Vulnerabilities (CVE)

Filtered by vendor Google Subscribe
Total 11977 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-48458 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2023-11-08 N/A 5.5 MEDIUM
In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
CVE-2022-48459 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2023-11-08 N/A 5.5 MEDIUM
In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
CVE-2022-48460 2 Google, Unisoc 13 Android, Sc7731e, Sc9832e and 10 more 2023-11-08 N/A 5.5 MEDIUM
In setting service, there is a possible undefined behavior due to incorrect error handling. This could lead to local denial of service with no additional execution privileges needed
CVE-2022-48461 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2023-11-08 N/A 4.4 MEDIUM
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
CVE-2023-30730 2 Google, Samsung 2 Android, Camera 2023-11-07 N/A 5.5 MEDIUM
Implicit intent hijacking vulnerability in Camera prior to versions 11.0.16.43 in Android 11, 12.1.00.30, 12.0.07.53, 12.1.03.10 in Android 12, and 13.0.01.43, 13.1.00.83 in Android 13 allows local attacker to access specific file.
CVE-2023-30678 2 Google, Samsung 2 Android, Calendar 2023-11-07 N/A 5.5 MEDIUM
Potential zip path traversal vulnerability in Calendar application prior to version 12.4.07.15 in Android 13 allows attackers to write arbitrary file.
CVE-2023-27579 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an end-to-end open source platform for machine learning. Constructing a tflite model with a paramater `filter_input_channel` of less than 1 gives a FPE. This issue has been patched in version 2.12. TensorFlow will also cherrypick the fix commit on TensorFlow 2.11.1.
CVE-2023-25673 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a Floating Point Exception in TensorListSplit with XLA. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
CVE-2023-25672 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. The function `tf.raw_ops.LookupTableImportV2` cannot handle scalars in the `values` parameter and gives an NPE. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
CVE-2023-25671 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. There is out-of-bounds access due to mismatched integer type sizes. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
CVE-2023-25670 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
CVE-2023-25669 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give a floating point exception. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
CVE-2023-25667 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, integer overflow occurs when `2^31 <= num_frames * height * width * channels < 2^32`, for example Full HD screencast of at least 346 frames. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
CVE-2023-25664 1 Google 1 Tensorflow 2023-11-07 N/A 9.8 CRITICAL
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a heap buffer overflow in TAvgPoolGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.
CVE-2023-25662 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 are vulnerable to integer overflow in EditDistance. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
CVE-2023-25660 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when the parameter `summarize` of `tf.raw_ops.Print` is zero, the new method `SummarizeArray<bool>` will reference to a nullptr, leading to a seg fault. A fix is included in TensorFlow version 2.12 and version 2.11.1.
CVE-2023-25659 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the parameter `indices` for `DynamicStitch` does not match the shape of the parameter `data`, it can trigger an stack OOB read. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
CVE-2023-25658 1 Google 1 Tensorflow 2023-11-07 N/A 7.5 HIGH
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, an out of bounds read is in GRUBlockCellGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.
CVE-2023-21419 1 Google 1 Android 2023-11-07 N/A 7.5 HIGH
An improper implementation logic in Secure Folder prior to SMR Jan-2023 Release 1 allows the Secure Folder container remain unlocked under certain condition.
CVE-2023-0460 1 Google 1 Youtube Android Player Api 2023-11-07 N/A 7.3 HIGH
The YouTube Embedded 1.2 SDK binds to a service within the YouTube Main App. After binding, a remote context is created with the flags Context.CONTEXT_INCLUDE_CODE | Context.CONTEXT_IGNORE_SECURITY. This allows the client app to remotely load code from YouTube Main App by retrieving the Main App’s ClassLoader. A potential vulnerability in the binding logic used by the client SDK where the SDK ends up calling bindService() on a malicious app rather than YT Main App. This creates a vulnerability where the SDK can load the malicious app’s ClassLoader instead, allowing the malicious app to load arbitrary code into the calling app whenever the embedded SDK is invoked. In order to trigger this vulnerability, an attacker must masquerade the Youtube app and install it on a device, have a second app that uses the Embedded player and typically distribute both to the victim outside of the Play Store.