Switch System Flaws: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| No edit summary | No edit summary | ||
| Line 46: | Line 46: | ||
| |- | |- | ||
| |} | |} | ||
| =='Kernel' software== | == ''Kernel'' software== | ||
| ==='Kernel'=== | ===''Kernel''=== | ||
| {| class="wikitable" border="1" | {| class="wikitable" border="1" | ||
| |- | |- | ||
| Line 59: | Line 59: | ||
| !  Discovered by | !  Discovered by | ||
| |- | |- | ||
| |  No public 'Kernel' exploits   | |  No public ''Kernel'' exploits   | ||
| | | | | ||
| | | | | ||
Revision as of 20:34, 3 March 2017
System Flaws are used to execute unofficial code (homebrew) on the Nintendo Switch (NS). This page is a list of known and public NS System Flaws.
List of NS System Flaws
There are currently no known NS exploits. (That being a Nintendo console wouldn't be delayed...)
Hardware
| Summary | Description | Fixed with hardware model/revision | Newest hardware model/revision this flaw was checked for | Timeframe this was discovered | Discovered by | 
|---|---|---|---|---|---|
| No public hardware exploits | 
ARM TrustZone software
ARM TrustZone
| Summary | Description | Successful exploitation result | Fixed in system version | Last system version this flaw was checked for | Timeframe this was discovered | Public disclosure timeframe | Discovered by | 
|---|---|---|---|---|---|---|---|
| No public ARM TrustZone exploits | 
Kernel software
Kernel
| Summary | Description | Successful exploitation result | Fixed in system version | Last system version this flaw was checked for | Timeframe this was discovered | Public disclosure timeframe | Discovered by | 
|---|---|---|---|---|---|---|---|
| No public Kernel exploits |