26 known vulnerabilities · sorted by CVSS score
Memory corruption in Core Services while executing the command for removing a single event listener.
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Memory corruption while configuring a Hypervisor based input virtual device.
Memory corruption in SPS Application while requesting for public key in sorter TA.
Memory corruption in Audio while processing RT proxy port register driver.
Memory corruption when there is failed unmap operation in GPU.
Memory corruption while processing finish_sign command to pass a rsp buffer.
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.
Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network.
Memory corruption in WLAN HAL while handling command streams through WMI interfaces.
Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling.
Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur.
Memory corruption in WLAN HAL while passing command parameters through WMI interfaces.
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.
Memory corruption in WLAN HAL while handling command through WMI interfaces.
Memory corruption while triggering commands in the PlayReady Trusted application.
Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions.
Memory corruption while processing buffer initialization, when trusted report for certain report types are generated.
Transient DOS while processing TIM IE from beacon frame as there is no check for IE length.