Security Vulnerabilities
- CVEs Published In 2022
wfshbr64.sys and wfshbr32.sys specially crafted IOCTL allows arbitrary user to perform local privilege escalation
Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.
Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a local user with elevated privileges to exploit a vulnerability in the lpd daemon to cause a denial of service. IBM X-Force ID: 238641.
The TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality.
The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity.
The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications.
The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone's camera and microphone.
The IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.
The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.