| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| In static definitions of GattServiceConfig.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-185513714 |
| In recycle of Parcel.java, there is a possible way to start foreground activity from background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-208279300 |
| In onCreate of ChooseLockGeneric.java, there is a possible permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-222684510 |
| In getUniqueUsagesWithLabels of PermissionUsageHelper.java, there is a possible incorrect permission attribution due to a logic error in the code. This could lead to local escalation of privilege by conflating apps with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-212434116 |
| In grantEmbeddedWindowFocus of WindowManagerService.java, there is a possible way to change an input channel for embedded hierarchy due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215912712 |
| Product: AndroidVersions: Android kernelAndroid ID: A-209324757References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-208744915References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-207254598References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-209153114References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-210936609References: N/A |
| In several functions of mali_gralloc_reference.cpp, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-212804042References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-211683760References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-209906686References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-209252491References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-207116951References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-215565667References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-209421931References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-211162353References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-210594998References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-204956204References: N/A |