Total
7899 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-21184 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
In getCurrentPrivilegedPackagesForAllUsers of CarrierPrivilegesTracker.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-267809568 | |||||
CVE-2023-21183 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
In ForegroundUtils of ForegroundUtils.java, there is a possible way to read NFC tag data while the app is still in the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235863754 | |||||
CVE-2023-21182 | 1 Google | 1 Android | 2024-11-21 | N/A | 4.4 MEDIUM |
In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-252764175 | |||||
CVE-2023-21181 | 1 Google | 1 Android | 2024-11-21 | N/A | 4.4 MEDIUM |
In btm_ble_update_inq_result of btm_ble_gap.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-264880969 | |||||
CVE-2023-21180 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.5 HIGH |
In xmlParseTryOrFinish of parser.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261365944 | |||||
CVE-2023-21179 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865 | |||||
CVE-2023-21178 | 1 Google | 1 Android | 2024-11-21 | N/A | 4.1 MEDIUM |
In installKey of KeyUtil.cpp, there is a possible failure of file encryption due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-140762419 | |||||
CVE-2023-21177 | 1 Google | 1 Android | 2024-11-21 | N/A | 5.5 MEDIUM |
In requestAppKeyboardShortcuts of WindowManagerService.java, there is a possible way to infer the app a user is interacting with due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-273906410 | |||||
CVE-2023-21176 | 1 Google | 1 Android | 2024-11-21 | N/A | 4.4 MEDIUM |
In list_key_entries of utils.rs, there is a possible way to disable user credentials due to resource exhaustion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-222287335 | |||||
CVE-2023-21175 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
In onCreate of DataUsageSummary.java, there is a possible method for a guest user to enable or disable mobile data due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262243574 | |||||
CVE-2023-21174 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
In isPageSearchEnabled of BillingCycleSettings.java, there is a possible way for the guest user to change data limits due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235822222 | |||||
CVE-2023-21173 | 1 Google | 1 Android | 2024-11-21 | N/A | 5.5 MEDIUM |
In multiple methods of DataUsageList.java, there is a possible way to learn about admin user's network activities due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262741858 | |||||
CVE-2023-21172 | 1 Google | 1 Android | 2024-11-21 | N/A | 7.8 HIGH |
In multiple functions of WifiCallingSettings.java, there is a possible way to change calling preferences for the admin user due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262243015 | |||||
CVE-2023-21171 | 1 Google | 1 Android | 2024-11-21 | N/A | 6.7 MEDIUM |
In verifyInputEvent of InputDispatcher.cpp, there is a possible way to conduct click fraud due to side channel information disclosure. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261085213 | |||||
CVE-2023-21170 | 1 Google | 1 Android | 2024-11-21 | N/A | 4.4 MEDIUM |
In executeSetClientTarget of ComposerCommandEngine.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-252764410 | |||||
CVE-2023-21169 | 1 Google | 1 Android | 2024-11-21 | N/A | 4.4 MEDIUM |
In inviteInternal of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-274443441 | |||||
CVE-2023-21168 | 1 Google | 1 Android | 2024-11-21 | N/A | 5.5 MEDIUM |
In convertCbYCrY of ColorConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-253270285 | |||||
CVE-2023-21167 | 1 Google | 1 Android | 2024-11-21 | N/A | 5.5 MEDIUM |
In setProfileName of DevicePolicyManagerService.java, there is a possible way to crash the SystemUI menu due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-259942964 | |||||
CVE-2023-21166 | 1 Google | 1 Android | 2024-11-21 | N/A | 9.8 CRITICAL |
In RGXBackingZSBuffer of rgxta3d.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2023-21164 | 1 Google | 1 Android | 2024-11-21 | N/A | 9.8 CRITICAL |
In DevmemIntMapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. |