A vulnerability categorized as problematic has been discovered in Google Android 14/15/16. This affects the function onServiceDisconnected of the file KeyguardServiceDelegate.java. The manipulation results in information disclosure.
This vulnerability is known as CVE-2026-0005. Attacking locally is a requirement. No exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in Google Android. It has been rated as problematic. The impacted element is an unknown function of the file mem_protect.c. The manipulation leads to Local Privilege Escalation.
This vulnerability is traded as CVE-2026-0038. An attack has to be approached locally. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in Google Android 14/15/16/16-qpr2. It has been declared as problematic. The affected element is the function setPackageOrComponentEnabled of the file ManagedServices.java. Executing a manipulation can lead to improper input validation.
This vulnerability appears as CVE-2026-0034. The attack requires local access. There is no available exploit.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in Google Android 14/15/16. It has been classified as problematic. Impacted is the function setupLayout of the file PickActivity.java. Performing a manipulation results in Local Privilege Escalation.
This vulnerability is reported as CVE-2026-0013. The attack requires a local approach. No exploit exists.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in Google Android 14/15/16/16-qpr2 and classified as critical. This issue affects the function createSessionInternal of the file PackageInstallerService.java. Such manipulation leads to permission issues.
This vulnerability is documented as CVE-2026-0023. The attack needs to be performed locally. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability has been found in Google Android 16-qpr2 and classified as critical. This vulnerability affects the function dumpBitmapsProto of the file ActivityManagerService.java. This manipulation causes permission issues.
This vulnerability is registered as CVE-2026-0047. The attack needs to be launched locally. No exploit is available.
It is suggested to install a patch to address this issue.
A vulnerability, which was classified as problematic, was found in Google Android 14/15/16/16-qpr2. This affects the function createRequest of the file MediaProvider.java. The manipulation results in information disclosure.
This vulnerability is cataloged as CVE-2026-0035. The attack must be initiated from a local position. There is no exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability, which was classified as critical, has been found in Google Android. Affected by this issue is some unknown functionality of the file ffa.c. The manipulation leads to memory corruption.
This vulnerability is listed as CVE-2026-0037. The attack must be carried out locally. There is no available exploit.
A vulnerability classified as critical was found in Google Android. Affected by this vulnerability is the function __host_check_page_state_range of the file mem_protect.c. Executing a manipulation can lead to out-of-bounds write.
This vulnerability is tracked as CVE-2026-0030. The attack is restricted to local execution. No exploit exists.
A vulnerability classified as critical has been found in Google Android. Affected is an unknown function of the file mem_protect.c. Performing a manipulation results in out-of-bounds write.
This vulnerability is identified as CVE-2026-0031. The attack is only possible with local access. There is not any exploit available.
A vulnerability described as critical has been identified in Google Android kernel. This impacts an unknown function of the file mem_protect.c. Such manipulation leads to out-of-bounds write.
This vulnerability is referenced as CVE-2026-0032. The attack can only be performed from a local environment. No exploit is available.
A vulnerability marked as critical has been reported in Google Android kernel. This affects the function __pkvm_host_share_guest of the file mem_protect.c. This manipulation causes out-of-bounds write.
The identification of this vulnerability is CVE-2026-0028. The attack can only be executed locally. There is no exploit available.
A vulnerability labeled as critical has been found in Google Android kernel. The impacted element is the function smmu_detach_dev of the file arm-smmu-v3.c. The manipulation results in out-of-bounds write.
This vulnerability was named CVE-2026-0027. The attack needs to be approached locally. There is no available exploit.
A patch should be applied to remediate this issue.
A vulnerability identified as critical has been detected in Google Android. The affected element is the function __pkvm_init_vm of the file pkvm.c. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2026-0029. Local access is required to approach this attack. No exploit exists.
A vulnerability categorized as critical has been discovered in Google Android 14. Impacted is the function removePermission of the file PermissionManagerServiceImpl.java. Executing a manipulation can lead to permission issues.
This vulnerability is handled as CVE-2026-0026. It is possible to launch the attack on the local host. There is not any exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability was found in Google Android 14/15/16/16-qpr2. It has been rated as critical. This issue affects the function hasImage of the file Notification.java of the component Notifications Handler. Performing a manipulation results in permission issues.
This vulnerability is known as CVE-2026-0025. Attacking locally is a requirement. No exploit is available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 16/16-qpr2. It has been declared as problematic. This vulnerability affects the function onChange of the file BiometricService.java. Such manipulation leads to Local Privilege Escalation.
This vulnerability is traded as CVE-2026-0017. An attack has to be approached locally. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in Google Android 14/15/16/16-qpr2. It has been classified as critical. This affects the function parsePermissionGroup of the file ParsedPermissionUtils.java. This manipulation causes permission issues.
This vulnerability appears as CVE-2026-0020. The attack requires local access. There is no available exploit.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in Google Android 14/15/16 and classified as critical. Affected by this issue is the function onTransact of the file IDrmManagerService.cpp. The manipulation results in out-of-bounds write.
This vulnerability is reported as CVE-2026-0010. The attack requires a local approach. No exploit exists.
It is advisable to implement a patch to correct this issue.