mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-06-28T20:00:31.860615+00:00
This commit is contained in:
parent
24cdd5ee5c
commit
8402cc7793
43
CVE-2021/CVE-2021-319xx/CVE-2021-31937.json
Normal file
43
CVE-2021/CVE-2021-319xx/CVE-2021-31937.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2021-31937",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-06-28T18:15:11.543",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31937",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-204xx/CVE-2022-20443.json
Normal file
20
CVE-2022/CVE-2022-204xx/CVE-2022-20443.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-20443",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:11.637",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In hasInputInfo of Layer.cpp, there is a possible bypass of user interaction requirements due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-194480991"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/android-13",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0009",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2023-06-14T17:15:09.043",
|
||||
"lastModified": "2023-06-14T18:20:18.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-28T18:46:33.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
|
||||
"versionEndExcluding": "5.2.13",
|
||||
"matchCriteriaId": "956FAE55-7B54-42C2-A4B8-6F050EBDFFA9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndExcluding": "6.0.5",
|
||||
"matchCriteriaId": "183C9FEF-3A2F-46F4-9150-D4CFF978B0CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.1.0:*:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "4ED230C2-F7FC-4CEF-BBBC-E44A68A1ADDA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2023-0009",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-20968",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:10.643",
|
||||
"lastModified": "2023-03-28T19:36:09.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:11.717",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple locations of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235935"
|
||||
"value": "In multiple functions of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235935"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-20971",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:10.913",
|
||||
"lastModified": "2023-03-28T19:34:37.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:11.803",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In updatePermissionTreeSourcePackage of PermissionManagerServiceImpl.java, there is a possible way to obtain dangerous permission without the user's consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-225880325"
|
||||
"value": "In updatePermissionTreeSourcePackage of PermissionManagerServiceImpl.java, there is a possible way to obtain dangerous permissions without user consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-225880325"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20972",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.040",
|
||||
"lastModified": "2023-03-28T19:22:22.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:11.877",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20973",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.157",
|
||||
"lastModified": "2023-03-30T01:17:49.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:11.943",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20974",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.283",
|
||||
"lastModified": "2023-03-30T01:18:15.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.007",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20975",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.330",
|
||||
"lastModified": "2023-03-30T01:19:05.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.073",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20976",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.373",
|
||||
"lastModified": "2023-03-28T20:35:34.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.143",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20977",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.417",
|
||||
"lastModified": "2023-03-28T20:32:24.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.207",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-20979",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.463",
|
||||
"lastModified": "2023-03-28T20:23:39.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.277",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In BtaAvCo::GetNextSourceDataPacket of bta_av_co.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-259939364"
|
||||
"value": "In GetNextSourceDataPacket of bta_av_co.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-259939364"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20980",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.513",
|
||||
"lastModified": "2023-03-28T20:23:15.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.343",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20981",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.560",
|
||||
"lastModified": "2023-03-27T22:25:51.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.407",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20982",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.603",
|
||||
"lastModified": "2023-03-27T22:26:06.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.473",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-20983",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.647",
|
||||
"lastModified": "2023-03-27T22:26:18.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.543",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_ble_rand_enc_complete of btm_sec.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260569449"
|
||||
"value": "In btm_ble_rand_enc_complete of btm_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260569449"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20984",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.700",
|
||||
"lastModified": "2023-03-27T22:26:32.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.610",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20985",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.747",
|
||||
"lastModified": "2023-03-27T22:27:12.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.673",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,12 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-20986",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.793",
|
||||
"lastModified": "2023-03-27T22:27:34.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.737",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_ble_clear_resolving_list_complete of btm_ble_privacy.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255304475"
|
||||
"value": "In btm_ble_clear_resolving_list_completecomplete of btm_ble_privacy.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255304475"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -65,12 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20987",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.840",
|
||||
"lastModified": "2023-03-28T21:42:54.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.797",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20988",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.887",
|
||||
"lastModified": "2023-03-28T21:45:50.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.863",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20989",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.933",
|
||||
"lastModified": "2023-03-28T21:47:05.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.930",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-20990",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:11.983",
|
||||
"lastModified": "2023-03-28T21:48:42.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:12.993",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_read_local_oob_complete of btm_sec.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568354"
|
||||
"value": "In btm_ble_rand_enc_complete of btm_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568354"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -65,12 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-20991",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:12.027",
|
||||
"lastModified": "2023-03-29T14:46:30.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:13.057",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_ble_process_periodic_adv_sync_lost_evt of ble_scanner_hci_interface.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255305114"
|
||||
"value": "In btm_ble_process_periodic_adv_sync_lost_evt of ble_scanner_hci_interface.cc , there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255305114"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20992",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:12.080",
|
||||
"lastModified": "2023-03-29T14:48:35.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:13.120",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,11 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-21027",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:13.507",
|
||||
"lastModified": "2023-03-30T14:18:59.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:13.180",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In serializePasspointConfiguration of PasspointXmlUtils.java, there is a possible logic error in the code. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216854451"
|
||||
"value": "In multiple functions of PasspointXmlUtils.java, there is a possible authentication misconfiguration due to a logic error in the code. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216854451"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -65,12 +65,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-21031",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:13.657",
|
||||
"lastModified": "2023-03-29T01:17:59.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-28T18:15:13.243",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Display::setPowerMode of HWC2.cpp, there is a possible out of bounds read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-242688355"
|
||||
"value": "In setPowerMode of HWC2.cpp, there is a possible out of bounds read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-242688355"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -69,11 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-03-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-210xx/CVE-2023-21066.json
Normal file
20
CVE-2023/CVE-2023-210xx/CVE-2023-21066.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21066",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.307",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In cd_CodeMsg of cd_codec.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-250100597References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21146.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21146.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21146",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.353",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239867994References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21147.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21147.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21147",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.403",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In lwis_i2c_device_disable of lwis_device_i2c.c, there is a possible UAF due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-269661912References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21148.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21148.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21148",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.450",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In BuildSetConfig of protocolimsbuilder.cpp, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783657References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21149.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21149.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21149",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.503",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In registerGsmaServiceIntentReceiver of ShannonRcsService.java, there is a possible way to activate/deactivate RCS service due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-270050709References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21150.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21150.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21150",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.553",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In handle_set_parameters_ctrl of hal_socket.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-267312009References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21151.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21151.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21151",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.607",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Google BMS kernel module, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265149414References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21152.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21152.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21152",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.657",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In FaceStatsAnalyzer::InterpolateWeightList of face_stats_analyzer.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-269174022References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21153.