Google

Android

7931 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 12.08.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:42:28

In Settings, there is a possible way to bypass factory reset permissions due to a permissions bypass. This could lead to local escalation of privilege with physical access to the device with no additional execution privileges needed. User interaction...

  • EPSS 0.02%
  • Veröffentlicht 12.08.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:42:28

In Companion, there is a possible way to keep a service running with elevated importance without showing foreground service notification due to improper input validation. This could lead to local escalation of privilege with no additional execution p...

  • EPSS 0.02%
  • Veröffentlicht 12.08.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:42:28

In bluetooth, there is a possible way to enable or disable bluetooth connection without user consent due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not ne...

  • EPSS 0.01%
  • Veröffentlicht 12.08.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:42:28

In RestrictionsManager, there is a possible way to send a broadcast that should be restricted to system apps due to a permissions bypass. This could lead to local escalation of privilege on an enterprise managed device with no additional execution pr...

  • EPSS 0.03%
  • Veröffentlicht 12.08.2022 15:15:09
  • Zuletzt bearbeitet 21.11.2024 06:42:28

In Bluetooth, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions...

  • EPSS 0.15%
  • Veröffentlicht 11.08.2022 15:15:12
  • Zuletzt bearbeitet 21.11.2024 06:42:45

Product: AndroidVersions: Android kernelAndroid ID: A-216363416References: N/A

  • EPSS 0.12%
  • Veröffentlicht 11.08.2022 15:15:12
  • Zuletzt bearbeitet 21.11.2024 06:42:45

Product: AndroidVersions: Android kernelAndroid ID: A-184676385References: N/A

  • EPSS 0.11%
  • Veröffentlicht 11.08.2022 15:15:12
  • Zuletzt bearbeitet 21.11.2024 06:42:45

Product: AndroidVersions: Android kernelAndroid ID: A-210916981References: N/A

  • EPSS 0.12%
  • Veröffentlicht 11.08.2022 15:15:12
  • Zuletzt bearbeitet 21.11.2024 06:42:45

Product: AndroidVersions: Android kernelAndroid ID: A-204782372References: N/A

  • EPSS 0.01%
  • Veröffentlicht 11.08.2022 15:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:41

In trusty_log_seq_start of trusty-log.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: An...