Total
7761 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2022-20297 | 1 Google | 1 Android | 2022-08-15 | N/A | 7.8 HIGH |
| In Settings, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201561699 | |||||
| CVE-2022-20302 | 1 Google | 1 Android | 2022-08-15 | N/A | 7.6 HIGH |
| In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457 | |||||
| CVE-2022-20304 | 1 Google | 1 Android | 2022-08-15 | N/A | 5.5 MEDIUM |
| In Content, there is a possible way to determinate the user's account due to side channel information disclosure. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199751919 | |||||
| CVE-2022-20306 | 1 Google | 1 Android | 2022-08-15 | N/A | 6.7 MEDIUM |
| In Camera Provider HAL, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199680794 | |||||
| CVE-2022-20307 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
| In AlarmManagerService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-198782887 | |||||
| CVE-2022-20308 | 1 Google | 1 Android | 2022-08-15 | N/A | 7.5 HIGH |
| In hostapd, there is a possible insecure configuration due to an insecure default value. This could lead to remote denial of service of the wifi hotspot with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-197874458 | |||||
| CVE-2022-20309 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
| In PackageInstaller, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-194694094 | |||||
| CVE-2022-20313 | 1 Google | 1 Android | 2022-08-15 | N/A | 6.8 MEDIUM |
| In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-192206329 | |||||
| CVE-2022-20314 | 1 Google | 1 Android | 2022-08-15 | N/A | 6.7 MEDIUM |
| In KeyChain, there is a possible spoof keychain chooser activity request due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-191876118 | |||||
| CVE-2022-20316 | 1 Google | 1 Android | 2022-08-15 | N/A | 3.3 LOW |
| In ContentResolver, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-190726121 | |||||
| CVE-2022-20258 | 1 Google | 1 Android | 2022-08-13 | N/A | 7.8 HIGH |
| In Bluetooth, there is a possible way to bypass compiler exploit mitigations due to a configuration error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-221893030 | |||||
| CVE-2022-20257 | 1 Google | 1 Android | 2022-08-13 | N/A | 3.3 LOW |
| In Bluetooth, there is a possible way to pair a display only device without PIN confirmation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-222289114 | |||||
| CVE-2022-20266 | 1 Google | 1 Android | 2022-08-13 | N/A | 5.0 MEDIUM |
| In Companion, there is a possible way to keep a service running with elevated importance without showing foreground service notification due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-211757348 | |||||
| CVE-2022-20370 | 1 Google | 1 Android | 2022-08-13 | N/A | 7.5 HIGH |
| Product: AndroidVersions: Android kernelAndroid ID: A-215730643References: N/A | |||||
| CVE-2022-20367 | 1 Google | 1 Android | 2022-08-13 | N/A | 6.7 MEDIUM |
| In construct_transaction of lwis_ioctl.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-225877459References: N/A | |||||
| CVE-2022-20366 | 1 Google | 1 Android | 2022-08-13 | N/A | 6.7 MEDIUM |
| In ioctl_dpm_clk_update of lwis_ioctl.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-225877745References: N/A | |||||
| CVE-2022-20365 | 1 Google | 1 Android | 2022-08-13 | N/A | 9.8 CRITICAL |
| Product: AndroidVersions: Android kernelAndroid ID: A-229632566References: N/A | |||||
| CVE-2022-20252 | 1 Google | 1 Android | 2022-08-13 | N/A | 3.3 LOW |
| In PackageManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224547584 | |||||
| CVE-2022-20251 | 1 Google | 1 Android | 2022-08-13 | N/A | 3.3 LOW |
| In LocaleManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-225881167 | |||||
| CVE-2022-20249 | 1 Google | 1 Android | 2022-08-13 | N/A | 3.3 LOW |
| In LocaleManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-226900861 | |||||
