CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. |
The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. |
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. |
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. |
The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. |
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. |
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. |
Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components. |
Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. |
The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |