Ad

CVE Vulnerability Database

Complete database of CVE vulnerabilities. Track critical security threats, exploits and patches. Updated daily from NVD NIST.

CVE-2025-47386

7.8

Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.

Details

CVE-2025-47385

7.8

Memory Corruption when accessing trusted execution environment without proper privilege check.

Details

CVE-2025-47384

6.5

Transient DOS when MAC configures config id greater than supported maximum value.

Transient
Details

CVE-2025-47383

7.2

Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.

Weak
Details

CVE-2025-47381

7.8

Memory Corruption while processing IOCTL calls when concurrent access to shared buffer occurs.

Details

CVE-2025-47379

7.8

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

Details

CVE-2025-47378

7.1

Cryptographic Issue when a shared VM reference allows HLOS to boot loader and access cert chain.

Cryptographic
Details

CVE-2025-47377

7.8

Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.

Details

CVE-2025-47376

7.8

Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.

Details

CVE-2025-47375

7.8

Memory corruption while handling different IOCTL calls from the user-space simultaneously.

Details
904/3864