Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 8.1 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-2005
In onPermissionGrantResult of GrantPermissionsActivity.java, there is a possible incorrectly granted permission due to a missing permission check. This could lead to local escalation of privilege on a locked device with no additional execution privileges needed. User interaction ...
Google Android 8.1
Google Android 9.0
Google Android 8.0
7.8
CVSSv3
CVE-2019-2023
In ServiceManager::add function in the hardware service manager, there is an insecure permissions check based on the PID of the caller. This could allow an app to add or replace a HAL service with its own service, gaining code execution in a privileged process.Product: AndroidVer...
Google Android 8.1
Google Android 8.0
Google Android 9.0
1 EDB exploit
7.8
CVSSv3
CVE-2019-2032
In SetScanResponseData of ble_advertiser_hci_interface.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Produ...
Google Android 8.0
Google Android 8.1
Google Android 9.0
1 Article
7.8
CVSSv3
CVE-2019-2050
In tearDownClientInterface of WificondControl.java, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versi...
Google Android 9.0
Google Android 8.0
Google Android 8.1
7
CVSSv3
CVE-2018-9539
In the ClearKey CAS descrambler, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 A...
Google Android 9.0
Google Android 8.1
Google Android 8.0
1 Github repository
5.5
CVSSv3
CVE-2019-2104
In HIDL, safe_union, and other C++ structs/unions being sent to application processes, there are uninitialized fields. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android...
Google Android 8.1
Google Android 8.0
Google Android 9.0
1 Article
7.8
CVSSv3
CVE-2019-2112
In several functions of alarm.cc, there is possible memory corruption due to a use after free. This could lead to local code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 Android-...
Google Android 9.0
Google Android 8.0
Google Android 8.1
1 Article
7.8
CVSSv3
CVE-2019-2114
In the default privileges of NFC, there is a possible local bypass of user interaction requirements on package installation due to a default permission. This could lead to local escalation of privilege by installing an application with no additional execution privileges needed. U...
Google Android 8.1
Google Android 8.0
Google Android 9.0
2 Github repositories
5.5
CVSSv3
CVE-2019-2118
In various functions of Parcel.cpp, there are uninitialized or partially initialized stack variables. These could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Andr...
Google Android 8.1
Google Android 8.0
Google Android 9.0
1 Article
5.5
CVSSv3
CVE-2019-2180
In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed f...
Google Android 8.1
Google Android 8.0
Google Android 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »