📦 Lemans Au Lgit Firmware

by Qualcomm

🔍 What is Lemans Au Lgit Firmware?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2026-21385

HIGH CVSS 7.8 Mar 2, 2026

This CVE describes a memory corruption vulnerability in alignment-based memory allocation functions. Attackers can exploit this to execute arbitrary code or cause denial of service. The vulnerability ...

CVE-2025-59600

HIGH CVSS 7.8 Mar 2, 2026

This CVE describes a buffer overflow vulnerability in Qualcomm software where user-supplied data is added without proper bounds checking, leading to memory corruption. Attackers could exploit this to ...

CVE-2025-47385

HIGH CVSS 7.8 Mar 2, 2026

This vulnerability allows memory corruption when accessing the trusted execution environment (TEE) without proper privilege checks. Attackers could potentially execute arbitrary code or cause denial o...

CVE-2025-47381

HIGH CVSS 7.8 Mar 2, 2026

This vulnerability allows memory corruption when multiple processes concurrently access shared buffers through IOCTL calls in Qualcomm drivers. Attackers could potentially execute arbitrary code or ca...

CVE-2025-47378

HIGH CVSS 7.1 Mar 2, 2026

This cryptographic vulnerability in Qualcomm chipsets allows the High-Level Operating System (HLOS) to access the boot loader's certificate chain through a shared VM reference. This could enable attac...

CVE-2025-47376

HIGH CVSS 7.8 Mar 2, 2026

This vulnerability allows memory corruption when multiple processes concurrently access a shared buffer during IOCTL calls in Qualcomm components. Attackers could potentially execute arbitrary code or...

CVE-2025-47373

HIGH CVSS 7.8 Mar 2, 2026

This CVE describes a memory corruption vulnerability in Qualcomm Trusted Application (TA) invocation where accessing buffers with invalid length can lead to arbitrary code execution. It affects device...

CVE-2025-47398

HIGH CVSS 7.8 Feb 2, 2026

This CVE describes a use-after-free vulnerability in Qualcomm GPU memory management where improper pointer handling during buffer deallocation can cause memory corruption. Attackers could exploit this...