Google

Android

7895 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:14

In uploadFile of FileUploadServiceImpl.java, there is a possible incorrect file access due to a confused deputy. This could lead to local information disclosure of private files with no additional execution privileges needed. User interaction is not ...

  • EPSS 0.01%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:14

In nfa_dm_check_set_config of nfa_dm_main.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for e...

  • EPSS 0.02%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:14

In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersion...

  • EPSS 0.12%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

Product: AndroidVersions: Android kernelAndroid ID: A-211685939References: N/A

  • EPSS 0.12%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

Product: AndroidVersions: Android kernelAndroid ID: A-210712565References: N/A

  • EPSS 0.02%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

In the TitanM chip, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersi...

  • EPSS 0.05%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitat...

  • EPSS 0.02%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersi...

  • EPSS 0.01%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

In ipu_core_jqs_msg_transport_kernel_write_sync of ipu-core-jqs-msg-transport.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interac...

  • EPSS 0.01%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

In unflatten of GraphicBuffer.cpp, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for expl...