Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-27599 | 2025-04-21 | N/A | 6.5 MEDIUM | ||
Element X Android is a Matrix Android Client provided by element.io. Prior to version 25.04.2, a crafted hyperlink on a webpage, or a locally installed malicious app, can force Element X up to version 25.04.1 to load a webpage with similar permissions to Element Call and automatically grant it temporary access to microphone and camera. This issue has been patched in version 25.04.2. | |||||
CVE-2025-20934 | 2025-04-08 | N/A | 5.5 MEDIUM | ||
Improper access control in Sticker Center prior to SMR Apr-2025 Release 1 allows local attackers to access image files with system privilege. | |||||
CVE-2021-4438 | 1 Kyivstar | 1 React Native Sms User Consent | 2025-03-21 | 4.3 MEDIUM | 5.3 MEDIUM |
A vulnerability, which was classified as critical, has been found in kyivstarteam react-native-sms-user-consent up to 1.1.4 on Android. Affected by this issue is the function registerReceiver of the file android/src/main/java/ua/kyivstar/reactnativesmsuserconsent/SmsUserConsentModule.kt. The manipulation leads to improper export of android application components. Attacking locally is a requirement. Upgrading to version 1.1.5 is able to address this issue. The name of the patch is 5423dcb0cd3e4d573b5520a71fa08aa279e4c3c7. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-259508. | |||||
CVE-2023-20962 | 1 Google | 1 Android | 2025-02-25 | N/A | 5.5 MEDIUM |
In getSliceEndItem of MediaVolumePreferenceController.java, there is a possible way to start foreground activity from the background due to an unsafe PendingIntent. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-256590210 | |||||
CVE-2024-36437 | 2025-02-05 | N/A | 6.5 MEDIUM | ||
The com.enflick.android.TextNow (aka TextNow: Call + Text Unlimited) application 24.17.0.2 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.enflick.android.TextNow.activities.DialerActivity component. | |||||
CVE-2024-3479 | 2024-11-21 | N/A | 2.8 LOW | ||
An improper export vulnerability was reported in the Motorola Enterprise MotoDpms Provider (com.motorola.server.enterprise.MotoDpmsProvider) that could allow a local attacker to read local data. | |||||
CVE-2024-27086 | 2024-11-21 | N/A | 3.9 LOW | ||
The MSAL library enabled acquisition of security tokens to call protected APIs. MSAL.NET applications targeting Xamarin Android and .NET Android (e.g., MAUI) using the library from versions 4.48.0 to 4.60.0 are impacted by a low severity vulnerability. A malicious application running on a customer Android device can cause local denial of service against applications that were built using MSAL.NET for authentication on the same device (i.e., prevent the user of the legitimate application from logging in) due to incorrect activity export configuration. MSAL.NET version 4.60.1 includes the fix. As a workaround, a developer may explicitly mark the MSAL.NET activity non-exported. | |||||
CVE-2023-41823 | 2024-11-21 | N/A | 4.4 MEDIUM | ||
An improper export vulnerability was reported in the Motorola Phone Extension application, that could allow a local attacker to execute unauthorized Activities. | |||||
CVE-2023-41822 | 2024-11-21 | N/A | 4.8 MEDIUM | ||
An improper export vulnerability was reported in the Motorola Interface Test Tool application that could allow a malicious local application to execute OS commands. | |||||
CVE-2023-41821 | 2024-11-21 | N/A | 5.0 MEDIUM | ||
A an improper export vulnerability was reported in the Motorola Setup application that could allow a local attacker to read sensitive user information. | |||||
CVE-2023-41816 | 2024-11-21 | N/A | 5.0 MEDIUM | ||
An improper export vulnerability was reported in the Motorola Services Main application that could allow a local attacker to write to a local database. |