Filtered by vendor Google
Subscriptions
Filtered by product Android
Subscriptions
Total
7989 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-21378 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
In Telecomm, there is a possible way to silence the ring for calls of secondary users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21377 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In SELinux Policy, there is a possible restriction bypass due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21376 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In Telephony, there is a possible way to retrieve the ICCID due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21375 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
In Sysproxy, there is a possible out of bounds write due to an integer underflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21374 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
In System UI, there is a possible factory reset protection bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21373 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
In Telephony, there is a possible way for a guest user to change the preferred SIM due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21372 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
In libdexfile, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21371 | 1 Google | 1 Android | 2024-11-21 | 6.7 Medium |
In Secure Element, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21370 | 1 Google | 1 Android | 2024-11-21 | 6.7 Medium |
In the Security Element API, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21369 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In Usage Access, there is a possible way to display a Settings usage access restriction toggle screen due to a permissions bypass. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. | ||||
CVE-2023-21368 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In Audio, there is a possible out of bounds read due to missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21367 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In Scudo, there is a possible way to exploit certain heap OOB read/write issues due to an insecure implementation/design. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21366 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In Scudo, there is a possible way for an attacker to predict heap allocation patterns due to insecure implementation/design. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21365 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In Contacts, there is a possible crash loop due to resource exhaustion. This could lead to local denial of service in the Phone app with User execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21364 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In ContactsProvider, there is a possible crash loop due to resource exhaustion. This could lead to local persistent denial of service in the Phone app with User execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21362 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
In Usage, there is a possible permanent DoS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21361 | 1 Google | 1 Android | 2024-11-21 | 8.8 High |
In Bluetooth, there is a possibility of code-execution due to a use after free. This could lead to paired device escalation of privilege in the privileged Bluetooth process with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21360 | 1 Google | 1 Android | 2024-11-21 | 6.7 Medium |
In Bluetooth, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21359 | 1 Google | 1 Android | 2024-11-21 | 4.4 Medium |
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21358 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
In UWB Google, there is a possible way for a malicious app to masquerade as system app com.android.uwb.resources due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |