Update Sat May 25 21:48:12 CEST 2024

This commit is contained in:
marc 2024-05-25 21:48:12 +02:00
parent de43d9a631
commit 555e9c7de4
43928 changed files with 856940 additions and 73914 deletions

BIN
.DS_Store vendored Normal file

Binary file not shown.

31
2020/CVE-2020-0001.md Normal file
View File

@ -0,0 +1,31 @@
### [CVE-2020-0001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0001)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In getProcessRecordLocked of ActivityManagerService.java isolated apps are not handled correctly. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-140055304
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/Vinalti/cve-badge.li
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Zachinio/CVE-2020-0001
- https://github.com/anthonyharrison/CVSS
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/he1m4n6a/cve-db
- https://github.com/michalbednarski/OrganizerTransaction
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/postmodern/cvelist.rb
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/zecool/cve

17
2020/CVE-2020-0002.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0002)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
In ih264d_init_decoder of ih264d_api.c, there is a possible out of bounds write due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-142602711
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

19
2020/CVE-2020-0003.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0003)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In onCreate of InstallStart.java, there is a possible package validation bypass due to a time-of-check time-of-use vulnerability. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.0 Android ID: A-140195904
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-0003
- https://github.com/he1m4n6a/cve-db
- https://github.com/tianlelyd/Discover-GPTs-Store

18
2020/CVE-2020-0004.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0004)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20service&color=brighgreen)
### Description
In generateCrop of WallpaperManagerService.java, there is a possible sysui crash due to image exceeding maximum texture size. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120847476
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/bfanselow/Vespa
- https://github.com/he1m4n6a/cve-db

18
2020/CVE-2020-0005.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0005)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In btm_read_remote_ext_features_complete of btm_acl.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-141552859
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db
- https://github.com/jiayy/android_vuln_poc-exp

18
2020/CVE-2020-0006.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0006)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In rw_i93_send_cmd_write_single_block of rw_i93.cc, there is a possible information disclosure of heap memory due to uninitialized data. This could lead to remote information disclosure in the NFC server with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-139738828
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/bfanselow/Vespa
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0007.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0007)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In flattenString8 of Sensor.cpp, there is a possible information disclosure of heap memory due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-141890807
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0008.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0008)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In LowEnergyClient::MtuChangedCallback of low_energy_client.cc, there is a possible out of bounds read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-142558228
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0009.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0009)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932
### POC
#### Reference
- http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-0009

30
2020/CVE-2020-0014.md Normal file
View File

@ -0,0 +1,30 @@
### [CVE-2020-0014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0014)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable. This could lead to a local escalation of privilege with no additional execution privileges needed. User action is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-128674520
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/he1m4n6a/cve-db
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/tea9/CVE-2020-0014-Toast
- https://github.com/trhacknon/Pocingit
- https://github.com/virtualpatch/virtualpatch_evaluation
- https://github.com/zecool/cve

17
2020/CVE-2020-0015.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0015)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In onCreate of CertInstaller.java, there is a possible way to overlay the Certificate Installation dialog by a malicious application. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139017101
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0016.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0016)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In the Broadcom Nexus firmware, there is an insecure default password. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-171413483
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0017.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0017)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In multiple places, it was possible for the primary users dictionary to be visible to and modifiable by secondary users. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-123232892
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0018.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0018](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0018)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In MotionEntry::appendDescription of InputDispatcher.cpp, there is a possible log information disclosure. This could lead to local disclosure of user input with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139945049
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0019.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0019)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen)
### Description
In the Broadcom Nexus firmware, there is an insecure default password. This could lead to local information disclosure in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-171413798
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

47
2020/CVE-2020-0022.md Normal file
View File

@ -0,0 +1,47 @@
### [CVE-2020-0022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0022)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20service&color=brighgreen)
### Description
In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715
### POC
#### Reference
- http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html
- http://seclists.org/fulldisclosure/2020/Feb/10
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/2lambda123/CVE-mitre
- https://github.com/5k1l/cve-2020-0022
- https://github.com/ARPSyndicate/cvemon
- https://github.com/JeffroMF/awesome-bluetooth-security321
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/Polo35/CVE-2020-0022
- https://github.com/Roo4L/BlueFrag_PoC
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/WinMin/Protocol-Vul
- https://github.com/alwentiu/CVE-2020-14292
- https://github.com/devdanqtuan/poc-for-cve-2020-0022
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/engn33r/awesome-bluetooth-security
- https://github.com/he1m4n6a/cve-db
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/k3vinlusec/Bluefrag_CVE-2020-0022
- https://github.com/leommxj/cve-2020-0022
- https://github.com/lsw29475/CVE-2020-0022
- https://github.com/marcinguy/CVE-2020-0022
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/seemoo-lab/frankenstein
- https://github.com/soosmile/POC
- https://github.com/themmokhtar/CVE-2020-0022
- https://github.com/trhacknon/Pocingit
- https://github.com/wrlu/Vulnerabilities
- https://github.com/zecool/cve

17
2020/CVE-2020-0026.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0026)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In Parcel::continueWrite of Parcel.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-140419401
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0027.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0027)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In HidRawSensor::batch of HidRawSensor.cpp, there is a possible out of bounds write due to an unexpected switch fallthrough. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-144040966
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0032.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0032)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
In ih264d_release_display_bufs of ih264d_utils.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-145364230
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0033.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0033](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0033)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds write due to stale pointer. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-144351324
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0034.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0034)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In vp8_decode_frame of decodeframe.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure if error correction were turned on, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1Android ID: A-62458770
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0035.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0035)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In query of TelephonyProvider.java, there is a possible access to SIM card info due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9Android ID: A-140622024
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0036.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0036](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0036)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In hasPermissions of PermissionMonitor.java, there is a possible access to restricted permissions due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-144679405
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0037.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0037](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0037)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In rw_i93_sm_set_read_only of rw_i93.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143106535
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0038.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0038](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0038)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In rw_i93_sm_update_ndef of rw_i93.cc, there is a possible read of uninitialized data due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143109193
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

17
2020/CVE-2020-0039.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0039](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0039)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In rw_i93_sm_update_ndef of rw_i93.cc, there is a possible read of uninitialized data due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143155861
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/he1m4n6a/cve-db

82
2020/CVE-2020-0041.md Normal file
View File

@ -0,0 +1,82 @@
### [CVE-2020-0041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0041)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145988638References: Upstream kernel
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/0xZipp0/BIBLE
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ashadowkhan/PENTESTINGBIBLE
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/De4dCr0w/Browser-pwn
- https://github.com/Escapingbug/awesome-browser-exploit
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
- https://github.com/KotenAngered/ZTE-Blade-A5-2019-Nae-Nae-List
- https://github.com/Mathankumar2701/ALL-PENTESTING-BIBLE
- https://github.com/MedoX71T/PENTESTING-BIBLE
- https://github.com/Mr-Anonymous002/awesome-browser-exploit
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/NetKingJ/android-security-awesome
- https://github.com/NetKingJ/awesome-android-security
- https://github.com/NetW0rK1le3r/PENTESTING-BIBLE
- https://github.com/OCEANOFANYTHING/PENTESTING-BIBLE
- https://github.com/OpposedDeception/ZTE-Blade-A5-2019-Nae-Nae-List
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Rayyan-appsec/ALL-PENTESTING-BIBLE
- https://github.com/Saidul-M-Khan/PENTESTING-BIBLE
- https://github.com/allpaca/chrome-sbx-db
- https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
- https://github.com/blank156/memek
- https://github.com/bluefrostsecurity/CVE-2020-0041
- https://github.com/cwannett/Docs-resources
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dli408097/pentesting-bible
- https://github.com/gmh5225/awesome-game-security
- https://github.com/guzzisec/PENTESTING-BIBLE
- https://github.com/hacker-insider/Hacking
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/j4nn/CVE-2020-0041
- https://github.com/jbmihoub/all-poc
- https://github.com/jcalabres/Simple-Keyboard-Keylogger
- https://github.com/jcalabres/root-exploit-pixel3
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/koharin/CVE-2020-0041
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nitishbadole/PENTESTING-BIBLE
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/paulveillard/cybersecurity-windows-exploitation
- https://github.com/phant0n/PENTESTING-BIBLE
- https://github.com/polygraphene/DirtyPipe-Android
- https://github.com/readloud/Pentesting-Bible
- https://github.com/soosmile/POC
- https://github.com/souvik666/chrome0day
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
- https://github.com/vaginessa/CVE-2020-0041-Pixel-3a
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References
- https://github.com/yusufazizmustofa/BIBLE

