10 known vulnerabilities · sorted by CVSS score
Memory corruption in Core Services while executing the command for removing a single event listener.
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Memory corruption when there is failed unmap operation in GPU.
A race condition exists in a driver potentially leading to a use-after-free condition.
Memory corruption while processing finish_sign command to pass a rsp buffer.
Memory corruption in SPS Application while requesting for public key in sorter TA.
Memory corruption in Audio while processing RT proxy port register driver.
Memory corruption when user provides data for FM HCI command control operations.
Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur.
Transient DOS while processing received beacon frame.