Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-20300 | 1 Google | 1 Android | 2022-08-15 | N/A | 5.5 MEDIUM |
In Content, there is a possible way to check if the given account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200956588 | |||||
CVE-2022-20299 | 1 Google | 1 Android | 2022-08-15 | N/A | 5.5 MEDIUM |
In ContentService, there is a possible way to check if the given account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201415895 | |||||
CVE-2022-20298 | 1 Google | 1 Android | 2022-08-15 | N/A | 5.5 MEDIUM |
In ContentService, there is a possible way to check if an account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201416182 | |||||
CVE-2022-20297 | 1 Google | 1 Android | 2022-08-15 | N/A | 7.8 HIGH |
In Settings, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201561699 | |||||
CVE-2022-20304 | 1 Google | 1 Android | 2022-08-15 | N/A | 5.5 MEDIUM |
In Content, there is a possible way to determinate the user's account due to side channel information disclosure. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199751919 | |||||
CVE-2022-20303 | 1 Google | 1 Android | 2022-08-15 | N/A | 5.5 MEDIUM |
In ContentService, there is a possible way to determine if an account is on the device without GET_ACCOUNTS permission due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200573021 | |||||
CVE-2022-20302 | 1 Google | 1 Android | 2022-08-15 | N/A | 7.6 HIGH |
In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457 | |||||
CVE-2022-20308 | 1 Google | 1 Android | 2022-08-15 | N/A | 7.5 HIGH |
In hostapd, there is a possible insecure configuration due to an insecure default value. This could lead to remote denial of service of the wifi hotspot with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-197874458 | |||||
CVE-2022-20307 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
In AlarmManagerService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-198782887 | |||||
CVE-2022-20306 | 1 Google | 1 Android | 2022-08-15 | N/A | 6.7 MEDIUM |
In Camera Provider HAL, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199680794 | |||||
CVE-2022-20305 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
In ContentService, there is a possible disclosure of available account types due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199751623 | |||||
CVE-2022-20309 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
In PackageInstaller, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-194694094 | |||||
CVE-2022-20311 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
In Telecomm, there is a possible disclosure of registered self managed phone accounts due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-192663553 | |||||
CVE-2022-20310 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
In Telecomm, there is a possible disclosure of registered self managed phone accounts due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-192663798 | |||||
CVE-2022-20312 | 1 Google | 1 Android | 2022-08-15 | N/A | 5.5 MEDIUM |
In WifiP2pManager, there is a possible toobtain WiFi P2P MAC address without user consent due to missing permission check. This could lead to local information disclosure without additional execution privileges needed. User interaction is not needed forexploitationProduct: AndroidVersions: Android-13Android ID: A-192244925 | |||||
CVE-2022-20314 | 1 Google | 1 Android | 2022-08-15 | N/A | 6.7 MEDIUM |
In KeyChain, there is a possible spoof keychain chooser activity request due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-191876118 | |||||
CVE-2022-20313 | 1 Google | 1 Android | 2022-08-15 | N/A | 6.8 MEDIUM |
In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-192206329 | |||||
CVE-2022-20315 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
In ActivityManager, there is a possible disclosure of installed packages due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-191058227 | |||||
CVE-2022-20316 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
In ContentResolver, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-190726121 | |||||
CVE-2021-28511 | 1 Arista | 16 7050cx3-32s, 7050cx3m-32s, 7050sx3-48c8 and 13 more | 2022-08-15 | N/A | 6.5 MEDIUM |
This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches the packet flow. This could allow a host with an IP address in a range that matches the range allowed by a NAT ACL and a range denied by a Security ACL to be forwarded incorrectly as it should have been denied by the Security ACL. This can enable an ACL bypass. |