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21153.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21153",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.703",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Do_AIMS_SET_CALL_WAITING of imsservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264259730References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21154.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21154.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21154",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.747",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In StoreAdbSerialNumber of protocolmiscbuilder.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783910References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21155.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21155.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21155",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.797",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In BuildSetRadioNode of protocolmiscbuilder.cpp, there is a possible out of bounds read due to a missing null check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264540700References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21156.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21156.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21156",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.847",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In BuildGetRadioNode of protocolmiscbulider.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the modem with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264540759References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21157.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21157.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21157",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.893",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In encode of wlandata.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783137References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21158.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21158.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21158",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.943",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In encode of miscdata.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783635References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21159.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21159.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21159",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:13.993",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Parse of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783565References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21160.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21160.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21160",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.043",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In BuildSetTcsFci of protocolmiscbuilder.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263784118References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21161.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21161.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21161",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.090",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Parse of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783702References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21167.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21167.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21167",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.137",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setProfileName of DevicePolicyManagerService.java, there is a possible way to crash the SystemUI menu due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-259942964"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21168.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21168.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21168",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.183",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In convertCbYCrY of ColorConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-253270285"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21169.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21169.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21169",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.237",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In inviteInternal of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-274443441"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21170.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21170.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21170",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.287",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In executeSetClientTarget of ComposerCommandEngine.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-252764410"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21171.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21171.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21171",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.343",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In verifyInputEvent of InputDispatcher.cpp, there is a possible way to conduct click fraud due to side channel information disclosure. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261085213"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21172.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21172.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21172",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.387",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple functions of WifiCallingSettings.java, there is a possible way to change calling preferences for the admin user due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262243015"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21173.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21173.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21173",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.433",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple methods of DataUsageList.java, there is a possible way to learn about admin user's network activities due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262741858"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21174.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21174.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21174",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.480",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In isPageSearchEnabled of BillingCycleSettings.java, there is a possible way for the guest user to change data limits due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235822222"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21175.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21175.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21175",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.527",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In onCreate of DataUsageSummary.java, there is a possible method for a guest user to enable or disable mobile data due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262243574"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21176.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21176.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21176",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.573",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In list_key_entries of utils.rs, there is a possible way to disable user credentials due to resource exhaustion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-222287335"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21177.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21177.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21177",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.620",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In requestAppKeyboardShortcuts of WindowManagerService.java, there is a possible way to infer the app a user is interacting with due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-273906410"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21178.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21178.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21178",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.667",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In installKey of KeyUtil.cpp, there is a possible failure of file encryption due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-140762419"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21179.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21179.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21179",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.720",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21180.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21180.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21180",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.767",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In xmlParseTryOrFinish of parser.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261365944"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21181.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21181.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21181",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.810",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_ble_update_inq_result of btm_ble_gap.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-264880969"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21182.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21182.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21182",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.857",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-252764175"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21183.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21183.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21183",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.907",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ForegroundUtils of ForegroundUtils.java, there is a possible way to read NFC tag data while the app is still in the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235863754"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21184.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21184.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21184",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.947",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In getCurrentPrivilegedPackagesForAllUsers of CarrierPrivilegesTracker.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-267809568"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21185.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21185.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21185",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:14.987",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple functions of WifiNetworkFactory.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-266700762"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21186.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21186.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21186",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.030",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In LogResponse of Dns.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261079188"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21187.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21187.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21187",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.073",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In onCreate of UsbAccessoryUriActivity.java, there is a possible way to escape the Setup Wizard due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-246542917"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21188.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21188.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21188",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.110",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_ble_update_inq_result of btm_ble_gap.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-264624283"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21189.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21189.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21189",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.150",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In startLockTaskMode of LockTaskController.java, there is a possible bypass of lock task mode due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-213942596"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21190.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21190.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21190",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.190",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_acl_encrypt_change of btm_acl.cc, there is a possible way for a remote device to turn off encryption without resulting in a terminated connection due to an unusual root cause. