Filtered by vendor Google
Subscriptions
Total
12097 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-21355 | 1 Google | 1 Android | 2024-09-06 | 7.8 High |
In libaudioclient, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21370 | 1 Google | 1 Android | 2024-09-06 | 6.7 Medium |
In the Security Element API, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21371 | 1 Google | 1 Android | 2024-09-06 | 6.7 Medium |
In Secure Element, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21373 | 1 Google | 1 Android | 2024-09-06 | 7.8 High |
In Telephony, there is a possible way for a guest user to change the preferred SIM due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21375 | 1 Google | 1 Android | 2024-09-06 | 7.8 High |
In Sysproxy, there is a possible out of bounds write due to an integer underflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-42632 | 2 Google, Unisoc | 14 Android, S8000, Sc7731e and 11 more | 2024-09-06 | 5.5 Medium |
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | ||||
CVE-2023-42637 | 2 Google, Unisoc | 14 Android, S8000, Sc7731e and 11 more | 2024-09-06 | 5.5 Medium |
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | ||||
CVE-2023-42636 | 2 Google, Unisoc | 14 Android, S8000, Sc7731e and 11 more | 2024-09-06 | 5.5 Medium |
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | ||||
CVE-2023-42638 | 2 Google, Unisoc | 14 Android, S8000, Sc7731e and 11 more | 2024-09-06 | 5.5 Medium |
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | ||||
CVE-2023-42633 | 2 Google, Unisoc | 14 Android, S8000, Sc7731e and 11 more | 2024-09-06 | 5.5 Medium |
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | ||||
CVE-2023-21377 | 1 Google | 1 Android | 2024-09-06 | 5.5 Medium |
In SELinux Policy, there is a possible restriction bypass due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21378 | 1 Google | 1 Android | 2024-09-06 | 7.8 High |
In Telecomm, there is a possible way to silence the ring for calls of secondary users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21381 | 1 Google | 1 Android | 2024-09-06 | 7.8 High |
In Media Resource Manager, there is a possible local arbitrary code execution due to use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21382 | 1 Google | 1 Android | 2024-09-06 | 5.5 Medium |
In Content Resolver, there is a possible method to access metadata about existing content providers on the device due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21383 | 1 Google | 1 Android | 2024-09-06 | 5.5 Medium |
In Settings, there is a possible way for the user to unintentionally send extra data due to an unclear prompt. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. | ||||
CVE-2023-21387 | 1 Google | 1 Android | 2024-09-06 | 4.4 Medium |
In User Backup Manager, there is a possible way to leak a token to bypass user confirmation for backup due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21388 | 1 Google | 1 Android | 2024-09-06 | 7.8 High |
In Settings, there is a possible restriction bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-21389 | 1 Google | 1 Android | 2024-09-06 | 7.8 High |
In Settings, there is a possible bypass of profile owner restrictions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-7969 | 1 Google | 1 Chrome | 2024-09-06 | 8.8 High |
Type Confusion in V8 in Google Chrome prior to 128.0.6613.113 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | ||||
CVE-2023-21391 | 1 Google | 1 Android | 2024-09-06 | 7.5 High |
In Messaging, there is a possible way to disable the messaging application due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |