Total
22706 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-35290 | 1 Sap | 1 Authenticator | 2022-08-15 | N/A | 7.5 HIGH |
Under certain conditions SAP Authenticator for Android allows an attacker to access information which would otherwise be restricted. | |||||
CVE-2022-20258 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.8 HIGH |
In Bluetooth, there is a possible way to bypass compiler exploit mitigations due to a configuration error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-221893030 | |||||
CVE-2022-20257 | 1 Google | 1 Android | 2022-08-12 | N/A | 3.3 LOW |
In Bluetooth, there is a possible way to pair a display only device without PIN confirmation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-222289114 | |||||
CVE-2022-20370 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-215730643References: N/A | |||||
CVE-2022-20365 | 1 Google | 1 Android | 2022-08-12 | N/A | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-229632566References: N/A | |||||
CVE-2022-20248 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.8 HIGH |
In Settings, there is a possible way to connect to an open network bypassing DISALLOW_CONFIG_WIFI restriction due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-227619193 | |||||
CVE-2022-20245 | 1 Google | 1 Android | 2022-08-12 | N/A | 2.4 LOW |
In WindowManager, there is a possible method to create a recording of the lock screen due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-215005011 | |||||
CVE-2022-20237 | 1 Google | 1 Android | 2022-08-12 | N/A | 9.8 CRITICAL |
In BuildDevIDResponse of miscdatabuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-229621649References: N/A | |||||
CVE-2022-20180 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.8 HIGH |
In several functions of mali_gralloc_reference.cpp, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-212804042References: N/A | |||||
CVE-2022-20381 | 1 Google | 1 Android | 2022-08-12 | N/A | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-188935887References: N/A | |||||
CVE-2022-20408 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-204782372References: N/A | |||||
CVE-2022-20378 | 1 Google | 1 Android | 2022-08-12 | N/A | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-234657153References: N/A | |||||
CVE-2022-20380 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-212625740References: N/A | |||||
CVE-2022-20377 | 1 Google | 1 Android | 2022-08-12 | N/A | 6.7 MEDIUM |
In TBD of keymaster_ipc.cpp, there is a possible to force gatekeeper, fingerprint, and faceauth to use a known HMAC key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222339795References: N/A | |||||
CVE-2022-20384 | 1 Google | 1 Android | 2022-08-12 | N/A | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-211727306References: N/A | |||||
CVE-2022-20407 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-210916981References: N/A | |||||
CVE-2022-20406 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-184676385References: N/A | |||||
CVE-2022-20403 | 1 Google | 1 Android | 2022-08-12 | N/A | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-207975764References: N/A | |||||
CVE-2022-20402 | 1 Google | 1 Android | 2022-08-12 | N/A | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-218701042References: N/A | |||||
CVE-2022-20404 | 1 Google | 1 Android | 2022-08-12 | N/A | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-205714161References: N/A |