Export limit exceeded: 343912 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 343912 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (9070 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-20398 1 Google 1 Android 2024-11-21 7.8 High
In addOrUpdateNetwork of WifiServiceImpl.java, there is a possible way for a guest user to configure Wi-Fi due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-221859734
CVE-2022-20396 1 Google 1 Android 2024-11-21 5.5 Medium
In SettingsActivity.java, there is a possible way to make a device discoverable over Bluetooth, without permission or user interaction, due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-234440688
CVE-2022-20395 1 Google 1 Android 2024-11-21 7.8 High
In checkAccess of MediaProvider.java, there is a possible file deletion due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-221855295
CVE-2022-20394 1 Google 1 Android 2024-11-21 5.0 Medium
In getInputMethodWindowVisibleHeight of InputMethodManagerService.java, there is a possible way to determine when another app is showing an IME due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-204906124
CVE-2022-20393 1 Google 1 Android 2024-11-21 5.5 Medium
In extract3GPPGlobalDescriptions of TextDescriptions.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure from the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-233735886
CVE-2022-20391 1 Google 1 Android 2024-11-21 9.8 Critical
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257000
CVE-2022-20390 1 Google 1 Android 2024-11-21 9.8 Critical
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257002
CVE-2022-20387 1 Google 1 Android 2024-11-21 9.8 Critical
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227324
CVE-2022-20386 1 Google 1 Android 2024-11-21 9.8 Critical
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227328
CVE-2022-20385 1 Google 1 Android 2024-11-21 9.8 Critical
a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819
CVE-2022-20384 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-211727306References: N/A
CVE-2022-20383 1 Google 1 Android 2024-11-21 7.8 High
In AllocateInternalBuffers of g3aa_buffer_allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222408847References: N/A
CVE-2022-20382 1 Google 1 Android 2024-11-21 6.7 Medium
In (TBD) of (TBD), there is a possible out of bounds write due to kernel stack overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-214245176References: Upstream kernel
CVE-2022-20381 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-188935887References: N/A
CVE-2022-20380 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-212625740References: N/A
CVE-2022-20379 1 Google 1 Android 2024-11-21 6.7 Medium
In lwis_buffer_alloc of lwis_buffer.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209436980References: N/A
CVE-2022-20378 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-234657153References: N/A
CVE-2022-20377 1 Google 1 Android 2024-11-21 6.7 Medium
In TBD of keymaster_ipc.cpp, there is a possible to force gatekeeper, fingerprint, and faceauth to use a known HMAC key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222339795References: N/A
CVE-2022-20376 1 Google 1 Android 2024-11-21 6.7 Medium
In trusty_log_seq_start of trusty-log.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216130110References: N/A
CVE-2022-20375 1 Google 1 Android 2024-11-21 7.5 High
In LteRrcNrProAsnDecode of LteRrcNr_Codec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-180956894References: N/A