{"vulnerability": "CVE-2022-2029", "sightings": [{"uuid": "4ce3d128-1a56-46dc-a5f2-a5d76a70ab64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20298", "type": "seen", "source": "https://t.me/cibsecurity/48037", "content": "\u203c CVE-2022-20298 \u203c\n\nIn ContentService, there is a possible way to check if an account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201416182\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:33:41.000000Z"}, {"uuid": "2207a5f9-81d7-41c8-9f35-3841a353e6a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20299", "type": "seen", "source": "https://t.me/cibsecurity/48041", "content": "\u203c CVE-2022-20299 \u203c\n\nIn ContentService, there is a possible way to check if the given account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201415895\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:33:45.000000Z"}, {"uuid": "c709b163-5c37-4550-b29a-c64eaa283eaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20292", "type": "seen", "source": "https://t.me/cibsecurity/48055", "content": "\u203c CVE-2022-20292 \u203c\n\nIn Settings, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-202975040\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:39:41.000000Z"}, {"uuid": "5739f05c-6bb2-4e2a-a7fc-f198d4446da6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20295", "type": "seen", "source": "https://t.me/cibsecurity/48026", "content": "\u203c CVE-2022-20295 \u203c\n\nIn ContentService, there is a possible way to check if an account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-202160584\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:33:24.000000Z"}, {"uuid": "242c1633-866c-4663-a414-50c6f77cb291", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20297", "type": "seen", "source": "https://t.me/cibsecurity/48079", "content": "\u203c CVE-2022-20297 \u203c\n\nIn Settings, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201561699\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:46:45.000000Z"}, {"uuid": "66098773-d77f-411d-a18e-a8ee28da4048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20290", "type": "seen", "source": "https://t.me/cibsecurity/48081", "content": "\u203c CVE-2022-20290 \u203c\n\nIn Midi, there is a possible way to learn about private midi devices due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-203549963\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:56:57.000000Z"}, {"uuid": "ccb8e090-e25e-425f-83f1-2984051708de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-20293", "type": "seen", "source": "https://t.me/cibsecurity/48067", "content": "\u203c CVE-2022-20293 \u203c\n\nIn LauncherApps, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-202298672\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-12T18:43:37.000000Z"}, {"uuid": "584d51f3-5e79-475c-bd84-cf68e429b629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2029", "type": "seen", "source": "https://t.me/cibsecurity/44117", "content": "\u203c CVE-2022-2029 \u203c\n\nCross-site Scripting (XSS) - DOM in GitHub repository kromitgmbh/titra prior to 0.77.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-09T20:33:28.000000Z"}]}