{"vulnerability": "CVE-2022-2024", "sightings": [{"uuid": "06ac340c-10e3-4166-8d0a-82a8ae88687a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20245", "type": "seen", "source": "https://t.me/cibsecurity/47994", "content": "\u203c CVE-2022-20245 \u203c\n\nIn WindowManager, there is a possible method to create a recording of the lock screen due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-215005011\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-11T18:38:23.000000Z"}, {"uuid": "16f2da09-c870-4d4f-b8b1-bb4ed9a5a0ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20240", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12957", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-20240\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In sOpAllowSystemRestrictionBypass of AppOpsManager.java, there is a possible leak of location information due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-231496105\n\ud83d\udccf Published: 2022-12-13T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T19:53:49.503Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2022-12-01", "creation_timestamp": "2025-04-22T20:04:59.000000Z"}, {"uuid": "88ca9dd1-4ad7-4880-be43-cb131b83170f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2024", "type": "seen", "source": "https://t.me/cibsecurity/58901", "content": "\u203c CVE-2022-2024 \u203c\n\nOS Command Injection in GitHub repository gogs/gogs prior to 0.12.11.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-09T12:24:55.000000Z"}, {"uuid": "64265698-b584-43d2-99f1-df52ffbde059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20240", "type": "seen", "source": "https://t.me/cibsecurity/54436", "content": "\u203c CVE-2022-20240 \u203c\n\nIn sOpAllowSystemRestrictionBypass of AppOpsManager.java, there is a possible leak of location information due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-231496105\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-13T18:28:07.000000Z"}, {"uuid": "07bc2b3d-c410-49e7-b840-7bbdeffd7bbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20243", "type": "seen", "source": "https://t.me/cibsecurity/47962", "content": "\u203c CVE-2022-20243 \u203c\n\nIn Core Utilities, there is a possible log information disclosure. This could lead to local information disclosure of sensitive browsing data with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-190199986\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-11T18:32:03.000000Z"}, {"uuid": "b139378c-a9c4-423b-921f-efa0ed41ba7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20247", "type": "seen", "source": "https://t.me/cibsecurity/47987", "content": "\u203c CVE-2022-20247 \u203c\n\nIn Media, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-229858836\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-11T18:38:14.000000Z"}, {"uuid": "c5bf33b2-64a4-4172-97c8-baec18e8e3ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20242", "type": "seen", "source": "https://t.me/cibsecurity/47986", "content": "\u203c CVE-2022-20242 \u203c\n\nIn Telephony, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-231986212\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-11T18:38:13.000000Z"}, {"uuid": "ebf73bb0-a934-4cfa-90e7-94ffc39b64bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20246", "type": "seen", "source": "https://t.me/cibsecurity/47976", "content": "\u203c CVE-2022-20246 \u203c\n\nIn WindowManager, there is a possible bypass of the restrictions for starting activities from the background due to an incorrect UID/permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230493191\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-11T18:32:19.000000Z"}, {"uuid": "d1d22d56-5d59-4a29-81bf-5fe5a8926797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20248", "type": "seen", "source": "https://t.me/cibsecurity/47973", "content": "\u203c CVE-2022-20248 \u203c\n\nIn Settings, there is a possible way to connect to an open network bypassing DISALLOW_CONFIG_WIFI restriction due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-227619193\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-11T18:32:15.000000Z"}]}