In messaging service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In network service, there is a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.
In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In contacts service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed.
In contacts service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.
In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.
In bluetooth service, there is a possible missing permission check. This could lead to local denial of service in bluetooth service with no additional execution privileges needed.
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
In music service, there is a missing permission check. This could lead to local denial of service in music service with no additional execution privileges needed.
In messaging service, there is a missing permission check. This could lead to access unexpected provider in contacts service with no additional execution privileges needed.
In soundrecorder service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.
In Soundrecorder service, there is a missing permission check. This could lead to elevation of privilege in Soundrecorder service with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In cell service, there is a missing permission check. This could lead to local denial of service in cell service with no additional execution privileges needed.
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
In Music service, there is a missing permission check. This could lead to elevation of privilege in Music service with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In soundrecorder service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
In messaging service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.
In Music service, there is a missing permission check. This could lead to elevation of privilege in Music service with no additional execution privileges needed.
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
In multiple functions of WifiScanModeActivity.java, there is a possible way to bypass a device config restriction due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
In Music service, there is a missing permission check. This could lead to elevation of privilege in Music service with no additional execution privileges needed.
In messaging service, there is a missing permission check. This could lead to local denial of service in messaging service with no additional execution privileges needed.
In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.
In isSystem of WifiPermissionsUtil.java, there is a possible permission bypass due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Improper access control vulnerability in Telecom application prior to SMR Sep-2022 Release 1 allows attacker to start emergency calls via undefined permission.
In multiple locations, there is a possible way to read files from another user due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
In multiple locations, there is a possible one-time permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
In telephony service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges.
In multiple functions of CertInstaller.java, there is a possible way to install certificates due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.