Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by NVD-CWE-noinfo
Total 22706 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-20197 1 Google 1 Android 2022-06-23 4.6 MEDIUM 7.8 HIGH
In recycle of Parcel.java, there is a possible way to start foreground activity from background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-208279300
CVE-2022-20194 1 Google 1 Android 2022-06-23 4.6 MEDIUM 7.8 HIGH
In onCreate of ChooseLockGeneric.java, there is a possible permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-222684510
CVE-2022-20193 1 Google 1 Android 2022-06-23 4.4 MEDIUM 7.3 HIGH
In getUniqueUsagesWithLabels of PermissionUsageHelper.java, there is a possible incorrect permission attribution due to a logic error in the code. This could lead to local escalation of privilege by conflating apps with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-212434116
CVE-2022-20190 1 Google 1 Android 2022-06-23 7.8 HIGH 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-208744915References: N/A
CVE-2022-20191 1 Google 1 Android 2022-06-23 10.0 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-209324757References: N/A
CVE-2022-20192 1 Google 1 Android 2022-06-23 4.6 MEDIUM 7.8 HIGH
In grantEmbeddedWindowFocus of WindowManagerService.java, there is a possible way to change an input channel for embedded hierarchy due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215912712
CVE-2022-20188 1 Google 1 Android 2022-06-23 5.0 MEDIUM 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-207254598References: N/A
CVE-2022-20135 1 Google 1 Android 2022-06-23 7.2 HIGH 7.8 HIGH
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
CVE-2022-20184 1 Google 1 Android 2022-06-23 5.0 MEDIUM 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-209153114References: N/A
CVE-2022-20182 1 Google 1 Android 2022-06-23 2.1 LOW 4.4 MEDIUM
In handle_ramdump of pixel_loader.c, there is a possible way to create a ramdump of non-secure memory due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222348453References: N/A
CVE-2022-20181 1 Google 1 Android 2022-06-23 7.8 HIGH 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-210936609References: N/A
CVE-2022-20179 1 Google 1 Android 2022-06-23 5.0 MEDIUM 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-211683760References: N/A
CVE-2022-20177 1 Google 1 Android 2022-06-23 5.0 MEDIUM 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-209906686References: N/A
CVE-2022-20176 1 Google 1 Android 2022-06-23 2.1 LOW 4.4 MEDIUM
In auth_store of sjtag-driver.c, there is a possible read of uninitialized memory due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-197787879References: N/A
CVE-2022-20175 1 Google 1 Android 2022-06-23 5.0 MEDIUM 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-209252491References: N/A
CVE-2022-20170 1 Google 1 Android 2022-06-23 10.0 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-209421931References: N/A
CVE-2022-20172 1 Google 1 Android 2022-06-23 2.1 LOW 5.5 MEDIUM
In onbind of ShannonRcsService.java, there is a possible access to protect data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206987222References: N/A
CVE-2022-20171 1 Google 1 Android 2022-06-23 10.0 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-215565667References: N/A
CVE-2022-20173 1 Google 1 Android 2022-06-23 10.0 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-207116951References: N/A
CVE-2022-20167 1 Google 1 Android 2022-06-23 10.0 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-204956204References: N/A