Page 12 of 1043 results (0.002 seconds)

CVSS: 8.8EPSS: 0%CPEs: 8EXPL: 1

24 Dec 2020 — On some Samsung phones and tablets running Android through 7.1.1, it is possible for an attacker-controlled Bluetooth Low Energy (BLE) device to pair silently with a vulnerable target device, without any user interaction, when the target device's Bluetooth is on, and it is running an app that offers a connectable BLE advertisement. An example of such an app could be a Bluetooth-based contact tracing app, such as Australia's COVIDSafe app, Singapore's TraceTogether app, or France's TousAntiCovid (formerly St... • https://github.com/alwentiu/contact-tracing-research/blob/main/samsung.pdf •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

09 Dec 2020 — If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This i... • https://bugzilla.mozilla.org/show_bug.cgi?id=1658865 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

31 Aug 2020 — An issue was discovered on LG mobile devices with Android OS 4.4, 5.0, 5.1, 6.0, 7.0, 7.1, 8.0, 8.1, 9.0, and 10 software. Certain automated testing is mishandled. The LG ID is LVE-SMP-200019 (August 2020). Se detectó un problema en los dispositivos móviles LG con software de Sistema Operativo Android versiones 4.4, 5.0, 5.1, 6.0, 7.0, 7.1, 8.0, 8.1, 9.0 y 10. Determinadas pruebas automatizadas se manejan inapropiadamente. • https://lgsecurity.lge.com •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

31 Aug 2020 — An issue was discovered on LG mobile devices with Android OS 4.4, 5.0, 5.1, 6.0, 7.0, 7.1, 8.0, 8.1, 9.0, and 10 software. Key logging may occur because of an obsolete API. The LG ID is LVE-SMP-170010 (August 2020). Se detectó un problema en los dispositivos móviles LG con software de Sistema Operativo Android versiones 4.4, 5.0, 5.1, 6.0, 7.0, 7.1, 8.0, 8.1, 9.0 y 10. El registro de claves puede ocurrir debido a una API obsoleta. • https://lgsecurity.lge.com • CWE-203: Observable Discrepancy •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

04 Jun 2020 — An issue was discovered on LG mobile devices with Android OS software before 2020-06-01. Local users can cause a denial of service because checking of the userdata partition is mishandled. The LG ID is LVE-SMP-200014 (June 2020). Se detectó un problema en los dispositivos móviles LG con software de Sistema Operativo Android antes del 01-06-2020. Los usuarios locales pueden causar una denegación de servicio porque la comprobación de la partición de los datos de usuario se maneja inapropiadamente. • https://lgsecurity.lge.com •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

10 Apr 2020 — An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-06-16. In some cases, HTTP is used for an Inputmethod, rather than HTTPS. A man-in-the-middle attacker can modify the client-server data stream to insert directory traversal sequences into an extracted file path. The Samsung ID is SVE-2015-4363 (November 2015). Se detectó un problema en dispositivos móviles Samsung con versiones de software KK(4.4) y posteriores hasta el 16-06-2015. • https://security.samsungmobile.com/securityUpdate.smsb • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

10 Apr 2020 — An issue was discovered on Samsung mobile devices with JBP(4.3) and KK(4.4.2) software. Because the READ_LOGS permission is mishandled, sensitive information is disclosed in a world-readable copy of the log file if the error message is "Unhandled exception in Dalvik VM," "Application not responding ANR event," or "Crash on an application's native code." The Samsung ID is SVE-2015-2885 (October 2015). Se detectó un problema en dispositivos móviles Samsung con versiones de software JBP(4.3) y KK(4.4.2). Debid... • https://security.samsungmobile.com/securityUpdate.smsb • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

10 Apr 2020 — An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-05-13. There is a buffer overflow in datablock_write because the amount of received data is not validated. The Samsung ID is SVE-2015-4018 (December 2015). Se detectó un problema en dispositivos móviles Samsung con versiones de software KK(4.4) y posteriores hasta 13-05-2015. Se presenta un desbordamiento del búfer en datablock_write porque la cantidad de datos recibidos no es validada. • https://security.samsungmobile.com/securityUpdate.smsb • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.1EPSS: 0%CPEs: 17EXPL: 0

07 Apr 2020 — An issue was discovered on Samsung mobile devices with KK(4.4.x), L(5.x), M(6.x), and N(7.x) software. Arbitrary file read/write operations can occur in the locked state via a crafted MTP command. The Samsung ID is SVE-2017-10086 (November 2017). Se detectó un problema en dispositivos móviles Samsung con versiones de software KK(4.4.x), L(5.x), M(6.x) y N(7.x). Las operaciones de lectura y escritura de archivos arbitrarios pueden ocurrir en el estado bloqueado por medio de un comando MTP diseñado. • https://security.samsungmobile.com/securityUpdate.smsb • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 8EXPL: 0

07 Apr 2020 — An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), M(6.0), and N(7.x) software. The Email application allows attackers to send emails on behalf of any user via a broadcasted intent. The Samsung ID is SVE-2017-9357 (September 2017). Se detectó un problema en dispositivos móviles Samsung con versiones de software KK(4.4), L(5.0/5.1), M(6.0) y N(7.x). La aplicación Email permite a atacantes enviar correos electrónicos en nombre de cualquier usuario por medio de un intent transmitido. • https://security.samsungmobile.com/securityUpdate.smsb •