331 known vulnerabilities · sorted by CVSS score
Memory corruption in Modem while processing security related configuration before AS Security Exchange.
Memory corruption while handling payloads from remote ESL.
Memory corruption while selecting the PLMN from SOR failed list.
Memory corruption when the UE receives an RTP packet from the network, during the reassembly of NALUs.
Memory Corruption in Multi-mode Call Processor while processing bit mask API.
Memory corruption in Core while processing control functions.
Memory corruption in HLOS while running playready use-case.
Memory corruption in TZ Secure OS while requesting a memory allocation from TA region.
Memory corruption in Core Services while executing the command for removing a single event listener.
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Cryptographic issue occurs due to use of insecure connection method while downloading.
Memory corruption while configuring a Hypervisor based input virtual device.
Improper Access to the VM resource manager can lead to Memory Corruption.
Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.
Memory corruption when preparing a shared memory notification for a memparcel in Resource Manager.
Memory corruption while calculating total metadata size when a very high reserved size is requested by gralloc clients.
Memory corruption while invoking IOCTLs calls from user space for internal mem MAP and internal mem UNMAP.
Memory corruption as GPU registers beyond the last protected range can be accessed through LPAC submissions.