Search Results (Refine Search)
- Keyword (text search): android
- Search Type: Search All
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-42577 |
Improper Access Control in Samsung Voice Recorder prior to versions 21.4.15.01 in Android 12 and Android 13, 21.4.50.17 in Android 14 allows physical attackers to access Voice Recorder information on the lock screen. Published: December 04, 2023; 10:15:18 PM -0500 |
V3.1: 2.4 LOW V2.0:(not available) |
CVE-2023-25632 |
The Android Mobile Whale browser app before 3.0.1.2 allows the attacker to bypass its browser unlock function via 'Open in Whale' feature. Published: November 27, 2023; 2:15:43 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-38411 |
Improper access control in the Intel Smart Campus android application before version 9.4 may allow an authenticated user to potentially enable escalation of privilege via local access. Published: November 14, 2023; 2:15:29 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-33872 |
Improper access control in the Intel Support android application all verions may allow an authenticated user to potentially enable information disclosure via local access. Published: November 14, 2023; 2:15:27 PM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-42552 |
Implicit intent hijacking vulnerability in Firewall application prior to versions 12.1.00.24 in Android 11, 13.1.00.16 in Android 12 and 14.1.00.7 in Android 13 allows 3rd party application to tamper the database of Firewall. Published: November 07, 2023; 3:15:23 AM -0500 |
V3.1: 3.3 LOW V2.0:(not available) |
CVE-2023-42545 |
Use of implicit intent for sensitive communication vulnerability in Phone prior to versions 12.7.20.12 in Android 11, 13.1.48, 13.5.28 in Android 12, and 14.7.38 in Android 13 allows attackers to access location data. Published: November 07, 2023; 3:15:21 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36621 |
An issue was discovered in the Boomerang Parental Control application through 13.83 for Android. The child can use Safe Mode to remove all restrictions temporarily or uninstall the application without the parents noticing. Published: November 03, 2023; 12:15:21 AM -0400 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2023-36620 |
An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup="false" attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API. Published: November 03, 2023; 12:15:21 AM -0400 |
V3.1: 4.6 MEDIUM V2.0:(not available) |
CVE-2015-2968 |
LINE@ for Android version 1.0.0 and LINE@ for iOS version 1.0.0 are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker. Published: October 31, 2023; 6:15:08 AM -0400 |
V3.1: 5.9 MEDIUM V2.0:(not available) |
CVE-2015-0897 |
LINE for Android version 5.0.2 and earlier and LINE for iOS version 5.0.0 and earlier are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker. Published: October 31, 2023; 6:15:08 AM -0400 |
V3.1: 5.9 MEDIUM V2.0:(not available) |
CVE-2023-46139 |
KernelSU is a Kernel based root solution for Android. Starting in version 0.6.1 and prior to version 0.7.0, if a KernelSU installed device is infected with a malware whose app signing block specially constructed, it can take over root privileges on the device. The vulnerable verification logic actually obtains the signature of the last block with an id of `0x7109871a`, while the verification logic during Android installation is to obtain the first one. In addition to the actual signature upgrade that has been fixed (KSU thought it was V2 but was actually V3), there is also the problem of actual signature downgrading (KSU thought it was V2 but was actually V1). Find a condition in the signature verification logic that will cause the signature not to be found error, and KernelSU does not implement the same conditions, so KSU thinks there is a V2 signature, but the APK signature verification actually uses the V1 signature. This issue is fixed in version 0.7.0. As workarounds, keep the KernelSU manager installed and avoid installing unknown apps. Published: October 30, 2023; 8:15:10 PM -0400 |
V3.1: 5.7 MEDIUM V2.0:(not available) |
CVE-2023-21307 |
In Bluetooth, there is a possible way for a paired Bluetooth device to access a long term identifier for an Android device due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Published: October 30, 2023; 1:15:48 PM -0400 |
V3.1: 5.0 MEDIUM V2.0:(not available) |
CVE-2023-40140 |
In android_view_InputDevice_create of android_view_InputDevice.cpp, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Published: October 27, 2023; 5:15:09 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-46102 |
The Android Client application, when enrolled to the AppHub server, connects to an MQTT broker to exchange messages and receive commands to execute on the HMI device. The protocol builds on top of MQTT to implement the remote management of the device is encrypted with a hard-coded DES symmetric key, that can be retrieved reversing both the Android Client application and the server-side web application. This issue allows an attacker able to control a malicious MQTT broker on the same subnet network of the device, to craft malicious messages and send them to the HMI device, executing arbitrary commands on the device itself. Published: October 25, 2023; 2:17:36 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-45851 |
The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication. This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device Published: October 25, 2023; 2:17:35 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-45844 |
The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB debug). Published: October 25, 2023; 2:17:35 PM -0400 |
V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2023-45321 |
The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. Due to the lack of encryption of HTTP,this issue allows an attacker placed in the same subnet network of the HMI device to intercept username and password necessary to authenticate to the MQTT server responsible to implement the remote management protocol. Published: October 25, 2023; 2:17:33 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-45220 |
The Android Client application, when enrolled with the define method 1(the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. Published: October 25, 2023; 2:17:33 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-41960 |
The vulnerability allows an unprivileged(untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application itself. Published: October 25, 2023; 2:17:31 PM -0400 |
V3.1: 3.3 LOW V2.0:(not available) |
CVE-2023-41372 |
The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a valid broadcast intent encrypted with a hardcoded RSA key pair Published: October 25, 2023; 2:17:30 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |