CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality. |
Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability can cause the Bluetooth function to be unavailable. |
Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality. |
Vulnerability of data verification errors in the kernel module. Successful exploitation of this vulnerability may cause WLAN interruption. |
Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality. |
Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality. |
Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality. |
Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash. |
Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart. |
Vulnerability of package names' public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality. |
Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically. |
Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically. |
Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background. |
Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability. |
Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality. |
Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability. |
Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable. |
Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality. |
Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window. |
Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified. |