Vulnerabilities (CVE)

Filtered by vendor Google Subscribe
Filtered by product Android
Total 7791 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-21372 1 Google 1 Android 2023-11-03 N/A 7.8 HIGH
In libdexfile, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21362 1 Google 1 Android 2023-11-03 N/A 5.5 MEDIUM
In Usage, there is a possible permanent DoS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21345 1 Google 1 Android 2023-11-03 N/A 3.3 LOW
In Game Manager Service, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21347 1 Google 1 Android 2023-11-03 N/A 7.5 HIGH
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21294 1 Google 1 Android 2023-11-03 N/A 5.5 MEDIUM
In Slice, there is a possible disclosure of installed packages due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2021-39810 1 Google 1 Android 2023-11-03 N/A 7.8 HIGH
In NFC, there is a possible way to setup a default contactless payment app without user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21364 1 Google 1 Android 2023-11-02 N/A 5.5 MEDIUM
In ContactsProvider, there is a possible crash loop due to resource exhaustion. This could lead to local persistent denial of service in the Phone app with User execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21365 1 Google 1 Android 2023-11-02 N/A 5.5 MEDIUM
In Contacts, there is a possible crash loop due to resource exhaustion. This could lead to local denial of service in the Phone app with User execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21366 1 Google 1 Android 2023-11-02 N/A 5.5 MEDIUM
In Scudo, there is a possible way for an attacker to predict heap allocation patterns due to insecure implementation/design. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21368 1 Google 1 Android 2023-11-02 N/A 5.5 MEDIUM
In Audio, there is a possible out of bounds read due to missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21367 1 Google 1 Android 2023-11-02 N/A 5.5 MEDIUM
In Scudo, there is a possible way to exploit certain heap OOB read/write issues due to an insecure implementation/design. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21369 1 Google 1 Android 2023-11-02 N/A 5.5 MEDIUM
In Usage Access, there is a possible way to display a Settings usage access restriction toggle screen due to a permissions bypass. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.
CVE-2023-21370 1 Google 1 Android 2023-11-02 N/A 6.7 MEDIUM
In the Security Element API, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21371 1 Google 1 Android 2023-11-02 N/A 6.7 MEDIUM
In Secure Element, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21395 1 Google 1 Android 2023-11-02 N/A 6.5 MEDIUM
In Bluetooth, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-40135 1 Google 1 Android 2023-10-30 N/A 3.3 LOW
In applyCustomDescription of SaveUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-40134 1 Google 1 Android 2023-10-30 N/A 3.3 LOW
In isFullScreen of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-40127 1 Google 1 Android 2023-10-30 N/A 3.3 LOW
In multiple locations, there is a possible way to access screenshots due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-40138 1 Google 1 Android 2023-10-30 N/A 3.3 LOW
In FillUi of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-40137 1 Google 1 Android 2023-10-30 N/A 3.3 LOW
In multiple functions of DialogFillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.