|Apache Log4j 2 Vulnerability (CVE-2021-44228)
|December 14, 2021
|The Apache Log4j utility is a commonly used component for logging requests. On December 9, 2021, a vulnerability was reported that could allow a system running Apache Log4j version 2.14.1 or below to be compromised and allow an attacker to execute arbitrary code.
|Linux Kernel Elevated Privilege
|November 17, 2021
|This vulnerability is a use-after-free scenario which could allow code execution and local elevation of privilege to the kernel from an untrusted application.
|May 18, 2021
|A collection of new security vulnerabilities that affect Wi-Fi devices. An adversary that is within range of a victim's Wi-Fi network can abuse these vulnerabilities to steal user information or attack devices.
|August 13, 2020
|Multiple vulnerabilities allow execution of unprivileged code in a privileged DSP.
|March 2, 2020
|A temporary disconnect of the WiFi signal is exploited to force devices into a prolonged disassociated state so WiFi packets can be intercepted.
|Use-After-Free in Binder Driver Vulnerability
|October 4, 2019
|Privilege-escalation vulnerability that can use a compromised application to exploit a device.
|Microarchitecture Data Sampling Vulnerabilities
|May 28, 2019
|A collection of vulnerabilities focusing on maliciously accessing storage buffers used to temporarily hold data.
|Chrome Browser FileReader Vulnerability
|February 27, 2019
|Exploits the memory management within the Chrome FileReader using Flash, to execute malicious code.
|November 14, 2018
|Affects Bluetooth® low energy (BLE) chips made by Texas Instruments via either a memory corruption condition or through Over-The-Air Download functionality.
|Spectre and Meltdown
|January 3, 2018
|Flaw in processors vulnerable to speculative-execution attacks
|Infineon TMP Advisory (Tablets)
|December 1, 2017
|RSA keys generated by Trusted Platform Modules (TPM).
|October 16, 2017
|Security vulnerability that targets a key step in the Wi-Fi authentication protocol to break security encryption
|October 1, 2017
|Attack vector that exploits Bluetooth connections to target and control devices