Qualcomm Sa6150p Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Qualcomm Sa6150p Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in Qualcomm Sa6150p Firmware. Sa6150p Firmware did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 2 | 7.25 |
| 2023 | 3 | 8.20 |
It may take a day or so for new Sa6150p Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Qualcomm Sa6150p Firmware Security Vulnerabilities
CVE-2024-43047: Memory Corruption in HLOS Memory Map Handling
CVE-2024-43047
7.8 - High
- October 07, 2024
Memory corruption while maintaining memory maps of HLOS memory.
Dangling pointer
Memory Corruption in Linux Kernel Sound Model Registration
CVE-2023-43525
6.7 - Medium
- May 06, 2024
Memory corruption while copying the sound model data from user to kernel buffer during sound model register.
Classic Buffer Overflow
DSP Services Memory Corruption on Qualcomm Snapdragon HLOS-to-DSP Call
CVE-2023-33063
7.8 - High
- December 05, 2023
Memory corruption in DSP Services during a remote call from HLOS to DSP.
Dangling pointer
Mem Corruption via Large Sync Points in KGSL_GPU_AUX IOCTL
CVE-2023-33106
8.4 - High
- December 05, 2023
Memory corruption while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.
Untrusted pointer offset
CVE-2023-33107: Memory Corruption in Linux Graphics via IOCTL SVM Allocation
CVE-2023-33107
8.4 - High
- December 05, 2023
Memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call.
Integer Overflow or Wraparound
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Qualcomm Sa6150p Firmware or by Qualcomm? Click the Watch button to subscribe.