Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linuxfoundation iot-yocto 22.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-20740
In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559840.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
NA
CVE-2023-20735
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20745
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07560694.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20743
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519142.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20747
In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20733
In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645149.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20734
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20736
In vcu, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645189.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20737
In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645167.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20738
In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.
Linuxfoundation Iot-yocto 22.2
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »