A vulnerability, which was classified as problematic, was found in Google Android 11/12/12L/13. This affects the function BackgroundLaunchProcessController. The manipulation leads to Local Privilege Escalation.
This vulnerability is uniquely identified as CVE-2024-0034. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in Google Android 11/12/12L/13/14. This issue affects the function onNullBinding of the file TileLifecycleManager.java. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2024-0035. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in Google Android 11/12/12L/13/14. Affected is the function startNextMatchingActivity of the file ActivityTaskManagerService.java. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2024-0036. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in Google Android 14. Affected by this issue is the function removePersistentDot of the file SystemStatusAnimationSchedulerImpl.kt. The manipulation leads to race condition.
This vulnerability is handled as CVE-2024-0041. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in Google Android. Affected by this issue is the function DevmemtUnmapPMR of the file devicemem_server.c. The manipulation leads to use after free.
This vulnerability is handled as CVE-2023-21165. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Google Android 12/12L/13. This affects the function convertSubgraphFromHAL of the file ShimConverter.cpp. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2023-40085. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Google Android 11/12/12L/13 and classified as problematic. This vulnerability affects the function convertToComponentName of the file DreamService.java. The manipulation leads to open redirect.
This vulnerability was named CVE-2024-0015. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 11/12/12L/13/14. It has been classified as problematic. Affected is an unknown function. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-0016. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Google Android 11/12/12L/13/14. It has been declared as problematic. Affected by this vulnerability is the function shouldUseNoOpLocation of the file CameraActivity.java. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-0017. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in JetBrains TeamCity. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to relative path traversal.
The identification of this vulnerability is CVE-2024-27199. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in JetBrains TeamCity up to 2023.11.3. This issue affects some unknown processing of the component Build Parameter Handler. The manipulation leads to insertion of sensitive information into sent data.
The identification of this vulnerability is CVE-2024-28173. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in JetBrains TeamCity up to 2023.11.3. Affected by this issue is some unknown functionality of the component URL Handler. The manipulation leads to incorrect authorization.
This vulnerability is handled as CVE-2024-28174. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in JetBrains YouTrack. This issue affects some unknown processing of the component HelpDesk. The manipulation leads to authentication bypass by spoofing.
The identification of this vulnerability is CVE-2024-28228. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in JetBrains YouTrack. Affected is an unknown function of the component Issue Handler. The manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2024-28229. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.