Google

Android

7895 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.29%
  • Veröffentlicht 11.05.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:00:11

An issue was discovered on Samsung mobile devices with O(8.X), P(9.0), and Q(10.0) (Exynos chipsets) software. Attackers can bypass the Secure Bootloader protection mechanism via a heap-based buffer overflow to execute arbitrary code. The Samsung ID ...

  • EPSS 0.16%
  • Veröffentlicht 11.05.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:00:11

An issue was discovered on Samsung mobile devices with Q(10.0) (Exynos980 9630 and Exynos990 9830 chipsets) software. The Bootloader has a heap-based buffer overflow because of the mishandling of specific commands. The Samsung IDs are SVE-2020-16981,...

  • EPSS 0.11%
  • Veröffentlicht 11.05.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:00:11

An issue was discovered on Samsung mobile devices with Q(10.0) software. Attackers can bypass the locked-state protection mechanism and designate a different preferred SIM card. The Samsung ID is SVE-2020-16594 (May 2020).

  • EPSS 0.02%
  • Veröffentlicht 11.05.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:00:12

An issue was discovered on Samsung mobile devices with P(9.0) (Exynos chipsets) software. The S.LSI Wi-Fi drivers have a buffer overflow. The Samsung ID is SVE-2020-16906 (May 2020).

  • EPSS 0.09%
  • Veröffentlicht 11.05.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:00:12

An issue was discovered on Samsung mobile devices with Q(10.0) software. Attackers can bypass Factory Reset Protection (FRP) via SPEN. The Samsung ID is SVE-2020-17019 (May 2020).

  • EPSS 0.06%
  • Veröffentlicht 11.05.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:00:12

An issue was discovered on Samsung mobile devices with O(8.X), P(9.0), and Q(10.0) software. The Quram image codec library allows attackers to overwrite memory and execute arbitrary code via crafted JPEG data that is mishandled during decoding. The S...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 08.05.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:36:02

Some Broadcom chips mishandle Bluetooth random-number generation because a low-entropy Pseudo Random Number Generator (PRNG) is used in situations where a Hardware Random Number Generator (HRNG) should have been used to prevent spoofing. This affects...

Exploit
  • EPSS 9.54%
  • Veröffentlicht 06.05.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:39:39

There is a buffer overwrite vulnerability in the Quram qmg library of Samsung's Android OS versions O(8.x), P(9.0) and Q(10.0). An unauthenticated, unauthorized attacker sending a specially crafted MMS to a vulnerable phone can trigger a heap-based b...

  • EPSS 0.03%
  • Veröffentlicht 17.04.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:40:08

There is a possible disclosure of RAM using a shared crypto key due to improperly used crypto. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: An...

  • EPSS 0.06%
  • Veröffentlicht 17.04.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:52:50

In f2fs_xattr_generic_list of xattr.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Pr...