A vulnerability was found in Google Android 7.0/7.1.1/7.1.2/8.0/8.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2018-9426. The attack can only be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android up to 8.1. It has been declared as critical. This vulnerability affects the function prop2cfg of the file btif_storage.cc. The manipulation leads to out-of-bounds write.
This vulnerability was named CVE-2018-9430. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Google Android up to 8.1. This vulnerability affects the function gatt_process_error_rsp of the file gatt_cl.cc. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2018-9435. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Google Android 8/8.1. Affected is the function OSUInfo of the file OSUInfo.java. The manipulation leads to incorrect default permissions.
This vulnerability is traded as CVE-2018-9431. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android. It has been classified as critical. This affects the function procfile_write of the file drivers/misc/mediatek/connectivity/wlan/gen2/os/linux/gl_proc.c. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2018-9393. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android Kernel. It has been declared as critical. This vulnerability affects the function mtk_p2p_wext_set_key of the file drivers/misc/mediatek/connectivity/wlan/gen2/os/linux/gl_p2p.c. The manipulation leads to out-of-bounds write.
This vulnerability was named CVE-2018-9394. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android up to 8.1. It has been rated as problematic. Affected by this issue is the function rpc_msg_handler of the file drivers/misc/mediatek/eccci/port_rpc.c. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2018-9376. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in Google Android up to 8.1. This affects the function gattServerSendResponseNative of the file com_android_bluetooth_gatt.cpp. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2018-9414. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.