
Qualcomm
Delivering intelligent computing everywhere.



Delivering intelligent computing everywhere.

We believe it’s people who give purpose to our technology. So we’re committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build technology and content solutions that are simple and easy to use, including Australia’s largest and fastest national mobile network. That’s why we strive to serve and know our customers better than anyone else – offering a choice of not just digital connection, but digital content as well. And that’s why we have an international presence spanning 15 countries, including China. In the 21st century, opportunity belongs to connected businesses, governments, communities and individuals. As Australia’s leading telecommunications and information services company, Telstra is proud to be helping our customers improve the ways in which they live and work through connection. Be first to know about Telstra news, advice and offers, as well as updates on our people and partners: tel.st/subscribe
Security & Compliance Standards Overview












No incidents recorded for Qualcomm in 2025.
No incidents recorded for Telstra in 2025.
Qualcomm cyber incidents detection timeline including parent company and subsidiaries
Telstra cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).