Page 17 of 999 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

Integer overflow vulnerability in landmarkCopyImageToNative of libFacePreProcessingjni.camera.samsung.so prior to SMR Dec-2023 Release 1 allows attacker to trigger heap overflow. Vulnerabilidad de desbordamiento de enteros en LandmarkCopyImageToNative de libFacePreProcessingjni.camera.samsung.so antes de SMR Dec-2023 Release 1 permite al atacante desencadenar un desbordamiento del heap. • https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12 • CWE-190: Integer Overflow or Wraparound •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Improper URL validation from InstantPlay deeplink in Galaxy Store prior to version 4.5.64.4 allows attackers to execute JavaScript API to access data. La validación incorrecta de la URL del enlace profundo de InstantPlay en Galaxy Store antes de la versión 4.5.64.4 permite a los atacantes ejecutar la API de JavaScript para acceder a los datos. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S23 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the implementation of the samsungapps URI scheme. The issue results from a logical error when checking the safety of URIs. • https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Improper URL validation from MCSLaunch deeplink in Galaxy Store prior to version 4.5.64.4 allows attackers to execute JavaScript API to install APK from Galaxy Store. La validación de URL incorrecta del enlace profundo MCSLaunch en Galaxy Store anterior a la versión 4.5.64.4 permite a los atacantes ejecutar la API de JavaScript para instalar APK desde Galaxy Store. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S23 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the InstantPlaysUrlUtil class. The issue results from a logical error when checking the safety of URIs. • https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12 •

CVSS: 6.5EPSS: 0%CPEs: 12EXPL: 0

Improper usage of insecure protocol (i.e. HTTP) in SogouSDK of Chinese Samsung Keyboard prior to versions 5.3.70.1 in Android 11, 5.4.60.49, 5.4.85.5, 5.5.00.58 in Android 12, and 5.6.00.52, 5.6.10.42, 5.7.00.45 in Android 13 allows adjacent attackers to access keystroke data using Man-in-the-Middle attack. Uso inadecuado de un protocolo inseguro (es decir, HTTP) en SogouSDK of Chinese Samsung Keyboard anterior a las versiones 5.3.70.1 en Android 11, 5.4.60.49, 5.4.85.5, 5.5.00.58 en Android 12 y 5.6.00.52, 5.6.10.42, 5.7 .00.45 en Android 13 permite a atacantes adyacentes acceder a datos de pulsaciones de teclas mediante el ataque Man-in-the-Middle. • https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Improper handling of insufficient permissions or privileges vulnerability in Samsung Data Store prior to version 5.2.00.7 allows remote attackers to access location information without permission. El manejo inadecuado de la vulnerabilidad de permisos o privilegios insuficientes en Samsung Data Store anterior a la versión 5.2.00.7 permite a atacantes remotos acceder a información de ubicación sin permiso. • https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12 • CWE-755: Improper Handling of Exceptional Conditions •