Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 12.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-40090
In BTM_BleVerifySignature of btm_ble.cc, there is a possible way to bypass signature validation due to side channel information disclosure. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploit...
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
Google Android 14.0
NA
CVE-2023-45774
In fixUpIncomingShortcutInfo of ShortcutService.java, there is a possible way to view another user's image due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitati...
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
Google Android 14.0
NA
CVE-2023-45781
In parse_gap_data of utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
Google Android 12.0
Google Android 12.1
Google Android 13.0
Google Android 14.0
NA
CVE-2023-35668
In visitUris of Notification.java, there is a possible way to display images from another user due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
NA
CVE-2023-40073
In visitUris of Notification.java, there is a possible cross-user media read due to Confused Deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
Google Android 14.0
NA
CVE-2023-40074
In saveToXml of PersistableBundle.java, invalid data could lead to local persistent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
NA
CVE-2023-40075
In forceReplaceShortcutInner of ShortcutPackage.java, there is a possible way to register unlimited packages due to a missing bounds check. This could lead to local denial of service which results in a boot loop with no additional execution privileges needed. User interaction is ...
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
Google Android 14.0
NA
CVE-2023-40077
In multiple functions of MetaDataBase.cpp, there is a possible UAF write due to a race condition. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
Google Android 14.0
NA
CVE-2023-40081
In loadMediaDataInBgForResumption of MediaDataManager.kt, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploi...
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
Google Android 14.0
NA
CVE-2023-40083
In parse_gap_data of utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
Google Android 12.0
Google Android 12.1
Google Android 13.0
Google Android 14.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »