Filtered by NVD-CWE-noinfo
Total 34333 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-20217 1 Google 1 Android 2024-11-21 6.5 Medium
There is a unauthorized broadcast in the SprdContactsProvider. A third-party app could use this issue to delete Fdn contact.Product: AndroidVersions: Android SoCAndroid ID: A-232441378
CVE-2022-20216 1 Google 1 Android 2024-11-21 9.8 Critical
android exported is used to set third-party app access permissions, and the default value of intent-filter is true. com.sprd.firewall has set exported as true.Product: AndroidVersions: Android SoCAndroid ID: A-231911916
CVE-2022-20210 1 Google 1 Android 2024-11-21 9.8 Critical
The UE and the EMM communicate with each other using NAS messages. When a new NAS message arrives from the EMM, the modem parses it and fills in internal objects based on the received data. A bug in the parsing code could be used by an attacker to remotely crash the modem, which could lead to DoS or RCE.Product: AndroidVersions: Android SoCAndroid ID: A-228868888
CVE-2022-20207 1 Google 1 Android 2024-11-21 7.8 High
In static definitions of GattServiceConfig.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-185513714
CVE-2022-20197 1 Google 1 Android 2024-11-21 7.8 High
In recycle of Parcel.java, there is a possible way to start foreground activity from background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-208279300
CVE-2022-20194 1 Google 1 Android 2024-11-21 7.8 High
In onCreate of ChooseLockGeneric.java, there is a possible permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-222684510
CVE-2022-20193 1 Google 1 Android 2024-11-21 7.3 High
In getUniqueUsagesWithLabels of PermissionUsageHelper.java, there is a possible incorrect permission attribution due to a logic error in the code. This could lead to local escalation of privilege by conflating apps with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-212434116
CVE-2022-20192 1 Google 1 Android 2024-11-21 7.8 High
In grantEmbeddedWindowFocus of WindowManagerService.java, there is a possible way to change an input channel for embedded hierarchy due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215912712
CVE-2022-20191 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-209324757References: N/A
CVE-2022-20190 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-208744915References: N/A
CVE-2022-20188 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-207254598References: N/A
CVE-2022-20184 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-209153114References: N/A
CVE-2022-20181 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-210936609References: N/A
CVE-2022-20180 1 Google 1 Android 2024-11-21 7.8 High
In several functions of mali_gralloc_reference.cpp, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-212804042References: N/A
CVE-2022-20179 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-211683760References: N/A
CVE-2022-20177 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-209906686References: N/A
CVE-2022-20175 1 Google 1 Android 2024-11-21 7.5 High
Product: AndroidVersions: Android kernelAndroid ID: A-209252491References: N/A
CVE-2022-20173 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-207116951References: N/A
CVE-2022-20171 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-215565667References: N/A
CVE-2022-20170 1 Google 1 Android 2024-11-21 9.8 Critical
Product: AndroidVersions: Android kernelAndroid ID: A-209421931References: N/A