18
2020/CVE-2020-0050.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0050](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0050)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In nfa_hciu_send_msg of nfa_hci_utils.cc, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege in the NFC server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-124521372
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/hyrathon/trophies

17
2020/CVE-2020-0055.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0055)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In l2c_link_process_num_completed_pkts of l2c_link.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141617601
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/jiayy/android_vuln_poc-exp

17
2020/CVE-2020-0056.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0056](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0056)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In btu_hcif_connection_comp_evt of btu_hcif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141619686
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/jiayy/android_vuln_poc-exp

17
2020/CVE-2020-0057.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0057)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In btm_process_inq_results of btm_inq.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141620271
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/jiayy/android_vuln_poc-exp

17
2020/CVE-2020-0058.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0058](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0058)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In l2c_rcv_acl_data of l2c_main.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141745011
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/jiayy/android_vuln_poc-exp

17
2020/CVE-2020-0059.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0059)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In btm_ble_batchscan_filter_track_adv_vse_cback of btm_ble_batchscan.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142543524
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/jiayy/android_vuln_poc-exp

17
2020/CVE-2020-0067.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0067](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0067)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In f2fs_xattr_generic_list of xattr.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: Android. Versions: Android kernel. Android ID: A-120551147.
### POC
#### Reference
- http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
#### Github
No PoCs found on GitHub currently.

33
2020/CVE-2020-0069.md Normal file
View File

@ -0,0 +1,33 @@
### [CVE-2020-0069](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0069)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/0xf15h/mtk_su
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Darrenpig/openEuler_Tutorial
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/R0rt1z2/AutomatedRoot
- https://github.com/TheRealJunior/mtk-su-reverse-cve-2020-0069
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hegaz0y/Anoubis
- https://github.com/hugmatj/awesome-stars
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/quarkslab/CVE-2020-0069_poc
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit

21
2020/CVE-2020-0074.md Normal file
View File

@ -0,0 +1,21 @@
### [CVE-2020-0074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0074)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In verifyIntentFiltersIfNeeded of PackageManagerService.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-146204120
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base
- https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_after
- https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_old
- https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_old1

24
2020/CVE-2020-0082.md Normal file
View File

@ -0,0 +1,24 @@
### [CVE-2020-0082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0082)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In ExternalVibration of ExternalVibration.java, there is a possible activation of an arbitrary intent due to unsafe deserialization. This could lead to local escalation of privilege to system_server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140417434
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0x742/CVE-2020-0082-ExternalVibration
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit

18
2020/CVE-2020-0093.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0093)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-0093
- https://github.com/Live-Hack-CVE/CVE-2020-13112

32
2020/CVE-2020-0096.md Normal file
View File

@ -0,0 +1,32 @@
### [CVE-2020-0096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0096)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In startActivities of ActivityStartController.java, there is a possible escalation of privilege due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9Android ID: A-145669109
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ActivityCounter/StrandHoggAttacks
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/balazsgerlei/AndroidSecurityEvolution
- https://github.com/dayzsec/StrandHogg2
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/liuyun201990/StrandHogg2
- https://github.com/nahid0x1/CVE-2020-0096-strandhogg-exploit-p0c
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/tea9/CVE-2020-0096-StrandHogg2
- https://github.com/trhacknon/Pocingit
- https://github.com/wrlu/Vulnerabilities

22
2020/CVE-2020-0097.md Normal file
View File

@ -0,0 +1,22 @@
### [CVE-2020-0097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0097)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In various methods of PackageManagerService.java, there is a possible permission bypass due to a missing condition for system apps. This could lead to local escalation of privilege with User privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-145981139
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Nivaskumark/CVE-2020-0097-frameworks_ba
- https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base
- https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_after
- https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_afterfix
- https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_before

17
2020/CVE-2020-0099.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0099](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0099)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In addWindow of WindowManagerService.java, there is a possible window overlay attack due to an insecure default value. This could lead to local escalation of privilege via tapjacking with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-141745510
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0104.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0104](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0104)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In onShowingStateChanged of KeyguardStateMonitor.java, there is a possible inappropriate read due to a logic error. This could lead to local information disclosure of keyguard-protected data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-144430870
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/CrackerCat/ServiceCheater

28
2020/CVE-2020-0108.md Normal file
View File

@ -0,0 +1,28 @@
### [CVE-2020-0108](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0108)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In postNotification of ServiceRecord.java, there is a possible bypass of foreground process restrictions due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-140108616
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CrackerCat/ServiceCheater
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/XDo0/ServiceCheater
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/wrlu/Vulnerabilities
- https://github.com/xfhy/increase-process-priority

24
2020/CVE-2020-0113.md Normal file
View File

@ -0,0 +1,24 @@
### [CVE-2020-0113](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0113)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In sendCaptureResult of Camera3OutputUtils.cpp, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-9Android ID: A-150944913
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/XDo0/ServiceCheater
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit

32
2020/CVE-2020-0114.md Normal file
View File

@ -0,0 +1,32 @@
### [CVE-2020-0114](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0114)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In onCreateSliceProvider of KeyguardSliceProvider.java, there is a possible confused deputy due to a PendingIntent error. This could lead to local escalation of privilege that allows actions performed as the System UI, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147606347
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Nivaskumark/CVE-2020-0114-frameworks
- https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base
- https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base11
- https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base_afterfix
- https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basegbdgb
- https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basety
- https://github.com/Nivaskumark/_beforeCVE-2020-0114-frameworks_base
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/tea9/CVE-2020-0114-systemui
- https://github.com/trhacknon/Pocingit

25
2020/CVE-2020-0121.md Normal file
View File

@ -0,0 +1,25 @@
### [CVE-2020-0121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0121)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In updateUidProcState of AppOpsService.java, there is a possible permission bypass due to a logic error. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-148180766
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/mooneee/CVE-2020-0121
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit

22
2020/CVE-2020-0133.md Normal file
View File

@ -0,0 +1,22 @@
### [CVE-2020-0133](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0133)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Sett
- https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Setting
- https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Settings
- https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Settings_fix
- https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Settings_nopatch

20
2020/CVE-2020-0136.md Normal file
View File

@ -0,0 +1,20 @@
### [CVE-2020-0136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0136)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In multiple locations of Parcel.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-120078455
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Satheesh575555/libhwbinder_AOSP10_r33_CVE-2020-0136
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit

21
2020/CVE-2020-0137.md Normal file
View File

@ -0,0 +1,21 @@
### [CVE-2020-0137](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0137)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In setIPv6AddrGenMode of NetworkManagementService.java, there is a possible bypass of networking permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141920289
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2020-0137
- https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0137
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit

20
2020/CVE-2020-0138.md Normal file
View File

@ -0,0 +1,20 @@
### [CVE-2020-0138](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0138)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if bluetoothtbd were used, which it isn't in typical Android platforms, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142878416
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Satheesh575555/system_bt_AOSP10_r33-CVE-2020-0138
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit

18
2020/CVE-2020-0155.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0155)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In phNxpNciHal_send_ese_hal_cmd of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-139736386
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Trinadh465/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155
- https://github.com/nomi-sec/PoC-in-GitHub

18
2020/CVE-2020-0160.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0160](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0160)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20service&color=brighgreen)
### Description
In setSyncSampleParams of SampleTable.cpp, there is possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-124771364
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nanopathi/frameworks_av_AOSP10_r33_CVE-2020-0160
- https://github.com/nomi-sec/PoC-in-GitHub

