Export limit exceeded: 348710 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (79889 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-20329 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Wifi, there is a possible way to enable Wifi without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-183410556 | ||||
| CVE-2022-20325 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Media, there is a possible code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-186473060 | ||||
| CVE-2022-20319 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In DreamServices, there is a possible way to launch arbitrary protected activities due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-189574230 | ||||
| CVE-2022-20308 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| In hostapd, there is a possible insecure configuration due to an insecure default value. This could lead to remote denial of service of the wifi hotspot with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-197874458 | ||||
| CVE-2022-20302 | 1 Google | 1 Android | 2024-11-21 | 7.6 High |
| In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457 | ||||
| CVE-2022-20297 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Settings, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201561699 | ||||
| CVE-2022-20292 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Settings, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-202975040 | ||||
| CVE-2022-20286 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Connectivity, there is a possible bypass the restriction of starting activity from background due to a logic error in the code. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230866011 | ||||
| CVE-2022-20283 | 1 Google | 1 Android | 2024-11-21 | 8.8 High |
| In Bluetooth, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233069336 | ||||
| CVE-2022-20282 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In AppWidget, there is a possible way to start an activity from the background due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-204083104 | ||||
| CVE-2022-20281 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Core, there is a possible way to start an activity from the background due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-204083967 | ||||
| CVE-2022-20274 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Keyguard, there is a missing permission check. This could lead to local escalation of privilege and prevention of screen timeout with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-206470146 | ||||
| CVE-2022-20271 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In PermissionController, there is a possible way to grant some permissions without user consent due to misleading or insufficient UI. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-207672635 | ||||
| CVE-2022-20268 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In RestrictionsManager, there is a possible way to send a broadcast that should be restricted to system apps due to a permissions bypass. This could lead to local escalation of privilege on an enterprise managed device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-210468836 | ||||
| CVE-2022-20258 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Bluetooth, there is a possible way to bypass compiler exploit mitigations due to a configuration error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-221893030 | ||||
| CVE-2022-20254 | 1 Google | 1 Android | 2024-11-21 | 8.8 High |
| In Wi-Fi, there is a permissions bypass. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-223377547 | ||||
| CVE-2022-20250 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Messaging, there is a possible way to attach files to a message without proper access checks due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-226134095 | ||||
| CVE-2022-20248 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In Settings, there is a possible way to connect to an open network bypassing DISALLOW_CONFIG_WIFI restriction due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-227619193 | ||||
| CVE-2022-20247 | 1 Google | 1 Android | 2024-11-21 | 7.5 High |
| In Media, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-229858836 | ||||
| CVE-2022-20246 | 1 Google | 1 Android | 2024-11-21 | 7.8 High |
| In WindowManager, there is a possible bypass of the restrictions for starting activities from the background due to an incorrect UID/permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230493191 | ||||