google,
-
A vulnerability was found in Google Android 11.0/12.0/13.0. It has been classified as problematic. This affects an unknown part of the component AccessibilityService. The manipulation leads to Local Privilege Escalation. This vulnerability is uniquely identified as CVE-2023-21109. Local access is required to approach this attack. There is no exploit available. It is recommended to apply…
-
A vulnerability classified as problematic was found in Google Android 11.0/12.0/13.0. This vulnerability affects the function verifyReplacingVersionCode of the file InstallPackageHelper.java. The manipulation leads to Local Privilege Escalation. This vulnerability was named CVE-2023-21116. Local access is required to approach this attack. There is no exploit available. It is recommended to apply a patch to fix…
-
A vulnerability was found in Google Android 11.0/12.0/13.0. It has been declared as problematic. Affected by this vulnerability is the function registerPhoneAccount of the file PhoneAccountRegistrar.java. The manipulation leads to denial of service. This vulnerability is known as CVE-2023-21103. It is possible to launch the attack on the local host. There is no exploit available.…
-
A vulnerability classified as problematic was found in Google Android 11.0/12.0/13.0. This vulnerability affects the function AnalyzeMfcResp of the file NxpMfcReader.cc. The manipulation leads to out-of-bounds read. This vulnerability was named CVE-2023-21112. It is possible to launch the attack on the local host. There is no exploit available. It is recommended to apply a patch…
-
A vulnerability classified as critical has been found in Google Android 11.0/12.0/13.0. This affects an unknown part of the file SnoozeHelper.java of the component Notifications Handler. The manipulation leads to resource consumption. This vulnerability is uniquely identified as CVE-2023-21110. It is possible to initiate the attack remotely. There is no exploit available. It is recommended…
-
A vulnerability was found in Google Android. It has been rated as critical. Affected by this issue is the function adreno_set_param of the file adreno_gpu.c. The manipulation leads to memory corruption. This vulnerability is handled as CVE-2023-21106. Local access is required to approach this attack. There is no exploit available. It is recommended to apply…
-
A vulnerability was found in Google Android 12.0/13.0. It has been declared as problematic. Affected by this vulnerability is the function applySyncTransaction of the file WindowOrganizer.java. The manipulation leads to information disclosure. This vulnerability is known as CVE-2023-21104. An attack has to be approached locally. There is no exploit available. It is recommended to apply…
-
A vulnerability was found in Google Android. It has been classified as critical. Affected is the function __efi_rt_asm_wrapper of the file efi-rt-wrapper.S. The manipulation leads to stack-based buffer overflow. This vulnerability is traded as CVE-2023-21102. The attack needs to be approached locally. There is no exploit available. It is recommended to apply a patch to…
-
A vulnerability was found in Google Android 11.0/12.0/13.0 and classified as problematic. This issue affects some unknown processing of the file ShortcutPackage.java of the component pushDynamicShortcut. The manipulation leads to resource consumption. The identification of this vulnerability is CVE-2023-20930. The attack may be initiated remotely. There is no exploit available. It is recommended to apply…
-
The ability to remotely remove installed extensions is coming “later this year.” | Image: The Verge Google has announced some new business features that can help IT admins better manage Chrome browser extensions, a popular attack vector for cybercriminals. A curated Chrome Web Store experience is launching today for Enterprise workspaces that allows pre-approved extensions…
-
Jonathan Briskman / Sensor Tower: State of Mobile 2025: in 2024, app downloads on iOS and Google Play dropped ~1% YoY to 136B, while revenue from IAP, paid apps, and games rose 13% YoY to $150B — The mobile market is stronger than ever as we enter 2025, with a recovering mobile gaming market adding…
-
A vulnerability classified as critical was found in Google Chrome. Affected by this vulnerability is an unknown functionality of the component V8. The manipulation leads to out-of-bounds read. This vulnerability is known as CVE-2025-0612. The attack can be launched remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
A vulnerability classified as critical has been found in Google Chrome. Affected is an unknown function of the component V8. The manipulation leads to heap-based buffer overflow. This vulnerability is traded as CVE-2025-0611. It is possible to launch the attack remotely. There is no exploit available. It is recommended to upgrade the affected component.
-
Attackers drop infostealer malware that grabs credentials, web browser data, and crypto wallets.
-
Attackers drop infostealer malware that grabs credentials, web browser data, and crypto wallets.
-
Attackers drop infostealer malware that grabs credentials, web browser data, and crypto wallets.
-
A vulnerability was found in XML for Google Merchant Center Plugin up to 3.0.11 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. This vulnerability was named CVE-2024-13406. The attack can be initiated remotely. There is no exploit available.