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251436534"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21191.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21191.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21191",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.230",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In fixNotification of NotificationManagerService.java, there is a possible bypass of notification hide preference due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-269738057"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21192.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21192.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21192",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.267",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setInputMethodWithSubtypeIdLocked of InputMethodManagerService.java, there is a possible way to setup input methods that are not enabled due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-227207653"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21193.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21193.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21193",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.307",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In VideoFrame of VideoFrame.h, there is a possible abort due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233006499"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21194.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21194.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21194",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.347",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In gatt_dbg_op_name of gatt_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260079141"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21195.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21195.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21195",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.383",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_ble_periodic_adv_sync_tx_rcvd of btm_ble_gap.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth, if the firmware were compromised with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233879420"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21196.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21196.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21196",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.423",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_ble_batchscan_filter_track_adv_vse_cback of btm_ble_batchscan.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261857395"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21197.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21197.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21197",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.460",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_acl_process_sca_cmpl_pkt of btm_acl.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251427561"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21198.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21198.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21198",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.500",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In remove_sdp_record of btif_sdp_server.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-245517503"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-211xx/CVE-2023-21199.json
Normal file
20
CVE-2023/CVE-2023-211xx/CVE-2023-21199.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21199",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.540",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btu_ble_proc_ltk_req of btu_hcif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-254445961"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21200.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21200.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21200",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.577",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In on_remove_iso_data_path of btm_iso_impl.h, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236688764"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21201.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21201.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21201",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.617",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In on_create_record_event of btif_sdp_server.cc, there is a possible out of bounds read due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-263545186"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21202.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21202.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21202",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.660",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In btm_delete_stored_link_key_complete of btm_devctl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over Bluetooth with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568359"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21203.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21203.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21203",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.703",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In startWpsPbcInternal of sta_iface.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262246082"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21204.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21204.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21204",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.743",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple files, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the wifi server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262246231"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21205.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21205.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21205",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.783",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In startWpsPinDisplayInternal of sta_iface.cpp, there is a possible out of bounds read due to unsafe deserialization. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262245376"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21206.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21206.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21206",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.827",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In initiateVenueUrlAnqpQueryInternal of sta_iface.cpp, there is a possible out of bounds read due to unsafe deserialization. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262245630"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21207.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21207.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21207",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.873",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In initiateTdlsSetupInternal of sta_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236670"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21208.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21208.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21208",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.913",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setCountryCodeInternal of sta_iface.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262245254"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21209.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21209.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21209",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.953",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple functions of sta_iface.cpp, there is a possible out of bounds read due to unsafe deserialization. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236273"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21210.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21210.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21210",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:15.997",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In initiateHs20IconQueryInternal of sta_iface.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236331"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21211.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21211.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21211",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.037",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple files, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235998"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21212.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21212.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21212",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.080",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple files, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the wifi server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236031"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21213.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21213.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21213",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.123",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In initiateTdlsTeardownInternal of sta_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the wifi server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235951"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21214.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21214.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21214",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.167",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In addGroupWithConfigInternal of p2p_iface.cpp, there is a possible out of bounds read due to unsafe deserialization. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235736"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21219.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21219.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21219",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.210",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible use of unencrypted transport over cellular networks due to an insecure default value. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264698379References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21220.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21220.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21220",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.250",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible use of unencrypted transport over cellular networks due to an insecure default value. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264590585References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21222.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21222.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21222",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.297",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In load_dt_data of storage.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-266977723References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21223.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21223.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21223",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.340",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In LPP_ConvertGNSS_DataBitAssistance of LPP_CommonUtil.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-256047000References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21224.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21224.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21224",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.383",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ss_ProcessReturnResultComponent of ss_MmConManagement.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265276966References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21225.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21225.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21225",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.427",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "there is a possible way to bypass the protected confirmation screen due to Failure to lock display power. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-270403821References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21226.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21226.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21226",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.470",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SAEMM_RetrieveTaiList of SAEMM_ContextManagement.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-240728187References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-212xx/CVE-2023-21236.json
Normal file
20
CVE-2023/CVE-2023-212xx/CVE-2023-21236.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-21236",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-06-28T18:15:16.517",
|
||||
"lastModified": "2023-06-28T19:27:43.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In aoc_service_set_read_blocked of aoc.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-270148537References: N/A"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user