Filtered by vendor Qualcomm
Subscribe
Total
2290 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-33285 | 1 Qualcomm | 556 Apq8009, Apq8009 Firmware, Apq8017 and 553 more | 2025-04-09 | N/A | 7.5 HIGH |
Transient DOS due to buffer over-read in WLAN while parsing WLAN CSA action frames. | |||||
CVE-2022-33284 | 1 Qualcomm | 352 Aqt1000, Aqt1000 Firmware, Ar8035 and 349 more | 2025-04-09 | N/A | 8.2 HIGH |
Information disclosure due to buffer over-read in WLAN while parsing BTM action frame. | |||||
CVE-2022-33283 | 1 Qualcomm | 268 Ar8035, Ar8035 Firmware, Ar9380 and 265 more | 2025-04-09 | N/A | 8.2 HIGH |
Information disclosure due to buffer over-read in WLAN while WLAN frame parsing due to missing frame length check. | |||||
CVE-2022-33265 | 1 Qualcomm | 6 Qca7500, Qca7500 Firmware, Qca7520 and 3 more | 2025-04-09 | N/A | 7.3 HIGH |
Memory corruption due to information exposure in Powerline Communication Firmware while sending different MMEs from a single, unassociated device. | |||||
CVE-2022-33255 | 1 Qualcomm | 184 Apq8009, Apq8009 Firmware, Ar8031 and 181 more | 2025-04-09 | N/A | 8.2 HIGH |
Information disclosure due to buffer over-read in Bluetooth HOST while processing GetFolderItems and GetItemAttribute Cmds from peer device. | |||||
CVE-2007-3166 | 1 Qualcomm | 1 Eudora | 2025-04-09 | 6.8 MEDIUM | N/A |
Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command. | |||||
CVE-2006-6024 | 1 Qualcomm | 1 Eudora Worldmail | 2025-04-09 | 7.5 HIGH | 9.8 CRITICAL |
Multiple buffer overflows in Eudora Worldmail, possibly Worldmail 3 version 6.1.22.0, have unknown impact and attack vectors, as demonstrated by the (1) "Eudora WorldMail stack overflow" and (2) "Eudora WorldMail heap overflow" modules in VulnDisco Pack. NOTE: Some of these details are obtained from third party information. As of 20061118, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | |||||
CVE-2007-2770 | 1 Qualcomm | 1 Eudora | 2025-04-09 | 9.3 HIGH | N/A |
Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply. NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue. | |||||
CVE-2006-6025 | 1 Qualcomm | 1 Eudora Worldmail | 2025-04-09 | 5.0 MEDIUM | 7.5 HIGH |
QUALCOMM Eudora WorldMail 4.0 allows remote attackers to cause a denial of service, as demonstrated by a certain module in VulnDisco Pack. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. As of 20061118, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | |||||
CVE-2005-4267 | 1 Qualcomm | 1 Worldmail | 2025-04-03 | 7.5 HIGH | N/A |
Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a "}" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands. | |||||
CVE-2002-0833 | 1 Qualcomm | 1 Eudora | 2025-04-03 | 7.5 HIGH | N/A |
Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string. | |||||
CVE-2001-1487 | 1 Qualcomm | 1 Qpopper | 2025-04-03 | 4.6 MEDIUM | N/A |
popauth utility in Qualcomm Qpopper 4.0 and earlier allows local users to overwrite arbitrary files and execute commands as the pop user via a symlink attack on the -trace file option. | |||||
CVE-2004-2301 | 1 Qualcomm | 1 Eudora | 2025-04-03 | 5.0 MEDIUM | N/A |
Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long "To:" field, possibly due to a buffer overflow. | |||||
CVE-2001-1068 | 1 Qualcomm | 1 Qpopper | 2025-04-03 | 5.0 MEDIUM | N/A |
qpopper 4.01 with PAM based authentication on Red Hat systems generates different error messages when an invalid username is provided instead of a valid name, which allows remote attackers to determine valid usernames on the system. | |||||
CVE-2000-1198 | 1 Qualcomm | 1 Qpopper | 2025-04-03 | 2.1 LOW | 5.5 MEDIUM |
qpopper POP server creates lock files with predictable names, which allows local users to cause a denial of service for other users (lack of mail access) by creating lock files for other mail boxes. | |||||
CVE-2001-1046 | 1 Qualcomm | 1 Qpopper | 2025-04-03 | 10.0 HIGH | N/A |
Buffer overflow in qpopper (aka qpop or popper) 4.0 through 4.0.2 allows remote attackers to gain privileges via a long username. | |||||
CVE-2002-2313 | 1 Qualcomm | 1 Eudora | 2025-04-03 | 8.8 HIGH | N/A |
Eudora email client 5.1.1, with "use Microsoft viewer" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer. | |||||
CVE-2002-0454 | 1 Qualcomm | 1 Qpopper | 2025-04-03 | 5.0 MEDIUM | N/A |
Qpopper (aka in.qpopper or popper) 4.0.3 and earlier allows remote attackers to cause a denial of service (CPU consumption) via a very large string, which causes an infinite loop. | |||||
CVE-1999-0427 | 1 Qualcomm | 3 Eudora, Eudora Light, Eudora Pro | 2025-04-03 | 7.5 HIGH | N/A |
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names. | |||||
CVE-2001-1326 | 1 Qualcomm | 1 Eudora | 2025-04-03 | 7.5 HIGH | N/A |
Eudora 5.1 allows remote attackers to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments. |