Google Pixel

CPE Details

Google Pixel
-
2017-01-12
17h14 +00:00
2021-08-06
13h03 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:google:pixel:-:*:*:*:*:*:*:*

Informations

Vendor

google

Product

pixel

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-47022 2024-10-25 10h34 +00:00 Android before 2024-10-05 on Google Pixel devices allows information disclosure in the ACPM component, A-331255656.
7.5
High
CVE-2024-47020 2024-10-25 10h34 +00:00 Android before 2024-10-05 on Google Pixel devices allows information disclosure in the ABL component, A-331966488.
7.5
High
CVE-2024-44100 2024-10-25 10h34 +00:00 Android before 2024-10-05 on Google Pixel devices allows information disclosure in the modem component, A-299774545.
7.5
High
CVE-2024-29748 2024-04-05 20h02 +00:00 there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
7.8
High
CVE-2023-4164 2024-01-02 21h20 +00:00 There is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of health data with no additional execution privileges needed.
8.4
High
CVE-2016-5346 2020-01-08 17h39 +00:00 An Information Disclosure vulnerability exists in the Google Pixel/Pixel SL Qualcomm Avtimer Driver due to a NULL pointer dereference when processing an accept system call by the user process on AF_MSM_IPC sockets, which could let a local malicious user obtain sensitive information (Android Bug ID A-32551280).
5.5
Medium
CVE-2017-15361 2017-10-16 15h00 +00:00 The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.
5.9
Medium