Page 3 of 8322 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2025 — In validateSsid of WifiConfigurationUtil.java, there is a possible way to overflow a system configuration file due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. • https://android.googlesource.com/platform/packages/modules/Wifi/+/debc548ac085ba1ab0582172b97d965e9a1ea43a • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 1

28 Jan 2025 — In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. • https://github.com/Aakashmom/G3_libcore_native_CVE-2024-40673 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.4EPSS: 0%CPEs: 4EXPL: 0

28 Jan 2025 — In onCreate of ChooserActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://android.googlesource.com/platform/packages/modules/IntentResolver/+/ccd29124d0d2276a3071c0418c14dec188cd3727 • CWE-281: Improper Preservation of Permissions •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2025 — In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2024-10-01 • CWE-416: Use After Free •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2025 — In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2024-10-01 • CWE-416: Use After Free •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2025 — In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2024-10-01 • CWE-416: Use After Free •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2025 — In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/pixel/2018-06-01 • CWE-908: Use of Uninitialized Resource •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2025 — In TdlsexRxFrameHandle of the MTK WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2018-06-01 • CWE-787: Out-of-bounds Write •

CVSS: 5.7EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2025 — In HeifDataSource::readAt of HeifDecoderImpl.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. • https://source.android.com/security/bulletin/pixel/2018-05-01 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound •

CVSS: 5.7EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2025 — In HeifDecoderImpl::getScanline of HeifDecoderImpl.cpp, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. • https://source.android.com/security/bulletin/pixel/2018-05-01 • CWE-125: Out-of-bounds Read •