Filtered by vendor Google
Subscribe
Total
10294 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-20209 | 1 Google | 1 Android | 2022-06-23 | 5.0 MEDIUM | 7.5 HIGH |
In hme_add_new_node_to_a_sorted_array of hme_utils.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-207502397 | |||||
CVE-2022-20208 | 1 Google | 1 Android | 2022-06-23 | 2.1 LOW | 4.4 MEDIUM |
In parseRecursively of cppbor_parse.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-192743373 | |||||
CVE-2022-20207 | 1 Google | 1 Android | 2022-06-23 | 4.6 MEDIUM | 7.8 HIGH |
In static definitions of GattServiceConfig.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-185513714 | |||||
CVE-2022-20206 | 1 Google | 1 Android | 2022-06-23 | 2.1 LOW | 5.5 MEDIUM |
In setPackageOrComponentEnabled of NotificationManagerService.java, there is a missing permission check. This could lead to local information disclosure about enabled notification listeners with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-220737634 | |||||
CVE-2022-20205 | 1 Google | 1 Android | 2022-06-23 | 2.1 LOW | 5.5 MEDIUM |
In isFileUri of FileUtil.java, there is a possible way to bypass the check for a file:// scheme due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215212561 | |||||
CVE-2022-20204 | 1 Google | 1 Android | 2022-06-23 | 4.6 MEDIUM | 7.8 HIGH |
In registerRemoteBugreportReceivers of DevicePolicyManagerService.java, there is a possible reporting of falsified bug reports due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-171495100 | |||||
CVE-2022-20202 | 1 Google | 1 Android | 2022-06-23 | 4.3 MEDIUM | 6.5 MEDIUM |
In ih264_resi_trans_quant_4x4_sse42 of ih264_resi_trans_quant_sse42.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-204704614 | |||||
CVE-2022-20201 | 1 Google | 1 Android | 2022-06-23 | 4.6 MEDIUM | 6.7 MEDIUM |
In getAppSize of InstalldNativeService.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-220733817 | |||||
CVE-2022-20200 | 1 Google | 1 Android | 2022-06-23 | 2.1 LOW | 5.5 MEDIUM |
In updateApState of SoftApManager.java, there is a possible leak of hotspot state due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-212695058 | |||||
CVE-2022-20198 | 1 Google | 1 Android | 2022-06-23 | 2.1 LOW | 4.4 MEDIUM |
In llcp_dlc_proc_connect_pdu of llcp_dlc.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure from the NFC stack with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-221851879 | |||||
CVE-2022-20197 | 1 Google | 1 Android | 2022-06-23 | 4.6 MEDIUM | 7.8 HIGH |
In recycle of Parcel.java, there is a possible way to start foreground activity from background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-208279300 | |||||
CVE-2022-20195 | 1 Google | 1 Android | 2022-06-23 | 1.9 LOW | 5.0 MEDIUM |
In the keystore library, there is a possible prevention of access to system Settings due to unsafe deserialization. This could lead to local denial of service with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-213172664 | |||||
CVE-2022-20196 | 1 Google | 1 Android | 2022-06-23 | 1.9 LOW | 5.0 MEDIUM |
In gallery3d and photos, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-201535148 | |||||
CVE-2022-20193 | 1 Google | 1 Android | 2022-06-23 | 4.4 MEDIUM | 7.3 HIGH |
In getUniqueUsagesWithLabels of PermissionUsageHelper.java, there is a possible incorrect permission attribution due to a logic error in the code. This could lead to local escalation of privilege by conflating apps with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-212434116 | |||||
CVE-2022-20194 | 1 Google | 1 Android | 2022-06-23 | 4.6 MEDIUM | 7.8 HIGH |
In onCreate of ChooseLockGeneric.java, there is a possible permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-222684510 | |||||
CVE-2022-20188 | 1 Google | 1 Android | 2022-06-23 | 5.0 MEDIUM | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-207254598References: N/A | |||||
CVE-2022-20191 | 1 Google | 1 Android | 2022-06-23 | 10.0 HIGH | 9.8 CRITICAL |
Product: AndroidVersions: Android kernelAndroid ID: A-209324757References: N/A | |||||
CVE-2022-20190 | 1 Google | 1 Android | 2022-06-23 | 7.8 HIGH | 7.5 HIGH |
Product: AndroidVersions: Android kernelAndroid ID: A-208744915References: N/A | |||||
CVE-2022-20192 | 1 Google | 1 Android | 2022-06-23 | 4.6 MEDIUM | 7.8 HIGH |
In grantEmbeddedWindowFocus of WindowManagerService.java, there is a possible way to change an input channel for embedded hierarchy due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215912712 | |||||
CVE-2022-20135 | 1 Google | 1 Android | 2022-06-23 | 7.2 HIGH | 7.8 HIGH |
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465 |