MeetC2 is a PoC C2 tool using Google Calendar to mimic cloud abuse, helping teams test detection, logging, and response. Background: Modern adversaries increasingly hide command-and-control (C2) traffic inside cloud services. We built this proof of concept (PoC) to study and demonstrate those techniques in a controlled way, emulating those tactics so red and blue teams […]
A vulnerability categorized as problematic has been discovered in Google Android 12/12L/13/14/15. Affected is the function dng_lossless_decoder::HuffDecode of the file dng_lossless_jpeg.cpp. Such manipulation leads to denial of service.
This vulnerability is listed as CVE-2025-0081. The attack may be performed from remote. There is no available exploit.
It is best practice to apply a patch to resolve this issue.
A vulnerability marked as critical has been reported in Google Android 12/12L/13/14/15. This affects the function main of the file main.cpp of the component SELinux. The manipulation leads to improper access controls.
This vulnerability is documented as CVE-2025-0078. The attack needs to be performed locally. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability categorized as problematic has been discovered in Google Android 12/12L/13/14/15. This affects an unknown part of the component avdtp/avctp. Executing manipulation can lead to execution with unnecessary privileges.
This vulnerability is tracked as CVE-2025-0079. The attack is restricted to local execution. No exploit exists.
It is advisable to implement a patch to correct this issue.
A vulnerability identified as problematic has been detected in Google Android 15. This vulnerability affects unknown code. The manipulation leads to improper restriction of rendered ui layers.
This vulnerability is listed as CVE-2025-0080. The attack must be carried out locally. There is no available exploit.
Applying a patch is the recommended action to fix this issue.
A vulnerability, which was classified as problematic, has been found in Qualcomm Snapdragon Auto, Snapdragon Industrial IOT, Snapdragon MC and Snapdragon Mobile. The impacted element is an unknown function of the component UCI Command Handler. Performing manipulation results in integer overflow.
This vulnerability was named CVE-2024-53025. The attack needs to be approached locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical has been found in Google Android 15. Affected by this issue is the function process_service_attr_rsp of the file sdp_discovery.cc. The manipulation leads to use after free.
This vulnerability is traded as CVE-2025-0074. It is possible to initiate the attack remotely. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability, which was classified as critical, was found in Google Android 15. This issue affects the function process_service_search_attr_req of the file sdp_server.cc. Such manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-0075. The attack can be launched remotely. No exploit exists.
Applying a patch is advised to resolve this issue.