Page 21 of 1820 results (0.006 seconds)

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

Exposure of Sensitive Information from an Unauthorized Actor vulnerability in Samsung DisplayManagerService prior to Android T(13) allows local attacker to access connected DLNA device information. La exposición de información confidencial de una vulnerabilidad de actor no autorizado en Samsung DisplayManagerService anterior a Android T(13) permite a un atacante local acceder a la información del dispositivo DLNA conectado. • https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=12 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-863: Incorrect Authorization •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

Improper handling of insufficient permissions vulnerability in setSecureFolderPolicy in PersonaManagerService prior to Android T(13) allows local attackers to set some setting value in Secure folder. Vulnerabilidad de manejo inadecuado de permisos insuficientes en setSecureFolderPolicy en PersonaManagerService anterior a Android T(13) permite a atacantes locales establecer algún valor de configuración en la carpeta segura. • https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=12 • CWE-280: Improper Handling of Insufficient Permissions or Privileges CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

When the device is in factory state, it can be access the shell without adb authentication process. The LG ID is LVE-SMP-210010. Cuando el dispositivo está en estado de fábrica, puede accederse al shell sin el proceso de autenticación adb. El ID de LG es LVE-SMP-210010 • https://lgsecurity.lge.com/bulletins/mobile • CWE-287: Improper Authentication CWE-305: Authentication Bypass by Primary Weakness •

CVSS: 6.6EPSS: 0%CPEs: 1EXPL: 0

Attacker can reset the device with AT Command in the process of rebooting the device. The LG ID is LVE-SMP-210011. El atacante puede reiniciar el dispositivo con el comando AT en el proceso de reinicio del dispositivo. El ID de LG es LVE-SMP-210011 • https://lgsecurity.lge.com/bulletins/mobile • CWE-684: Incorrect Provision of Specified Functionality •

CVSS: 6.2EPSS: 0%CPEs: 3EXPL: 0

cordova-plugin-fingerprint-aio is a plugin provides a single and simple interface for accessing fingerprint APIs on both Android 6+ and iOS. In versions prior to 5.0.1 The exported activity `de.niklasmerz.cordova.biometric.BiometricActivity` can cause the app to crash. This vulnerability occurred because the activity didn't handle the case where it is requested with invalid or empty data which results in a crash. Any third party app can constantly call this activity with no permission. A 3rd party app/attacker using event listener can continually stop the app from working and make the victim unable to open it. • https://github.com/NiklasMerz/cordova-plugin-fingerprint-aio/commit/27434a240f97f69fd930088654590c8ba43569df https://github.com/NiklasMerz/cordova-plugin-fingerprint-aio/releases/tag/v5.0.1 https://github.com/NiklasMerz/cordova-plugin-fingerprint-aio/security/advisories/GHSA-7vfx-hfvm-rhr8 • CWE-617: Reachable Assertion •