Page 6 of 8042 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

N/A Android before 2024-10-05 on Google Pixel devices allows information disclosure in the modem component, A-299774545. • https://source.android.com/security/bulletin/pixel/2024-10-01 • CWE-276: Incorrect Default Permissions •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

There is a possible Local bypass of user interaction due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/pixel/2024-10-01 • CWE-863: Incorrect Authorization •

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

In lwis_device_event_states_clear_locked of lwis_event.c, there is a possible privilege escalation due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/pixel/2024-10-01 • CWE-415: Double Free •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

According to the researcher: "The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server." • https://support.google.com/product-documentation/answer/14950962?sjid=9489879942601373169-NA • CWE-269: Improper Privilege Management •

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

there is a possible arbitrary read due to an insecure default value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/pixel/2024-09-01 •