Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-26456 | 2 Google, Mediatek | 21 Android, Mt6769, Mt6781 and 18 more | 2022-09-08 | N/A | 4.4 MEDIUM |
In vow, there is a possible information disclosure due to a symbolic link following. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545473; Issue ID: ALPS06545473. | |||||
CVE-2022-26455 | 2 Google, Mediatek | 6 Android, Mt6789, Mt6855 and 3 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In gz, there is a possible memory corruption due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07177858; Issue ID: ALPS07177858. | |||||
CVE-2022-26454 | 2 Google, Mediatek | 17 Android, Mt6761, Mt6765 and 14 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In teei, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06664701; Issue ID: ALPS06664701. | |||||
CVE-2022-26453 | 2 Google, Mediatek | 17 Android, Mt6761, Mt6765 and 14 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In teei, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06664675; Issue ID: ALPS06664675. | |||||
CVE-2022-26451 | 2 Google, Mediatek | 8 Android, Mt6789, Mt6855 and 5 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In ged, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07202966; Issue ID: ALPS07202966. | |||||
CVE-2022-26461 | 2 Google, Mediatek | 15 Android, Mt6833, Mt6853 and 12 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In vow, there is a possible undefined behavior due to an API misuse. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032604; Issue ID: ALPS07032604. | |||||
CVE-2022-26460 | 2 Google, Mediatek | 15 Android, Mt6833, Mt6853 and 12 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In vow, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032590; Issue ID: ALPS07032590. | |||||
CVE-2022-26459 | 2 Google, Mediatek | 15 Android, Mt6833, Mt6853 and 12 more | 2022-09-08 | N/A | 4.4 MEDIUM |
In vow, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032634; Issue ID: ALPS07032634. | |||||
CVE-2022-26458 | 2 Google, Mediatek | 12 Android, Mt6853, Mt6855 and 9 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In vow, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032678; Issue ID: ALPS07032678. | |||||
CVE-2022-26457 | 2 Google, Mediatek | 12 Android, Mt6769, Mt6781 and 9 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In vow, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138490; Issue ID: ALPS07138490. | |||||
CVE-2022-26465 | 3 Google, Mediatek, Yoctoproject | 22 Android, Mt6779, Mt6781 and 19 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In audio ipi, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06558799; Issue ID: ALPS06558799. | |||||
CVE-2022-26464 | 2 Google, Mediatek | 15 Android, Mt6833, Mt6853 and 12 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In vow, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032699; Issue ID: ALPS07032699. | |||||
CVE-2022-26463 | 2 Google, Mediatek | 15 Android, Mt6833, Mt6853 and 12 more | 2022-09-08 | N/A | 4.4 MEDIUM |
In vow, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032686; Issue ID: ALPS07032686. | |||||
CVE-2022-26462 | 2 Google, Mediatek | 15 Android, Mt6833, Mt6853 and 12 more | 2022-09-08 | N/A | 4.4 MEDIUM |
In vow, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07032660; Issue ID: ALPS07032660. | |||||
CVE-2022-26466 | 3 Google, Mediatek, Yoctoproject | 24 Android, Mt6779, Mt6781 and 21 more | 2022-09-08 | N/A | 6.7 MEDIUM |
In audio ipi, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06558777; Issue ID: ALPS06558777. | |||||
CVE-2022-36078 | 1 Binary Project | 1 Binary | 2022-09-08 | N/A | 7.5 HIGH |
Binary provides encoding/decoding in Borsh and other formats. The vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program. When using `github.com/gagliardetto/binary` to parse unchecked (or wrong type of) data from untrusted sources of input (e.g. the blockchain) into slices, it's possible to allocate memory with excessive size. When `dec.Decode(&val)` method is used to parse data into a structure that is or contains slices of values, the length of the slice was previously read directly from the data itself without any checks on the size of it, and then a slice was allocated. This could lead to an overflow and an allocation of memory with excessive size value. Users should upgrade to `v0.7.1` or higher. A workaround is not to rely on the `dec.Decode(&val)` function to parse the data, but to use a custom `UnmarshalWithDecoder()` method that reads and checks the length of any slice. | |||||
CVE-2022-30317 | 1 Honeywell | 2 Experion Lx, Experion Lx Firmware | 2022-09-08 | N/A | 9.1 CRITICAL |
Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols' functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices causing denial of service. | |||||
CVE-2022-36071 | 1 Sftpgo Project | 1 Sftpgo | 2022-09-08 | N/A | 8.1 HIGH |
SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used instead of the TOTP. In SFTPGo versions from version 2.2.0 to 2.3.3 recovery codes can be generated before enabling two-factor authentication. An attacker who knows the user's password could potentially generate some recovery codes and then bypass two-factor authentication after it is enabled on the account at a later time. This issue has been fixed in version 2.3.4. Recovery codes can now only be generated after enabling two-factor authentication and are deleted after disabling it. | |||||
CVE-2021-43565 | 1 Golang | 1 Ssh | 2022-09-08 | N/A | 7.5 HIGH |
The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server. | |||||
CVE-2021-36829 | 1 Mythemeshop | 1 Launcher | 2022-09-08 | N/A | 4.8 MEDIUM |
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in MyThemeShop Launcher: Coming Soon & Maintenance Mode plugin <= 1.0.11 at WordPress. |