Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

pixel

Source -

ADPNVD

CNA CVEs -

0

ADP CVEs -

55

CISA CVEs -

0

NVD CVEs -

7
Related CVEsRelated VendorsRelated AssignersReports
60Vulnerabilities found

CVE-2024-29748
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-7.8||HIGH
EPSS-0.29% / 51.88%
||
7 Day CHG~0.00%
Published-05 Apr, 2024 | 20:02
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-04-25||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

Action-Not Available
Vendor-AndroidGoogle LLC
Product-androidpixelAndroidandroidpixelPixel
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2024-29743
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-7.7||HIGH
EPSS-0.02% / 2.41%
||
7 Day CHG~0.00%
Published-05 Apr, 2024 | 20:02
Updated-24 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In tmu_set_temp_lut of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-Androidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-27227
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 21.86%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-25 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious DNS response can trigger a number of OOB reads, writes, and other memory issues

Action-Not Available
Vendor-Google LLC
Product-androidAndroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-27213
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-8.4||HIGH
EPSS-0.37% / 57.81%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-03 Apr, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BroadcastSystemMessage of servicemgr.cpp, there is a possible Remote Code Execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-416
Use After Free
CVE-2024-27211
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-7.7||HIGH
EPSS-0.02% / 2.41%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-03 Apr, 2025 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In AtiHandleAPOMsgType of ati_Main.c, there is a possible OOB write due to a missing null check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-27204
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-8.4||HIGH
EPSS-0.01% / 2.08%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-03 Apr, 2025 | 15:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In tmu_set_gov_active of tmu.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-22009
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-7.1||HIGH
EPSS-0.02% / 4.69%
||
7 Day CHG~0.00%
Published-11 Mar, 2024 | 18:55
Updated-03 Apr, 2025 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In init_data of , there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidpixel
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-4164
Assigner-Google Devices
ShareView Details
Assigner-Google Devices
CVSS Score-8.4||HIGH
EPSS-0.02% / 3.37%
||
7 Day CHG~0.00%
Published-02 Jan, 2024 | 21:20
Updated-06 Sep, 2024 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
There is a possible information disclosure due to a missing permission check in Pixel Watch

There is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of health data with no additional execution privileges needed.

Action-Not Available
Vendor-Google LLC
Product-androidpixelPixel Watchpixel_watch
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-862
Missing Authorization
CVE-2016-5346
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 29.18%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 18:39
Updated-06 Aug, 2024 | 01:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Information Disclosure vulnerability exists in the Google Pixel/Pixel SL Qualcomm Avtimer Driver due to a NULL pointer dereference when processing an accept system call by the user process on AF_MSM_IPC sockets, which could let a local malicious user obtain sensitive information (Android Bug ID A-32551280).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidpixel_xlpixeln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-15361
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-73.44% / 98.75%
||
7 Day CHG~0.00%
Published-16 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.

Action-Not Available
Vendor-nexiantrueprowiseinfineonpcmergeviglenedugearasiepikxolorgsctlmercermedionsenkatelaopenhexapoin2videonethisensetoshibaedxisbobicushaierpositivoncomputingsector-fiven/aHP Inc.Lenovo Group LimitedASUS (ASUSTeK Computer Inc.)SamsungAcer Inc.Dell Inc.Google LLCLG Electronics Inc.
Product-c1101_chromebookchromeboxchromeboxichromebook_2chromebook_13_g1chromebox_cxi2100s_chromebookv2_chromebookchromebook_pluschromebookthinkcentre_chromeboxn23_yoga_11_chromebookchromebook_bl10chromebook_14_g4n21_chromebookchromebook_15_cb5-571chromebox_cn62chromebook_c300sachromebook_11_c730chromebook_15_cb3-532chromebook_14_ak000-099chromebook_r11chromebook_11_2100-2199pixelchromebook_c301sachromebook_11_3189thinkpad_13_chromebookchromebook_11_cchromebook_ch1190chromebook_2_11_xe500c12chromebook_14_for_work_cp5-471j5_chromebookchromebase_22cb25schromebook_11_c730ee1_rugged_chromebookn22_chromebookc720_chromebookchromebook_11_c740chromebook_2_11education_chromebookchromebook_11_1100-1199chromebook_13_cb5-311chromebox_g1chromebook_14_g3j2_chromebookchromebook_11_2000-2099chromebook_pron6_chromebookchromebook_11_g2chromebook_11_c771chromebasechromebook_kchromebook_14chromebase_22cv241chromebook_14_x000-x999chromebook_14_cb3-431chromebook_c300chromebook_11chromebook_11_2200-2299chromebook_pcm-116t-432bchromebook_2_13trusted_platform_firmwaren20_chromebookchromebook_3chromebook_rchromebook_elb1101chromebook_360idc_chromebookchromebook_15_cb3-531chromebook_11_g5_een42_chromebookchromebase_24chromebook_flip_c100pachromebox_cb1-\(000-099\)chromebook_c200n23_chromebookrsa_librarychromebook_c202sachromebook_11-vxxxnl61_chromebookchromebook_11_model_3180chromebook_cx100chromebook_11_g5chromebook_13_3380chromebit_cs10chromebook_11_n7_c731j4_chromebookchromebook_pichromebook_s2015chromebook_11_g4\/g4_eechromebook_r13_cb5-312takoya_s2013chromebox_cn60chromebook_flip_c302chromebook_11echromebook_c201pachromebook_11_3120chromebook_11_g1chromebook_11_g3proline_chromebookthinkpad_11e_chromebookidc_chromebook_11n23_flex_11_chromebookcmt_chromebookchromebook_11_c735chromebook_mchromebook_11_c771tentry_line_chromebookn/a
  • Previous
  • 1
  • 2
  • Next