Vulnerabilities > Google > Android > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-15 | CVE-2022-20146 | Unspecified vulnerability in Google Android In uploadFile of FileUploadServiceImpl.java, there is a possible incorrect file access due to a confused deputy. | 2.1 |
2022-06-15 | CVE-2022-20172 | Unspecified vulnerability in Google Android In onbind of ShannonRcsService.java, there is a possible access to protect data due to a missing permission check. | 2.1 |
2022-06-15 | CVE-2022-20174 | Out-of-bounds Read vulnerability in Google Android In exynos_secEnv_init of mach-gs101.c, there is a possible out of bounds read due to an incorrect bounds check. | 2.1 |
2022-06-15 | CVE-2022-20176 | Unspecified vulnerability in Google Android In auth_store of sjtag-driver.c, there is a possible read of uninitialized memory due to a missing bounds check. | 2.1 |
2022-06-15 | CVE-2022-20182 | Unspecified vulnerability in Google Android In handle_ramdump of pixel_loader.c, there is a possible way to create a ramdump of non-secure memory due to a missing permission check. | 2.1 |
2022-06-15 | CVE-2022-20195 | Deserialization of Untrusted Data vulnerability in Google Android 12.1 In the keystore library, there is a possible prevention of access to system Settings due to unsafe deserialization. | 1.9 |
2022-06-15 | CVE-2022-20196 | Unspecified vulnerability in Google Android 12.1 In gallery3d and photos, there is a possible permission bypass due to a confused deputy. local google | 1.9 |
2022-06-15 | CVE-2022-20198 | Out-of-bounds Read vulnerability in Google Android 12.1 In llcp_dlc_proc_connect_pdu of llcp_dlc.cc, there is a possible out of bounds read due to a missing bounds check. | 2.1 |
2022-06-15 | CVE-2022-20200 | Unspecified vulnerability in Google Android 12.1 In updateApState of SoftApManager.java, there is a possible leak of hotspot state due to a missing permission check. | 2.1 |
2022-06-15 | CVE-2022-20205 | Improper Input Validation vulnerability in Google Android 12.1 In isFileUri of FileUtil.java, there is a possible way to bypass the check for a file:// scheme due to improper input validation. | 2.1 |