Page 37 of 2341 results (0.013 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

06 Oct 2023 — In multiple functions of ActivityManagerService.java, there is a possible way to escape Google Play protection due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. En killBackgroundProcesses de ActivityManagerService.java, existe una forma posible de escapar de la protección de Google Play debido a una omisión de permisos. Esto podría conducir a una escalada local de privilegios sin nece... • https://android.googlesource.com/platform/frameworks/base/+/fa94ce5c7738e449cb6bd68c77af4858018e49e0 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

06 Oct 2023 — In multiple locations, there is a possible way to crash multiple system services due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. En varias ubicaciones, existe una forma posible de bloquear varios servicios del sistema debido al agotamiento de los recursos. Esto podría provocar una denegación de servicio local sin necesidad de privilegios de ejecución adicionales. • https://android.googlesource.com/platform/frameworks/base/+/84df68840b6f2407146e722ebd95a7d8bc6e3529 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

06 Oct 2023 — In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. En validarPassword de WifiConfigurationUtil.java, existe una forma posible de hacer que el dispositivo entre en un bucle de arranque debido a una validación de entrada incorrecta. Esto podría provocar una denegación de servicio ... • https://android.googlesource.com/platform/packages/modules/Wifi/+/044ab0684153c4effb9f4fda47df43ccdc77bda8 •

CVSS: 6.7EPSS: 0%CPEs: 4EXPL: 0

06 Oct 2023 — In visitUris of Notification.java, there is a possible bypass of user profile boundaries due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. En visitUris de Notification.java, existe una posible omisión de los límites del perfil de usuario debido a una falta de verificación de permisos. Esto podría llevar a una escalada local de privilegios con privilegios de ejecución del usuario necesari... • https://android.googlesource.com/platform/frameworks/base/+/20aedba4998373addc2befcc455a118585559fef • CWE-862: Missing Authorization •

CVSS: 7.8EPSS: 0%CPEs: 72EXPL: 0

04 Oct 2023 — Improper access control vulnerability in SecSettings prior to SMR Oct-2023 Release 1 allows attackers to enable Wi-Fi and connect arbitrary Wi-Fi without User Interaction. Una vulnerabilidad de control de acceso inadecuado en SecSettings anterior a SMR Oct-2023 Release 1 permite a los atacantes habilitar Wi-Fi y conectar Wi-Fi arbitrario sin interacción del usuario. • https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10 •

CVSS: 8.5EPSS: 0%CPEs: 72EXPL: 0

04 Oct 2023 — Improper input validation vulnerability in Evaluator prior to SMR Oct-2023 Release 1 allows local attackers to launch privileged activities. Una vulnerabilidad de validación de entrada incorrecta en Evaluator antes de SMR, versión 1 de octubre de 2023, permite a atacantes locales iniciar actividades privilegiadas. • https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10 •

CVSS: 8.5EPSS: 0%CPEs: 74EXPL: 0

04 Oct 2023 — Improper input validation vulnerability in Duo prior to SMR Oct-2023 Release 1 allows local attackers to launch privileged activities. Una vulnerabilidad de validación de entrada incorrecta en Duo antes de SMR Oct-2023 Release 1 permite a atacantes locales iniciar actividades privilegiadas. • https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10 • CWE-20: Improper Input Validation •

CVSS: 6.7EPSS: 0%CPEs: 72EXPL: 0

02 Oct 2023 — In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522. En TVAPI, existe una posible escritura fuera de límites debido a una verificación de límites faltantes. • https://corp.mediatek.com/product-security-bulletin/October-2023 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 46EXPL: 0

02 Oct 2023 — In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637. En wlan firmware, existe una posible afirmación del firmware debido a un manejo inadecuado de la entrada. • https://corp.mediatek.com/product-security-bulletin/October-2023 • CWE-20: Improper Input Validation CWE-617: Reachable Assertion •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

27 Sep 2023 — he vulnerability is to delete arbitrary files in LGInstallService ("com.lge.lginstallservies") app. The app contains the exported "com.lge.lginstallservies.InstallService" service that exposes an AIDL interface. All its "installPackage*" methods are finally calling the "installPackageVerify()" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted. La vulnerabilidad consis... • https://lgsecurity.lge.com/bulletins/mobile#updateDetails • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •