Google

Android

7776 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 16.02.2024 02:15:50
  • Last modified 28.03.2025 20:15:19

In startInstall of UpdateFetcher.java, there is a possible way to trigger a malicious config update due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed ...

  • EPSS 0.09%
  • Published 16.02.2024 02:15:50
  • Last modified 14.03.2025 18:15:27

In multiple files, there is a possible way to capture the device screen when disallowed by device policy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interacti...

  • EPSS 1.51%
  • Published 16.02.2024 02:15:50
  • Last modified 16.12.2024 19:29:58

In btif_to_bta_response of btif_gatt_util.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for ...

  • EPSS 1.37%
  • Published 16.02.2024 02:15:50
  • Last modified 16.12.2024 19:30:26

In attp_build_read_by_type_value_cmd of att_protocol.cc , there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not neede...

  • EPSS 0.02%
  • Published 16.02.2024 02:15:50
  • Last modified 26.08.2025 23:15:31

In multiple locations, there is a possible way to request access to directories that should be hidden due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed...

  • EPSS 0.06%
  • Published 16.02.2024 02:15:50
  • Last modified 16.12.2024 19:08:08

In multiple functions of ashmem-dev.cpp, there is a possible missing seal due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

  • EPSS 0%
  • Published 16.02.2024 02:15:50
  • Last modified 19.03.2025 18:15:19

In BackgroundLaunchProcessController, there is a possible way to launch arbitrary activity from the background due to BAL Bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not...

  • EPSS 0.03%
  • Published 16.02.2024 02:15:50
  • Last modified 16.12.2024 15:59:54

In onNullBinding of TileLifecycleManager.java, there is a possible way to launch an activity from the background due to a missing null check. This could lead to local escalation of privilege with no additional execution privileges needed. User intera...

  • EPSS 0.05%
  • Published 16.02.2024 02:15:49
  • Last modified 03.12.2024 19:15:07

In multiple files, there is a possible way that trimmed content could be included in PDF output due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not ...

  • EPSS 0.22%
  • Published 15.02.2024 23:15:08
  • Last modified 16.12.2024 19:33:26

In ca-certificates, there is a possible way to read encrypted TLS data due to untrusted cryptographic certificates. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for ex...