrzip stream.c lzma_decompress_buf use after free

A vulnerability was found in ckolivas lrzip up to 0.651. This impacts the function lzma_decompress_buf of the file stream.c. Performing a manipulation results in use after free. Attacking locally is a requirement. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Action-Not Available
Vendor-ckolivasckolivas
Product-lrziplrzip
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-416
Use After Free
CVE-2021-39801
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.47%
||
7 Day CHG~0.00%
Published-12 Apr, 2022 | 16:11
Updated-04 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ion_ioctl of ion-ioctl.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209791720References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-667
Improper Locking
CVE-2021-39674
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.78%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 17:40
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In btm_sec_connected and btm_sec_disconnected of btm_sec.cc file , there is a possible use after free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-201083442

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-40449
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-91.30% / 99.65%
||
7 Day CHG-0.06%
Published-13 Oct, 2021 | 00:26
Updated-30 Oct, 2025 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2021-12-01||Apply updates per vendor instructions.
Win32k Elevation of Privilege Vulnerability

Win32k Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_7windows_11_21h2windows_server_2012windows_11windows_server_2022windows_rt_8.1windows_8.1windows_10_2004windows_server_20h2windows_10_1507windows_10_1909windows_server_2008windows_10_21h1windows_server_2004windows_10_1607windows_10_1809windows_server_2019windows_10_20h2windows_server_2016Windows 11 version 21H2Windows 10 Version 2004Windows Server 2016 (Server Core installation)Windows Server 2012Windows 8.1Windows Server 2008 Service Pack 2Windows Server 2019 (Server Core installation)Windows 7Windows 10 Version 21H1Windows Server 2008 Service Pack 2 (Server Core installation)Windows 10 Version 1909Windows Server 2012 (Server Core installation)Windows Server 2022Windows Server 2019Windows 10 Version 1507Windows 10 Version 1607Windows Server 2008 Service Pack 2Windows 7 Service Pack 1Windows Server 2012 R2Windows 10 Version 1809Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 10 Version 20H2Windows Server 2008 R2 Service Pack 1Windows Server 2016Windows Server version 20H2Windows Server version 2004Windows
CWE ID-CWE-416
Use After Free
CVE-2021-39681
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.19%
||
7 Day CHG~0.00%
Published-14 Jan, 2022 | 19:11
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In delete_protocol of main.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-200251074References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-39714
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.01%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:03
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ion_buffer_kmap_get of ion.c, there is a possible use-after-free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205573273References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2021-39620
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.78%
||
7 Day CHG~0.00%
Published-14 Jan, 2022 | 19:10
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ipcSetDataReference of Parcel.cpp, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-203847542

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-39776
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.19%
||
7 Day CHG~0.00%
Published-30 Mar, 2022 | 16:02
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NFC, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-192614125

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-39698
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.48%
||
7 Day CHG~0.00%
Published-16 Mar, 2022 | 14:04
Updated-04 Aug, 2024 | 02:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
CVE-2021-39812
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.78%
||
7 Day CHG~0.00%
Published-12 Apr, 2022 | 16:11
Updated-04 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TBD of TBD, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205522359References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-416
Use After Free
  • Previous
  • 1
  • 2
  • ...
  • 54
  • 55
  • 56
  • ...
  • 63
  • 64
  • Next
Details not found