Total
34333 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-20217 | 1 Google | 1 Android | 2024-11-21 | 6.5 Medium |
| There is a unauthorized broadcast in the SprdContactsProvider. A third-party app could use this issue to delete Fdn contact.Product: AndroidVersions: Android SoCAndroid ID: A-232441378 | ||||
| CVE-2022-20216 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| android exported is used to set third-party app access permissions, and the default value of intent-filter is true. com.sprd.firewall has set exported as true.Product: AndroidVersions: Android SoCAndroid ID: A-231911916 | ||||
| CVE-2022-20210 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| The UE and the EMM communicate with each other using NAS messages. When a new NAS message arrives from the EMM, the modem parses it and fills in internal objects based on the received data. A bug in the parsing code could be used by an attacker to remotely crash the modem, which could lead to DoS or RCE.Product: AndroidVersions: Android SoCAndroid ID: A-228868888 | ||||
| CVE-2022-20207 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In static definitions of GattServiceConfig.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-185513714 | ||||
| CVE-2022-20197 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In recycle of Parcel.java, there is a possible way to start foreground activity from background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-208279300 | ||||
| CVE-2022-20194 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In onCreate of ChooseLockGeneric.java, there is a possible permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-222684510 | ||||
| CVE-2022-20193 | 1 Google | 1 Android | 2024-11-21 | 7.3 High |
| In getUniqueUsagesWithLabels of PermissionUsageHelper.java, there is a possible incorrect permission attribution due to a logic error in the code. This could lead to local escalation of privilege by conflating apps with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-212434116 | ||||
| CVE-2022-20192 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In grantEmbeddedWindowFocus of WindowManagerService.java, there is a possible way to change an input channel for embedded hierarchy due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215912712 | ||||
| CVE-2022-20191 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-209324757References: N/A | ||||
| CVE-2022-20190 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-208744915References: N/A | ||||
| CVE-2022-20188 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-207254598References: N/A | ||||
| CVE-2022-20184 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-209153114References: N/A | ||||
| CVE-2022-20181 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-210936609References: N/A | ||||
| CVE-2022-20180 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In several functions of mali_gralloc_reference.cpp, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-212804042References: N/A | ||||
| CVE-2022-20179 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-211683760References: N/A | ||||
| CVE-2022-20177 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-209906686References: N/A | ||||
| CVE-2022-20175 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| Product: AndroidVersions: Android kernelAndroid ID: A-209252491References: N/A | ||||
| CVE-2022-20173 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-207116951References: N/A | ||||
| CVE-2022-20171 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-215565667References: N/A | ||||
| CVE-2022-20170 | 1 Google | 1 Android | 2024-11-21 | 9.8 Critical |
| Product: AndroidVersions: Android kernelAndroid ID: A-209421931References: N/A | ||||