| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. |
| The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. |
| The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. |
| Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability. |
| The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. |
| The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. |
| The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. |