17
2020/CVE-2020-0176.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0176)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In avdt_msg_prs_rej of avdt_msg.cc, there is a possible out-of-bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-79702484
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub

19
2020/CVE-2020-0181.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0181](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0181)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20service&color=brighgreen)
### Description
In exif_data_load_data_thumbnail of exif-data.c, there is a possible denial of service due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145075076
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-0181
- https://github.com/Trinadh465/external_libexif_AOSP10_r33_CVE-2020-0181
- https://github.com/nomi-sec/PoC-in-GitHub

19
2020/CVE-2020-0183.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0183](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0183)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In handleMessage of BluetoothManagerService, there is an incomplete reset. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-110181479
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/hshivhare67/platform_packages_apps_bluetooth_AOSP10_r33_CVE-2020-0183
- https://github.com/nanopathi/packages_apps_Bluetooth_AOSP10_r33_CVE-2020-0183
- https://github.com/nomi-sec/PoC-in-GitHub

24
2020/CVE-2020-0188.md Normal file
View File

@ -0,0 +1,24 @@
### [CVE-2020-0188](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0188)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In onCreatePermissionRequest of SettingsSliceProvider.java, there is a possible permissions bypass due to a PendingIntent error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147355897
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Nivaskumark/packages_apps_Settings_CVE-2020-0188_A10_R33
- https://github.com/Nivaskumark/packages_apps_settings_A10_r33_CVE-2020-0188
- https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0188
- https://github.com/ShaikUsaf/ShaikUsaf-packages_apps_settings_AOSP10_r33_CVE-2020-0188
- https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0188_CVE-0219
- https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0219_CVE-2020-0188_old
- https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0219_CVE-2020-0188_old-one
- https://github.com/nomi-sec/PoC-in-GitHub

19
2020/CVE-2020-0198.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0198](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0198)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20service&color=brighgreen)
### Description
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-0198
- https://github.com/Trinadh465/external_libexif_AOSP10_r33_CVE-2020-0198
- https://github.com/nomi-sec/PoC-in-GitHub

18
2020/CVE-2020-0203.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0203)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In freeIsolatedUidLocked of ProcessList.java, there is a possible UID reuse due to improper cleanup. This could lead to local escalation of privilege between constrained processes with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146313311
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2020-0203
- https://github.com/nomi-sec/PoC-in-GitHub

20
2020/CVE-2020-0209.md Normal file
View File

@ -0,0 +1,20 @@
### [CVE-2020-0209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0209)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In multiple functions of AccountManager.java, there is a possible permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145206842
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pazhanivel07/frameworks_base_CVE-2020-0209
- https://github.com/soosmile/POC

17
2020/CVE-2020-0213.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0213](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0213)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
In hevcd_fmt_conv_420sp_to_420sp_av8 of ihevcd_fmt_conv_420sp_to_420sp.s, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10 Android-11 Android ID: A-143464314
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

19
2020/CVE-2020-0215.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0215](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0215)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In onCreate of ConfirmConnectActivity.java, there is a possible leak of Bluetooth information due to a permissions bypass. This could lead to local escalation of privilege that exposes a pairing Bluetooth MAC address with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1 Android ID: A-140417248
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes
- https://github.com/Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0215
- https://github.com/nomi-sec/PoC-in-GitHub

18
2020/CVE-2020-0216.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0216](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0216)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-126204073
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/hyrathon/trophies

18
2020/CVE-2020-0218.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0218)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In loadSoundModel and related functions of SoundTriggerHwService.cpp, there is possible out of bounds write due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-136005905
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pazhanivel07/frameworks_av-CVE-2020-0218

23
2020/CVE-2020-0219.md Normal file
View File

@ -0,0 +1,23 @@
### [CVE-2020-0219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0219)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In onCreate of SliceDeepLinkSpringBoard.java there is a possible insecure Intent. This could lead to local elevation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-122836081
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0219
- https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0219_CVE-2020-0188_old
- https://github.com/Trinadh465/packages_apps_Settings_AOSP10_r33_CVE-2020-0219_CVE-2020-0188_old-one
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pazhanivel07/Settings_10-r33_CVE-CVE-2020-0219
- https://github.com/soosmile/POC

18
2020/CVE-2020-0225.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0225](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0225)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
In a2dp_vendor_ldac_decoder_decode_packet of a2dp_vendor_ldac_decoder.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-142546668
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2020-0225
- https://github.com/nomi-sec/PoC-in-GitHub

19
2020/CVE-2020-0226.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0226)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In createWithSurfaceParent of Client.cpp, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege in the graphics server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150226994
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ShaikUsaf/frameworks_native_AOSP10_r33_ShaikUsaf-frameworks_native_AOSP10_r33_CVE-2020-0226
- https://github.com/Trinadh465/frameworks_native_CVE-2020-0226
- https://github.com/nomi-sec/PoC-in-GitHub

18
2020/CVE-2020-0227.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0227](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0227)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In onCommand of CompanionDeviceManagerService.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing background data usage or launching from the background, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-129476618
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0227
- https://github.com/nomi-sec/PoC-in-GitHub

17
2020/CVE-2020-0230.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0230)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
There is a possible out of bounds write due to an incorrect bounds check. Product: AndroidVersions: Android SoCAndroid ID: A-156337262
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/michael101096/cs2020_msels

18
2020/CVE-2020-0239.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0239](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0239)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In getDocumentMetadata of DocumentsContract.java, there is a possible disclosure of location metadata from a file due to a permissions bypass. This could lead to local information disclosure from a file (eg. a photo) containing location metadata with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-151095863
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/virtualpatch/virtualpatch_evaluation

19
2020/CVE-2020-0240.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0240](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0240)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
In NewFixedDoubleArray of factory.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150706594
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ShaikUsaf/external_v8_AOSP10_r33_CVE-2020-0240
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/wrlu/Vulnerabilities

18
2020/CVE-2020-0241.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0241](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0241)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In NuPlayerStreamListener of NuPlayerStreamListener.cpp, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151456667
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/nanopathi/frameworks_av_AOSP10_r33_CVE-2020-0241
- https://github.com/nomi-sec/PoC-in-GitHub

21
2020/CVE-2020-0242.md Normal file
View File

@ -0,0 +1,21 @@
### [CVE-2020-0242](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0242)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In reset of NuPlayerDriver.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151643722
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pazhanivel07/frameworks_av-10-r33_CVE-2020-0242
- https://github.com/pazhanivel07/frameworks_av-CVE-2020-0242_CVE-2020-0243
- https://github.com/soosmile/POC

19
2020/CVE-2020-0243.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0243](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0243)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In clearPropValue of MediaAnalyticsItem.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-8.0 Android-8.1Android ID: A-151644303
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pazhanivel07/frameworks_av-CVE-2020-0242_CVE-2020-0243

18
2020/CVE-2020-0245.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0245](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0245)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
In DecodeFrameCombinedMode of combined_decode.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-152496149
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Satheesh575555/frameworks_av_AOSP10_r33_CVE-2020-0245
- https://github.com/nomi-sec/PoC-in-GitHub

17
2020/CVE-2020-0246.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0246)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In getCarrierPrivilegeStatus of UiccAccessRule.java, there is a missing permission check. This could lead to local information disclosure of EID data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-159062405
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0256.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0256)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-152874864
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon

17
2020/CVE-2020-0258.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0258)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In stopZygoteLocked of AppZygote.java, there is an insufficient cleanup. This could lead to local information disclosure in the application that is started next with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-157598956
### POC
#### Reference
- http://packetstormsecurity.com/files/158869/Android-App-Zygotes-Improper-Guarding.html
#### Github
No PoCs found on GitHub currently.

