Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 5.0.2 vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv2
CVE-2014-9908
A Denial of Service vulnerability exists in Google Android 4.4.4, 5.0.2, and 5.1.1, which allows malicious users to block Bluetooh access (Android Bug ID A-28672558).
Google Android 4.4
Google Android 5.0.2
Google Android 5.1.1
7.8
CVSSv2
CVE-2017-0852
A denial of service vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0. Android ID: A-62815506.
Google Android 6.0
Google Android 5.1.1
Google Android 5.0.2
4.3
CVSSv2
CVE-2016-6910
The non-existent notification listener vulnerability was introduced in the initial Android 5.0.2 builds for the Samsung Galaxy S6 Edge devices, but the vulnerability can persist on the device even after the device has been upgraded to an Android 5.1.1 or 6.0.1 build. The vulnerab...
Google Android 5.1.1
Google Android 5.0.2
Google Android 6.0.1
7.1
CVSSv2
CVE-2017-0644
A remote denial of service vulnerability in Mediaserver could enable an malicious user to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0...
Google Android 6.0
Google Android 6.0.1
Google Android 5.0.2
Google Android 5.1.1
Google Android 4.4.4
5
CVSSv2
CVE-2015-3854
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java in Android 5.x allows malicious users to bypass a DEVICE_POWER permission requirement via a broadcast intent with the PNW.stopSaver action, aka internal bug 20918350.
Google Android 5.0
Google Android 5.1.1
Google Android 5.0.2
Google Android 5.1.0
Google Android 5.0.1
Google Android 5.1
3 Github repositories
9.3
CVSSv2
CVE-2015-6647
The Widevine QSEE TrustZone application in Android 5.x prior to 5.1.1 LMY49F and 6.0 prior to 2016-01-01 allows malicious users to gain privileges via a crafted application that leverages QSEECOM access, aka internal bug 24441554.
Google Android 5.1.0
Google Android 5.0.2
Google Android 6.0
Google Android 5.0.1
Google Android 5.0
Google Android 5.1.1
7.1
CVSSv2
CVE-2017-0643
A remote denial of service vulnerability in Mediaserver could enable an malicious user to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 5.0.2, 5.1...
Google Android 7.0
Google Android 7.1.1
Google Android 5.1.1
Google Android 6.0
Google Android 6.0.1
Google Android 5.0.2
7.1
CVSSv2
CVE-2017-0642
A remote denial of service vulnerability in libhevc in Mediaserver could enable an malicious user to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions:...
Google Android 5.0.2
Google Android 7.1.1
Google Android 7.1.2
Google Android 6.0.1
Google Android 7.0
Google Android 5.1.1
Google Android 6.0
9.3
CVSSv2
CVE-2017-0664
A elevation of privilege vulnerability in the Android framework. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36491278.
Google Android 6.0.1
Google Android 7.0
Google Android 7.1.1
Google Android 7.1.2
Google Android 5.1.1
Google Android 5.0.2
Google Android 6.0
9.3
CVSSv2
CVE-2017-0667
A elevation of privilege vulnerability in the Android framework. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37478824.
Google Android 6.0.1
Google Android 7.0
Google Android 7.1.1
Google Android 7.1.2
Google Android 5.0.2
Google Android 6.0
Google Android 5.1.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »