There is a possible out of bounds read due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163003156 There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163008257 User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-161894517 This could lead to local escalation of privilege with no additional execution privileges needed. In appendFormatV of String8.cpp, there is a possible out of bounds write due to incorrect error handling. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-162383705 ![]() In setUpdatableDriverPath of GpuService.cpp, there is a possible memory corruption due to a missing permission check. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-158833854 This could lead to remote information disclosure in the Bluetooth server with no additional execution privileges needed. In gatt_process_read_by_type_rsp of gatt_cl.cc, there is a possible out of bounds read due to a missing bounds check. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-155288585 This could lead to local escalation of privilege and permissions with no additional execution privileges needed. In multiple settings screens, there are possible tapjacking attacks due to an insecure default value. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. The issue results from incorrect permissions set on a resource used by the service. The specific flaw exists within the handling of the configuration files used by the Foxit Reader Update Service. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. ![]() This vulnerability allows local attackers to escalate privileges on affected installations of Foxit Reader 10.8. The specific flaw exists within the handling of the configuration files used by the Foxit PhantomPDF Update Service. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PhantomPDF 10.8. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. Patch information is provided when available. This information may include identifying information, values, definitions, and related links. Low: vulnerabilities with a CVSS base score of 0.0–3.9Įntries may include additional information provided by organizations and efforts sponsored by CISA.Medium: vulnerabilities with a CVSS base score of 4.0–6.9.High: vulnerabilities with a CVSS base score of 7.0–10.0.The division of high, medium, and low severities correspond to the following scores: ![]() Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |