A vulnerability marked as problematic has been reported in Google Android. This affects an unknown function. Performing manipulation results in improper privilege management.
This vulnerability was named CVE-2025-36901. The attack needs to be approached within the local network. There is no available exploit.
It is suggested to install a patch to address this issue.
A vulnerability classified as critical was found in Google Android. Affected by this vulnerability is the function syna_cdev_ioctl_store_pid of the file syna_tcm2_sysfs.c. The manipulation results in out-of-bounds write.
This vulnerability is identified as CVE-2025-36902. The attack is only possible with local access. There is not any exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in Google Android. It has been classified as critical. Affected is the function cd_CnMsgCodecUserApi of the file cd_CnMsgCodecUserApi.cpp. This manipulation causes out-of-bounds write.
This vulnerability appears as CVE-2025-36897. The attack may be initiated remotely. There is no available exploit.
Applying a patch is the recommended action to fix this issue.
A vulnerability classified as problematic has been found in Google Android. The impacted element is an unknown function. Performing manipulation results in protection mechanism failure.
This vulnerability is identified as CVE-2025-36898. The attack is only possible with local access. There is not any exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in Google Android. It has been rated as problematic. This issue affects the function lwis_test_register_io of the file lwis_device_test.c. The manipulation leads to integer overflow.
This vulnerability is traded as CVE-2025-36900. An attack has to be approached locally. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability identified as problematic has been detected in Google Android. The affected element is an unknown function. This manipulation causes active debug code.
This vulnerability is handled as CVE-2025-36899. It is feasible to perform the attack on the physical device. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Google Android 10.0/11.0/12.0/13.0. This issue affects some unknown processing of the file MediaCodec.cpp. Such manipulation leads to use after free.
This vulnerability is traded as CVE-2023-20933. An attack has to be approached locally. There is no exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability was found in Google Android 11.0/12.0/13.0. It has been rated as critical. This impacts the function bta_av_rc_disc_done of the file bta_av_act.cc. Performing manipulation results in out-of-bounds write.
This vulnerability is identified as CVE-2023-20936. The attack is only possible with local access. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability marked as problematic has been reported in Google Android 11.0/12.0/13.0. The affected element is an unknown function. Performing manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2023-20935. The attack is only possible with local access. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability was found in Google Android 10.0/11.0/12.0/13.0. It has been rated as problematic. This affects the function onCreatePreferences of the file EditInfoFragment.java. This manipulation causes information disclosure.
This vulnerability is tracked as CVE-2023-20932. The attack is restricted to local execution. No exploit exists.
It is suggested to install a patch to address this issue.
A vulnerability has been found in OpenBSD up to 7.4 Errata 020/7.5 Errata 007 and classified as very critical. This affects an unknown part of the component NFS Client/NFS Server. Performing manipulation results in double free.
This vulnerability is reported as CVE-2024-10934. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Trend Micro Deep Security up to 20.0. The affected element is an unknown function. Such manipulation leads to os command injection.
This vulnerability is traded as CVE-2024-51503. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in RIOT-OS up to 2024.04 and classified as problematic. This impacts the function _parse_advertise of the file /sys/net/application_layer/dhcpv6/client.c of the component Header Length Handler. Performing manipulation results in denial of service.
This vulnerability is known as CVE-2024-52802. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in tsMuxer nightly-2024-05-10-02-00-45. It has been classified as critical. This impacts an unknown function of the component MKV Video File Handler. Performing manipulation results in heap-based buffer overflow.
This vulnerability is reported as CVE-2024-41217. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in Nextcloud Mail up to 2.2.9/3.6.1/3.7.1 and classified as critical. This affects an unknown function. The manipulation results in improper access controls.
This vulnerability is known as CVE-2024-52509. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in Nextcloud Server up to 28.0.9/29.0.6. Affected by this issue is some unknown functionality of the component Pre-flighted HEAD Request Handler. The manipulation results in resource consumption.
This vulnerability is reported as CVE-2024-52520. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.