Filtered by vendor Google Subscriptions
Filtered by product Pixel Subscriptions
Total 50 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2018-9376 1 Google 2 Android, Pixel 2024-12-18 7.8 High
In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
CVE-2018-9413 1 Google 2 Android, Pixel 2024-12-18 8 High
In handle_notification_response of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.
CVE-2018-9414 1 Google 2 Android, Pixel 2024-12-18 7.8 High
In gattServerSendResponseNative of com_android_bluetooth_gatt.cpp, there is a possible out of bounds stack write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
CVE-2018-9418 1 Google 2 Android, Pixel 2024-12-18 8.8 High
In handle_app_cur_val_response of dtif_rc.cc, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-29748 1 Google 2 Android, Pixel 2024-11-29 7.8 High
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVE-2024-32919 1 Google 1 Pixel 2024-11-21 7.8 High
In lwis_add_completion_fence of lwis_fence.c, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-32909 1 Google 2 Android, Pixel 2024-11-21 8.1 High
In handle_msg of main.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-32893 1 Google 2 Android, Pixel 2024-11-21 8.1 High
In _s5e9865_mif_set_rate of exynos_dvfs.c, there is a possible out of bounds read due to improper casting. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-29753 1 Google 1 Pixel 2024-11-21 N/A
In tmu_set_control_temp_step of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-29743 1 Google 1 Pixel 2024-11-21 N/A
In tmu_set_temp_lut of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-4164 1 Google 2 Android, Pixel 2024-11-21 8.4 High
There is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of health data with no additional execution privileges needed.
CVE-2017-15361 35 Acer, Aopen, Asi and 32 more 126 C720 Chromebook, Chromebase, Chromebase 24 and 123 more 2024-11-21 N/A
The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.
CVE-2016-5346 1 Google 3 Android, Pixel, Pixel Xl 2024-11-21 5.5 Medium
An Information Disclosure vulnerability exists in the Google Pixel/Pixel SL Qualcomm Avtimer Driver due to a NULL pointer dereference when processing an accept system call by the user process on AF_MSM_IPC sockets, which could let a local malicious user obtain sensitive information (Android Bug ID A-32551280).
CVE-2024-47041 1 Google 2 Android, Pixel 2024-11-05 7.4 High
In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-47035 1 Google 2 Android, Pixel 2024-10-31 7.4 High
In vring_init of external/headers/include/virtio/virtio_ring.h, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-47022 1 Google 32 Android, Pixel, Pixel 2 and 29 more 2024-10-29 5.1 Medium
Android before 2024-10-05 on Google Pixel devices allows information disclosure in the ACPM component, A-331255656.
CVE-2024-47020 1 Google 32 Android, Pixel, Pixel 2 and 29 more 2024-10-29 5.1 Medium
Android before 2024-10-05 on Google Pixel devices allows information disclosure in the ABL component, A-331966488.
CVE-2024-47031 1 Google 2 Android, Pixel 2024-10-28 7.4 High
Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-329163861.
CVE-2024-47030 1 Google 2 Android, Pixel 2024-10-28 5.1 Medium
Android before 2024-10-05 on Google Pixel devices allows information disclosure in the ACPM component, A-315191818.
CVE-2024-47023 1 Google 2 Android, Pixel 2024-10-28 7.4 High
there is a possible man-in-the-middle attack due to a logic error in the code. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.