17
2020/CVE-2020-0283.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0283](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0283)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163008257
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0294.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0294](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0294)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In bindWallpaperComponentLocked of WallpaperManagerService.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-154915372
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0305.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon

18
2020/CVE-2020-0313.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0313)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In NotificationManagerService, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154917989
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/XDo0/ServiceCheater
- https://github.com/xfhy/increase-process-priority

17
2020/CVE-2020-0339.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0339](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0339)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
There is a possible out of bounds read due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-162980705
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0367.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0367](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0367)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-162980455
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0371.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0371](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0371)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
There is a possible out of bounds read due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163008256
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0376.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0376](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0376)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
There is a possible out of bounds read due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163003156
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

19
2020/CVE-2020-0377.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0377)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In gatt_process_read_by_type_rsp of gatt_cl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-158833854
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Satheesh575555/system_bt_AOSP10_r33_CVE-2020-0377
- https://github.com/TinyNiko/android_bulletin_notes
- https://github.com/nomi-sec/PoC-in-GitHub

17
2020/CVE-2020-0378.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0378](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0378)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In onWnmFrameReceived of PasspointManager.java, there is a missing permission check. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-157748906
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

18
2020/CVE-2020-0380.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0380](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0380)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
In allocExcessBits of bitalloc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-146398979
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2020-0380
- https://github.com/nomi-sec/PoC-in-GitHub

18
2020/CVE-2020-0381.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0381)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In Parse_wave of eas_mdls.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure in a highly constrained process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-150159669
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Trinadh465/external_sonivox_AOSP10_r33_CVE-2020-0381
- https://github.com/nomi-sec/PoC-in-GitHub

20
2020/CVE-2020-0391.md Normal file
View File

@ -0,0 +1,20 @@
### [CVE-2020-0391](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0391)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In applyPolicy of PackageManagerService.java, there is possible arbitrary command execution as System due to an unenforced protected-broadcast. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-158570769
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0391
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/virtualpatch/virtualpatch_evaluation

18
2020/CVE-2020-0392.md Normal file
View File

@ -0,0 +1,18 @@
### [CVE-2020-0392](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0392)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In getLayerDebugInfo of SurfaceFlinger.cpp, there is a possible code execution due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-150226608
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Satheesh575555/frameworks_native_AOSP10_r33_CVE-2020-0392
- https://github.com/nomi-sec/PoC-in-GitHub

20
2020/CVE-2020-0394.md Normal file
View File

@ -0,0 +1,20 @@
### [CVE-2020-0394](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0394)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In onCreate of BluetoothPairingDialog.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege and untrusted devices accessing contact lists with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155648639
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0394
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pazhanivel07/Settings_10-r33_CVE-2020-0394
- https://github.com/pazhanivel07/Settings_10-r33_CVE-2020-0394_02

17
2020/CVE-2020-0398.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0398](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0398)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In updateMwi of NotificationMgr.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-154323381
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

17
2020/CVE-2020-0400.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0400](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0400)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In showDataRoamingNotification of NotificationMgr.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-153356561
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

19
2020/CVE-2020-0401.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0401](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0401)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In setInstallerPackageName of PackageManagerService.java, there is a missing permission check. This could lead to local escalation of privilege and granting spurious permissions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-150857253
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2020-0401
- https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0401
- https://github.com/nomi-sec/PoC-in-GitHub

17
2020/CVE-2020-0404.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0404](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujul2022.html
#### Github
- https://github.com/ARPSyndicate/cvemon

17
2020/CVE-2020-0408.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0408)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In remove of String16.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-156999009
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

19
2020/CVE-2020-0409.md Normal file
View File

@ -0,0 +1,19 @@
### [CVE-2020-0409](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0409)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen)
### Description
In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes
- https://github.com/nanopathi/system_core_AOSP10_r33_CVE-2020-0409
- https://github.com/nomi-sec/PoC-in-GitHub

17
2020/CVE-2020-0410.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2020-0410](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0410)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20disclosure&color=brighgreen)
### Description
In setNotification of SapServer.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-156021269
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/TinyNiko/android_bulletin_notes

Some files were not shown because too many files have changed in this diff Show More