Filtered by vendor Google
Subscriptions
Filtered by product Android
Subscriptions
Total
8774 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-20396 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
| In SettingsActivity.java, there is a possible way to make a device discoverable over Bluetooth, without permission or user interaction, due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-234440688 | ||||
| CVE-2022-20395 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In checkAccess of MediaProvider.java, there is a possible file deletion due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-221855295 | ||||
| CVE-2022-20394 | 1 Google | 1 Android | 2024-11-21 | 5.0 Medium |
| In getInputMethodWindowVisibleHeight of InputMethodManagerService.java, there is a possible way to determine when another app is showing an IME due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-204906124 | ||||
| CVE-2022-20393 | 1 Google | 1 Android | 2024-11-21 | 5.5 Medium |
| In extract3GPPGlobalDescriptions of TextDescriptions.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure from the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-233735886 | ||||
| CVE-2022-20391 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257000 | ||||
| CVE-2022-20390 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257002 | ||||
| CVE-2022-20387 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227324 | ||||
| CVE-2022-20386 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227328 | ||||
| CVE-2022-20385 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819 | ||||
| CVE-2022-20384 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-211727306References: N/A | ||||
| CVE-2022-20383 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In AllocateInternalBuffers of g3aa_buffer_allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222408847References: N/A | ||||
| CVE-2022-20382 | 1 Google | 1 Android | 2024-11-21 | 6.7 Medium |
| In (TBD) of (TBD), there is a possible out of bounds write due to kernel stack overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-214245176References: Upstream kernel | ||||
| CVE-2022-20381 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-188935887References: N/A | ||||
| CVE-2022-20380 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-212625740References: N/A | ||||
| CVE-2022-20379 | 1 Google | 1 Android | 2024-11-21 | 6.7 Medium |
| In lwis_buffer_alloc of lwis_buffer.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209436980References: N/A | ||||
| CVE-2022-20378 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-234657153References: N/A | ||||
| CVE-2022-20377 | 1 Google | 1 Android | 2024-11-21 | 6.7 Medium |
| In TBD of keymaster_ipc.cpp, there is a possible to force gatekeeper, fingerprint, and faceauth to use a known HMAC key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222339795References: N/A | ||||
| CVE-2022-20376 | 1 Google | 1 Android | 2024-11-21 | 6.7 Medium |
| In trusty_log_seq_start of trusty-log.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216130110References: N/A | ||||
| CVE-2022-20375 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| In LteRrcNrProAsnDecode of LteRrcNr_Codec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-180956894References: N/A | ||||
| CVE-2022-20373 | 1 Google | 1 Android | 2024-11-21 | 6.4 Medium |
| In st21nfc_loc_set_polaritymode of fc/st21nfc.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208269510References: N/A | ||||