Vulnerabilities > Google > Android > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-03-24 | CVE-2019-20623 | Use of Uninitialized Resource vulnerability in Google Android An issue was discovered on Samsung mobile devices with N(7.1), O(8.x), and P(9.0) software. | 3.3 |
2020-03-24 | CVE-2019-20625 | Information Exposure Through Log Files vulnerability in Google Android 7.1/8.0/8.1 An issue was discovered on Samsung mobile devices with N(7.1) and O(8.x) (Exynos chipsets) software. | 3.3 |
2020-03-24 | CVE-2019-20559 | Missing Authentication for Critical Function vulnerability in Google Android 9.0 An issue was discovered on Samsung mobile devices with P(9.0) software. | 2.4 |
2020-03-24 | CVE-2019-20579 | Missing Authentication for Critical Function vulnerability in Google Android An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software. | 2.4 |
2020-03-24 | CVE-2019-20533 | Improper Authentication vulnerability in Google Android An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) (released in China or India) software. | 3.3 |
2020-03-24 | CVE-2019-20534 | Unspecified vulnerability in Google Android 9.0 An issue was discovered on Samsung mobile devices with P(9.0) software. low complexity google | 2.4 |
2020-03-24 | CVE-2020-10830 | Unspecified vulnerability in Google Android 10.0/9.0 An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. low complexity google | 2.4 |
2020-03-10 | CVE-2020-0047 | Missing Authorization vulnerability in Google Android 10.0 In setMasterMute of AudioService.java, there is a missing permission check. | 3.3 |
2020-03-10 | CVE-2020-0029 | Information Exposure vulnerability in Google Android 10.0 In the WifiConfigManager, there is a possible storage of location history which can only be deleted by triggering a factory reset. | 2.3 |
2020-02-12 | CVE-2011-2343 | Information Exposure vulnerability in Google Android The Bluetooth stack in Android before 2.3.6 allows a physically proximate attacker to obtain contact information via an AT phonebook transfer. | 2.4 |