Export limit exceeded: 348021 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 348021 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 35015 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (35015 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-20175 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-209252491References: N/A | ||||
| CVE-2022-20173 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-207116951References: N/A | ||||
| CVE-2022-20171 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-215565667References: N/A | ||||
| CVE-2022-20170 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-209421931References: N/A | ||||
| CVE-2022-20169 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-211162353References: N/A | ||||
| CVE-2022-20168 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-210594998References: N/A | ||||
| CVE-2022-20167 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-204956204References: N/A | ||||
| CVE-2022-20164 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-204891956References: N/A | ||||
| CVE-2022-20160 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-210083655References: N/A | ||||
| CVE-2022-20151 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-210712565References: N/A | ||||
| CVE-2022-20149 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-211685939References: N/A | ||||
| CVE-2022-20142 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962 | ||||
| CVE-2022-20135 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465 | ||||
| CVE-2022-20124 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036 | ||||
| CVE-2022-20120 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-203213034References: N/A | ||||
| CVE-2022-20116 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In onEntryUpdated of OngoingCallController.kt, it is possible to launch non-exported activities due to intent redirection. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-212467440 | ||||
| CVE-2022-20113 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In mPreference of DefaultUsbConfigurationPreferenceController.java, there is a possible way to enable file transfer mode due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-205996517 | ||||
| CVE-2022-20005 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In validateApkInstallLocked of PackageInstallerSession.java, there is a way to force a mismatch between running code and a parsed APK . This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-219044664 | ||||
| CVE-2022-1999 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 3.1 Low |
| An issue has been discovered in GitLab CE/EE affecting all versions from 8.13 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. Under certain conditions, using the REST API an unprivileged user was able to change labels description. | ||||
| CVE-2022-1975 | 1 Linux | 1 Linux Kernel | 2024-11-21 | 5.5 Medium |
| There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space. | ||||