Vulnerabilities (CVE)

Filtered by CWE-269
Total 2812 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-0578 1 Intel 2 Compute Module Mfs2600ki, Compute Module Mfs2600ki Firmware 2024-11-21 5.8 MEDIUM 8.8 HIGH
Improper conditions check for Intel(R) Modular Server MFS2600KISPP Compute Module may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2020-0577 1 Intel 2 Compute Module Mfs2600ki, Compute Module Mfs2600ki Firmware 2024-11-21 5.8 MEDIUM 8.8 HIGH
Insufficient control flow for Intel(R) Modular Server MFS2600KISPP Compute Module may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2020-0566 1 Intel 1 Trusted Execution Engine Firmware 2024-11-21 4.6 MEDIUM 6.8 MEDIUM
Improper Access Control in subsystem for Intel(R) TXE versions before 3.175 and 4.0.25 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
CVE-2020-0563 1 Intel 1 Manycore Platform Software Stack 2024-11-21 4.6 MEDIUM 7.8 HIGH
Improper permissions in the installer for Intel(R) MPSS before version 3.8.6 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2020-0557 1 Intel 12 Dual Band Wireless-ac 3165, Dual Band Wireless-ac 3168, Dual Band Wireless-ac 7265 \(rev D\) and 9 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Insecure inherited permissions in Intel(R) PROSet/Wireless WiFi products before version 21.70 on Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2020-0520 1 Intel 1 Graphics Driver 2024-11-21 4.6 MEDIUM 7.8 HIGH
Path traversal in igdkmd64.sys for Intel(R) Graphics Drivers before versions 15.45.30.5103, 15.40.44.5107, 15.36.38.5117 and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.
CVE-2020-0519 1 Intel 1 Graphics Driver 2024-11-21 4.6 MEDIUM 7.8 HIGH
Improper access control for Intel(R) Graphics Drivers before versions 15.33.49.5100 and 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.
CVE-2020-0471 1 Google 1 Android 2024-11-21 7.5 HIGH 9.8 CRITICAL
In reassemble_and_dispatch of packet_fragmenter.cc, there is a possible way to inject packets into an encrypted Bluetooth connection due to improper input validation. This could lead to remote escalation of privilege between two Bluetooth devices by a proximal attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-169327567.
CVE-2020-0444 1 Google 1 Android 2024-11-21 7.2 HIGH 7.8 HIGH
In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel
CVE-2020-0404 2 Google, Oracle 4 Android, Communications Cloud Native Core Binding Support Function, Communications Cloud Native Core Network Exposure Function and 1 more 2024-11-21 4.9 MEDIUM 5.5 MEDIUM
In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel
CVE-2020-0403 1 Google 1 Android 2024-11-21 7.2 HIGH 6.7 MEDIUM
In the FPC TrustZone fingerprint App, there is a possible invalid command handler due to an exposed test feature. This could lead to local escalation of privilege in the TEE, with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-131252923
CVE-2020-0394 1 Google 1 Android 2024-11-21 7.2 HIGH 7.8 HIGH
In onCreate of BluetoothPairingDialog.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege and untrusted devices accessing contact lists with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155648639
CVE-2020-0391 1 Google 1 Android 2024-11-21 7.2 HIGH 7.8 HIGH
In applyPolicy of PackageManagerService.java, there is possible arbitrary command execution as System due to an unenforced protected-broadcast. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-158570769
CVE-2020-0387 1 Google 1 Android 2024-11-21 9.3 HIGH 7.8 HIGH
In manifest files of the SmartSpace package, there is a possible tapjacking vector due to a missing permission check. This could lead to local escalation of privilege and account hijacking with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-156046804
CVE-2020-0386 1 Google 1 Android 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
In onCreate of RequestPermissionActivity.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege allowing an attacker to set Bluetooth discoverability with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155650356
CVE-2020-0366 1 Google 1 Android 2024-11-21 6.8 MEDIUM 7.8 HIGH
In PackageInstaller, there is a possible permissions bypass due to a tapjacking vulnerability. This could lead to local escalation of privilege using an app set as the default Assist app with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-138443815
CVE-2020-0360 1 Google 1 Android 2024-11-21 6.8 MEDIUM 7.8 HIGH
In Notification Access Confirmation, there is a possible permissions bypass due to uninformed consent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-145129456
CVE-2020-0306 1 Google 1 Android 2024-11-21 4.6 MEDIUM 7.8 HIGH
In LLVM, there is a possible ineffective stack cookie placement due to stack frame double reservation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-139666480
CVE-2020-0263 1 Google 1 Android 2024-11-21 2.1 LOW 5.5 MEDIUM
In the Accessibility service, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154913130
CVE-2020-0261 1 Google 1 Android 2024-11-21 7.2 HIGH 7.8 HIGH
In C2 flame devices, there is a possible bypass of seccomp due to a missing configuration file. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-146059841