A vulnerability identified as problematic has been detected in MediaTek MT6879, MT6895 and MT6983. Affected by this issue is some unknown functionality of the component adsp. This manipulation causes time-of-check time-of-use.
This vulnerability appears as CVE-2023-20620. The attack requires local access. There is no available exploit.
It is suggested to install a patch to address this issue.
A vulnerability, which was classified as critical, was found in Tenda AC1206 15.03.06.23. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in stack-based buffer overflow.
This vulnerability is known as CVE-2025-9523. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability, which was classified as problematic, has been found in Agiloft 28/29. This impacts an unknown function. The manipulation leads to use of default credentials.
This vulnerability is traded as CVE-2025-35114. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Agiloft 28/29/30. This affects an unknown function of the component Import/Export. Executing manipulation can lead to xml external entity reference.
This vulnerability appears as CVE-2025-35112. The attack may be performed from a remote location. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Google Android 15. The impacted element is an unknown function. Performing manipulation results in use after free.
This vulnerability is reported as CVE-2025-22410. The attack requires a local approach. No exploit exists.
It is suggested to install a patch to address this issue.
A vulnerability described as critical has been identified in Google Android 15. The affected element is the function rfc_send_buf_uih of the file rfc_ts_frames.cc. Such manipulation leads to use after free.
This vulnerability is documented as CVE-2025-22409. The attack needs to be performed locally. There is not any exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability marked as critical has been reported in Google Android 15. Impacted is an unknown function. This manipulation causes use after free.
This vulnerability is registered as CVE-2025-22405. The attack needs to be launched locally. No exploit is available.
It is recommended to apply a patch to fix this issue.
A vulnerability labeled as critical has been found in Google Android 15. This issue affects the function avct_lcb_msg_ind of the file avct_lcb_act.cc. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-22404. The attack must be initiated from a local position. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability identified as problematic has been detected in Google Android 15. This vulnerability affects unknown code. The manipulation leads to improper restriction of rendered ui layers.
This vulnerability is listed as CVE-2025-0080. The attack must be carried out locally. There is no available exploit.
Applying a patch is the recommended action to fix this issue.
A vulnerability categorized as problematic has been discovered in Google Android 12/12L/13/14/15. This affects an unknown part of the component avdtp/avctp. Executing manipulation can lead to Local Privilege Escalation.
This vulnerability is tracked as CVE-2025-0079. The attack is restricted to local execution. No exploit exists.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in Google Android 12/12L. It has been rated as critical. Affected by this issue is the function btif_hh_hsdata_rpt_copy_cb of the file bta_hh.cc. Performing manipulation results in use after free.
This vulnerability is identified as CVE-2023-21125. The attack is only possible with local access. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in Google Android 12/12L/13/14/15. It has been declared as problematic. Affected by this vulnerability is the function checkWhetherCallingAppHasAccess of the file DownloadProvider.java. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2025-26417. The attack can only be performed from a local environment. No exploit is available.
A patch should be applied to remediate this issue.
A vulnerability was found in Google Android and classified as problematic. This impacts an unknown function of the file hyp-main.c. The manipulation results in information disclosure.
This vulnerability was named CVE-2025-22413. The attack needs to be approached locally. There is no available exploit.
Applying a patch is advised to resolve this issue.