‼ CVE-2022-20306 ‼
📖 Read
via "National Vulnerability Database".
In Camera Provider HAL, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199680794📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20323 ‼
📖 Read
via "National Vulnerability Database".
In PackageManager, there is a possible package installation disclosure due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-187176203📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20321 ‼
📖 Read
via "National Vulnerability Database".
In Settings, there is a possible way for an application without permissions to read content of WiFi QR codes due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-187176859📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28628 ‼
📖 Read
via "National Vulnerability Database".
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-37042 ‼
📖 Read
via "National Vulnerability Database".
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20293 ‼
📖 Read
via "National Vulnerability Database".
In LauncherApps, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-202298672📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28627 ‼
📖 Read
via "National Vulnerability Database".
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28633 ‼
📖 Read
via "National Vulnerability Database".
A local disclosure of sensitive information and a local unauthorized data modification vulnerability were discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. An unprivileged user could locally exploit this vulnerability to read and write to the iLO 5 firmware file system resulting in a complete loss of confidentiality and a partial loss of integrity and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20302 ‼
📖 Read
via "National Vulnerability Database".
In Settings, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200746457📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20327 ‼
📖 Read
via "National Vulnerability Database".
In Wi-Fi, there is a possible way to retrieve the WiFi SSID without location permissions due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-185126813📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20274 ‼
📖 Read
via "National Vulnerability Database".
In Keyguard, there is a missing permission check. This could lead to local escalation of privilege and prevention of screen timeout with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-206470146📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20339 ‼
📖 Read
via "National Vulnerability Database".
In Android, there is a possible access of network neighbor table information due to an insecure SEpolicy configuration. This could lead to local information disclosure of network topography with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-171572148📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20275 ‼
📖 Read
via "National Vulnerability Database".
In DevicePolicyManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-205836975📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20305 ‼
📖 Read
via "National Vulnerability Database".
In ContentService, there is a possible disclosure of available account types due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199751623📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20333 ‼
📖 Read
via "National Vulnerability Database".
In Bluetooth, there is a possible crash due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-179161657📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20328 ‼
📖 Read
via "National Vulnerability Database".
In PackageManager, there is a possible way to determine whether an app is installed due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-184948501📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20317 ‼
📖 Read
via "National Vulnerability Database".
In SystemUI, there is a possible way to unexpectedly enable the external speaker due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-190199063📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20297 ‼
📖 Read
via "National Vulnerability Database".
In Settings, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201561699📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28629 ‼
📖 Read
via "National Vulnerability Database".
A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A low privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5).📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-20290 ‼
📖 Read
via "National Vulnerability Database".
In Midi, there is a possible way to learn about private midi devices due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-203549963📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-20308 ‼
📖 Read
via "National Vulnerability Database".
In hostapd, there is a possible insecure configuration due to an insecure default value. This could lead to remote denial of service of the wifi hotspot with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-197874458📖 Read
via "National Vulnerability Database".
👍2