Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
samsung samsung mobile 5.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2016-4547
Samsung devices with Android KK(4.4), L(5.0/5.1), or M(6.0) allow malicious users to cause a denial of service (system crash) via a crafted system call to TvoutService_C.
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 4.4
Samsung Samsung Mobile 5.0
10
CVSSv2
CVE-2016-9966
Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allows malicious users to crash the system easily resulting in a possible DoS attack, or possibly gain privileges. The Samsung ...
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 7.0
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
7.1
CVSSv2
CVE-2017-5217
Installing a zero-permission Android application on certain Samsung Android devices with KK(4.4), L(5.0/5.1), and M(6.0) software can continually crash the system_server process in the Android OS. The zero-permission app will create an active install session for a separate app th...
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 4.4
5
CVSSv2
CVE-2017-5350
Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allow malicious users to crash systemUI by leveraging incomplete exception handling. The Samsung ID is SVE-2016-7122.
Samsung Samsung Mobile 7.0
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 5.1
7.8
CVSSv2
CVE-2017-5351
Samsung Note devices with KK(4.4), L(5.0/5.1), and M(6.0) software allow malicious users to crash the system by creating an arbitrarily large number of active VR service threads. The Samsung ID is SVE-2016-7650.
Samsung Samsung Mobile 4.4
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 6.0
10
CVSSv2
CVE-2016-9965
Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allows malicious users to crash the system easily resulting in a possible DoS attack, or possibly gain privileges. The Samsung ...
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 7.0
Samsung Samsung Mobile 6.0
10
CVSSv2
CVE-2016-9967
Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allows malicious users to crash the system easily resulting in a possible DoS attack, or possibly gain privileges. The Samsung ...
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 7.0
9.3
CVSSv2
CVE-2016-6526
The SpamCall Activity component in Telecom application on Samsung Note device L(5.0/5.1) and M(6.0) allows malicious users to cause a denial of service (crash and reboot) or possibly gain privileges via a malformed serializable object.
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 5.0
9.3
CVSSv2
CVE-2016-6527
The SmartCall Activity component in Telecom application on Samsung Note device L(5.0/5.1) and M(6.0) allows malicious users to cause a denial of service (crash and reboot) or possibly gain privileges via a malformed serializable object.
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 6.0
7.8
CVSSv2
CVE-2016-9277
Integer overflow in SystemUI in KK(4.4) and L(5.0/5.1) on Samsung Note devices allows malicious users to cause a denial of service (UI restart) via vectors involving APIs and an activity that computes an out-of-bounds array index, aka SVE-2016-6906.
Samsung Samsung Mobile 4.4
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »