| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Product: AndroidVersions: Android kernelAndroid ID: A-209014813References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-207433926References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-206977562References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-202160245References: N/A |
| In sendSipAccountsRemovedNotification of SipAccountRegistry.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-208817618 |
| In the policies of adbd.te, there was a logic error which caused the CTS Listening Ports Test to report invalid results. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-201645790 |
| In target_init of gs101/abl/target/slider/target.c, there is a possible allocation of RWX memory due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-203250788References: N/A |
| In <TBD> of <TBD>, there is a possible bypass of Factory Reset Protection due to <TBD>. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171742549References: N/A |
| In fastboot, there is a possible secure boot bypass due to a configuration error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android SoC Android ID: A-202018701 |
| Product: AndroidVersions: Android kernelAndroid ID: A-192641593References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-201537251References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-199805112References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-199809304References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-126949257References: N/A |
| In showCarrierAppInstallationNotification of EuiccNotificationManager.java, there is a possible way to gain an access to MediaProvider content due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695347 |
| In PackageManager, there is a possible permanent denial of service due to resource exhaustion. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-67862680 |
| In multiple methods of EuiccNotificationManager.java, there is a possible way to install existing packages without user consent due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196855999 |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-204686438 |
| Proofpoint Enterprise Protection before 8.12.0-2108090000 allows security control bypass. |
| Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution. |