Vulnerabilities (CVE)

Filtered by vendor Google Subscribe
Filtered by product Android
Total 7899 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-21392 1 Google 1 Android 2024-11-21 N/A 8.8 HIGH
In Bluetooth, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege when connecting to a Bluetooth device with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21391 1 Google 1 Android 2024-11-21 N/A 7.5 HIGH
In Messaging, there is a possible way to disable the messaging application due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21390 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In Sim, there is a possible way to evade mobile preference restrictions due to a permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21389 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In Settings, there is a possible bypass of profile owner restrictions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21388 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In Settings, there is a possible restriction bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21387 1 Google 1 Android 2024-11-21 N/A 4.4 MEDIUM
In User Backup Manager, there is a possible way to leak a token to bypass user confirmation for backup due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21385 1 Google 1 Android 2024-11-21 N/A 5.5 MEDIUM
In Whitechapel, there is a possible out of bounds read due to memory corruption. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21384 1 Google 1 Android 2024-11-21 N/A 5.5 MEDIUM
In Package Manager, there is a possible possible permissions bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21383 1 Google 1 Android 2024-11-21 N/A 5.5 MEDIUM
In Settings, there is a possible way for the user to unintentionally send extra data due to an unclear prompt. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.
CVE-2023-21382 1 Google 1 Android 2024-11-21 N/A 5.5 MEDIUM
In Content Resolver, there is a possible method to access metadata about existing content providers on the device due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21381 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In Media Resource Manager, there is a possible local arbitrary code execution due to use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21380 1 Google 1 Android 2024-11-21 N/A 6.7 MEDIUM
In Bluetooth, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21379 1 Google 1 Android 2024-11-21 N/A 4.4 MEDIUM
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21378 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In Telecomm, there is a possible way to silence the ring for calls of secondary users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21377 1 Google 1 Android 2024-11-21 N/A 5.5 MEDIUM
In SELinux Policy, there is a possible restriction bypass due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21376 1 Google 1 Android 2024-11-21 N/A 5.5 MEDIUM
In Telephony, there is a possible way to retrieve the ICCID due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21375 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In Sysproxy, there is a possible out of bounds write due to an integer underflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21374 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In System UI, there is a possible factory reset protection bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21373 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In Telephony, there is a possible way for a guest user to change the preferred SIM due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21372 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In libdexfile, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.