Vulnerabilities (CVE)

Filtered by vendor Google Subscribe
Filtered by product Android
Total 8312 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-20392 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In declareDuplicatePermission of ParsedPermissionUtils.java, there is a possible way to obtain a dangerous permission without user consent due to improper input validation. This could lead to local escalation of privilege during app installation or upgrade with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-213323615
CVE-2022-20391 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257000
CVE-2022-20390 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257002
CVE-2022-20389 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257004
CVE-2022-20388 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227323
CVE-2022-20387 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227324
CVE-2022-20386 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227328
CVE-2022-20385 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819
CVE-2022-20384 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-211727306References: N/A
CVE-2022-20383 1 Google 1 Android 2024-11-21 N/A 7.8 HIGH
In AllocateInternalBuffers of g3aa_buffer_allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222408847References: N/A
CVE-2022-20382 1 Google 1 Android 2024-11-21 N/A 6.7 MEDIUM
In (TBD) of (TBD), there is a possible out of bounds write due to kernel stack overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-214245176References: Upstream kernel
CVE-2022-20381 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-188935887References: N/A
CVE-2022-20380 1 Google 1 Android 2024-11-21 N/A 7.5 HIGH
Product: AndroidVersions: Android kernelAndroid ID: A-212625740References: N/A
CVE-2022-20379 1 Google 1 Android 2024-11-21 N/A 6.7 MEDIUM
In lwis_buffer_alloc of lwis_buffer.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209436980References: N/A
CVE-2022-20378 1 Google 1 Android 2024-11-21 N/A 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-234657153References: N/A
CVE-2022-20377 1 Google 1 Android 2024-11-21 N/A 6.7 MEDIUM
In TBD of keymaster_ipc.cpp, there is a possible to force gatekeeper, fingerprint, and faceauth to use a known HMAC key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222339795References: N/A
CVE-2022-20376 1 Google 1 Android 2024-11-21 N/A 6.7 MEDIUM
In trusty_log_seq_start of trusty-log.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216130110References: N/A
CVE-2022-20375 1 Google 1 Android 2024-11-21 N/A 7.5 HIGH
In LteRrcNrProAsnDecode of LteRrcNr_Codec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-180956894References: N/A
CVE-2022-20373 1 Google 1 Android 2024-11-21 N/A 6.4 MEDIUM
In st21nfc_loc_set_polaritymode of fc/st21nfc.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208269510References: N/A
CVE-2022-20372 1 Google 1 Android 2024-11-21 N/A 6.7 MEDIUM
In exynos5_i2c_irq of (TBD), there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195480799References: N/A