Page 34 of 1217 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

A Denial of Service vulnerability exists in Google Android 4.4.4, 5.0.2, and 5.1.1, which allows malicious users to block Bluetooh access (Android Bug ID A-28672558). Existe una vulnerabilidad de denegación de servicio en Google Android versiones 4.4.4, 5.0.2 y 5.1.1, lo que permite a usuarios maliciosos bloquear el acceso a Bluetooh (ID de Bug de Android A-28672558). • http://www.securityfocus.com/bid/94167 https://github.com/Genymobile/f2ut_platform_frameworks_base/commit/f24cec326f5f65c693544fb0b92c37f633bacda2 https://source.android.com/security/bulletin/2016-11-01.html https://vuldb.com/?id.93449 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

In the Titan M handling of cryptographic operations, there is a possible information disclosure due to an unusual root cause. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10 Android ID: A-133258003 En el manejo de operaciones criptográficas de Titan M, hay una posible divulgación de información debido a una causa raíz inusual. Esto podría conllevar a una divulgación de información local sin ser necesarios privilegios de ejecución adicionales. • https://github.com/alexbakker/CVE-2019-9465 https://github.com/MichaelsPlayground/CVE-2019-9465 https://source.android.com/security/bulletin/pixel/2019-12-01 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

In export_key_der of export_key.cpp, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10 Android ID: A-139683471 En la función export_key_der del archivo export_key.cpp, es posible una corrupción de la memoria debido a una doble liberación. Esto podría conllevar a una escalada local de privilegios sin ser necesarios privilegios de ejecución adicionales. • https://source.android.com/security/bulletin/pixel/2019-12-01 • CWE-415: Double Free CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 2

The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called. Other authenticated users can read it in the log later. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications. La contraseña de usuario por medio del formulario de registro de TronLink Wallet versión 2.2.0 es almacenada en el registro cuando se llama a la clase CreateWalletTwoActivity. • https://pastebin.com/a5VhaxYn https://pastebin.com/raw/rVGbwSw0 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

Android 1.0 through 9.0 has Insecure Permissions. The Android bug ID is 77286983. Android, desde la versión 1.0 hasta la 9.0, tiene permisos inseguros. El ID de error de Android es 77286983. Android OS version 5.0 suffers from a sensitive data exposure vulnerability in its battery information broadcasts. • http://packetstormsecurity.com/files/150284/Android-5.0-Battery-Information-Broadcast-Information-Disclosure.html http://seclists.org/fulldisclosure/2018/Nov/35 https://wwws.nightwatchcybersecurity.com/2018/11/11/cve-2018-15835 • CWE-732: Incorrect Permission Assignment for Critical Resource •