Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:24 |
CVE-2022-44499 (lien direct) |
Adobe Illustrator versions 26.5.1 (and earlier), and 27.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Vulnerability
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:24 |
CVE-2022-44498 (lien direct) |
Adobe Illustrator versions 26.5.1 (and earlier), and 27.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Vulnerability
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:24 |
CVE-2022-42543 (lien direct) |
In fdt_path_offset_namelen of fdt_ro.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-249998113References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:24 |
CVE-2022-44502 (lien direct) |
Adobe Illustrator versions 26.5.1 (and earlier), and 27.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Vulnerability
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42519 (lien direct) |
In CdmaBroadcastSmsConfigsRequestData::encode of cdmasmsdata.cpp, there is a possible stack clash leading to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242540694References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42532 (lien direct) |
In Pixel firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242332610References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42531 (lien direct) |
In mmu_map_for_fw of gs_ldfw_load.c, there is a possible mitigation bypass due to Permissive Memory Allocation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-231500967References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42530 (lien direct) |
In Pixel firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242331893References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42527 (lien direct) |
In cd_SsParseMsg of cd_SsCodec.c, there is a possible crash due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244448906References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42526 (lien direct) |
In ConvertUtf8ToUcs2 of radio_hal_utils.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243509880References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42525 (lien direct) |
In fillSetupDataCallInfo_V1_6 of ril_service_1_6.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243509750References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42524 (lien direct) |
In sms_GetTpUdlIe of sms_PduCodec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243401445References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42523 (lien direct) |
In fillSetupDataCallInfo_V1_6 of ril_service_1_6.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243376893References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42522 (lien direct) |
In DoSetCarrierConfig of miscservice.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130038References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42521 (lien direct) |
In encode of wlandata.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130019References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42520 (lien direct) |
In ServiceInterface::HandleRequest of serviceinterface.cpp, there is a possible use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242994270References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42515 (lien direct) |
In MiscService::DoOemSetRtpPktlossThreshold of miscservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763503References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42514 (lien direct) |
In ProtocolImsBuilder::BuildSetConfig of protocolimsbuilder.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763298References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42518 (lien direct) |
In BroadcastSmsConfigsRequestData::encode of smsdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242536278References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42512 (lien direct) |
In VsimOperationDataExt::encode of vsimdata.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763050References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42517 (lien direct) |
In MiscService::DoOemSetTcsFci of miscservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763682References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42516 (lien direct) |
In ProtocolSimBuilderLegacy::BuildSimGetGbaAuth of protocolsimbuilderlegacy.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763577References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42513 (lien direct) |
In ProtocolEmbmsBuilder::BuildSetSession of protocolembmsbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763204References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:23 |
CVE-2022-42511 (lien direct) |
In EmbmsSessionData::encode of embmsdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241762712References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42509 (lien direct) |
In CallDialReqData::encode of callreqdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241544307References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42343 (lien direct) |
Adobe Campaign version 7.3.1 (and earlier) and 8.3.9 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A low-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction. |
Vulnerability
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42507 (lien direct) |
In ProtocolSimBuilder::BuildSimUpdatePb3gEntry of protocolsimbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241388774References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42505 (lien direct) |
In ProtocolMiscBuilder::BuildSetSignalReportCriteria of protocolmiscbuilder.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241232492References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42510 (lien direct) |
In StringsRequestData::encode of requestdata.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241762656References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42501 (lien direct) |
In HexString2Value of util.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241231403References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42502 (lien direct) |
In FacilityLock::Parse of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241231970References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42506 (lien direct) |
In SimUpdatePbEntry::encode of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241388399References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42503 (lien direct) |
In ProtocolMiscBuilder::BuildSetLinkCapaReportCriteria of protocolmiscbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241231983References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42508 (lien direct) |
In ProtocolCallBuilder::BuildSendUssd of protocolcallbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241388966References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:22 |
CVE-2022-42504 (lien direct) |
In CallDialReqData::encodeCallNumber of callreqdata.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241232209References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20604 (lien direct) |
In SAECOMM_SetDcnIdForPlmn of SAECOMM_DbManagement.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure from a single device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-230463606References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20607 (lien direct) |
In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20610 (lien direct) |
In cellular modem firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-240462530References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20609 (lien direct) |
In Pixel cellular firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239240808References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20605 (lien direct) |
In SAECOMM_CopyBufferBytes of SAECOMM_Utility.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-231722405References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20606 (lien direct) |
In SAEMM_MiningCodecTableWithMsgIE of SAEMM_RadioMessageCodec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233230674References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20600 (lien direct) |
In TBD of TBD, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239847859References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20603 (lien direct) |
In SetDecompContextDb of RohcDeCompContextOfRbId.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219265339References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:21 |
CVE-2022-20608 (lien direct) |
In Pixel cellular firmware, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239239246References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:20 |
CVE-2022-20598 (lien direct) |
In sec_media_protect of media.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege of secure mode MFC Core with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242357514References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:20 |
CVE-2022-20587 (lien direct) |
In ppmp_validate_wsm of drm_fw.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238720411References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:20 |
CVE-2022-20586 (lien direct) |
In valid_out_of_special_sec_dram_addr of drm_access_control.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238718854References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:20 |
CVE-2022-20585 (lien direct) |
In valid_out_of_special_sec_dram_addr of drm_access_control.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238716781References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:20 |
CVE-2022-20588 (lien direct) |
In sysmmu_map of sysmmu.c, there is a possible EoP due to a precondition check failure. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238785915References: N/A |
Guideline
|
|
|
![CVE.webp](./Ressources/img/CVE.webp) |
2022-12-16 16:15:20 |
CVE-2022-20584 (lien direct) |
In page_number of shared_mem.c, there is a possible code execution in secure world due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238366009References: N/A |
Guideline
|
|
|