| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| In broadcastIntentLockedTraced of BroadcastController.java, there is a possible way to launch arbitrary activities from the background on the paired companion phone due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
| Memory corruption while handling different IOCTL calls from the user-space simultaneously. |
| Cryptographic Issue when a shared VM reference allows HLOS to boot loader and access cert chain. |
| Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE. |
| Memory corruption while using alignments for memory allocation. |
| Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls. |
| Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls. |
| Memory Corruption when processing invalid user address with nonstandard buffer address. |
| Memory Corruption when adding user-supplied data without checking available buffer space. |
| Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources. |
| Memory Corruption while processing IOCTL calls when concurrent access to shared buffer occurs. |
| Memory Corruption when accessing trusted execution environment without proper privilege check. |
| Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs. |
| A remote authentication bypass vulnerability
exists in HPE AutoPass License Server (APLS). |
| In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465314; Issue ID: MSV-4956. |
| In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5539. |
| In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5538. |
| In display, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5537. |
| In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5536. |
| In wlan AP FW, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00467553; Issue ID: MSV-5151. |