Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
samsung mobile vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-5350
Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allow malicious users to crash systemUI by leveraging incomplete exception handling. The Samsung ID is SVE-2016-7122.
Samsung Samsung Mobile 7.0
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 5.1
7.8
CVSSv2
CVE-2017-5351
Samsung Note devices with KK(4.4), L(5.0/5.1), and M(6.0) software allow malicious users to crash the system by creating an arbitrarily large number of active VR service threads. The Samsung ID is SVE-2016-7650.
Samsung Samsung Mobile 4.4
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 6.0
10
CVSSv2
CVE-2016-9965
Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allows malicious users to crash the system easily resulting in a possible DoS attack, or possibly gain privileges. The Samsung ...
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 7.0
Samsung Samsung Mobile 6.0
10
CVSSv2
CVE-2016-9967
Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allows malicious users to crash the system easily resulting in a possible DoS attack, or possibly gain privileges. The Samsung ...
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 7.0
9.3
CVSSv2
CVE-2018-5210
On Samsung mobile devices with N(7.x) software and Exynos chipsets, attackers can conduct a Trustlet stack overflow attack for arbitrary TEE code execution, in conjunction with a brute-force attack to discover unlock information (PIN, password, or pattern). The Samsung ID is SVE-...
Samsung Samsung Mobile 7.1.2
Samsung Samsung Mobile 7.0
Samsung Samsung Mobile 7.1.1
Samsung Samsung Mobile 7.1
9.3
CVSSv2
CVE-2016-6526
The SpamCall Activity component in Telecom application on Samsung Note device L(5.0/5.1) and M(6.0) allows malicious users to cause a denial of service (crash and reboot) or possibly gain privileges via a malformed serializable object.
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 6.0
Samsung Samsung Mobile 5.0
9.3
CVSSv2
CVE-2016-6527
The SmartCall Activity component in Telecom application on Samsung Note device L(5.0/5.1) and M(6.0) allows malicious users to cause a denial of service (crash and reboot) or possibly gain privileges via a malformed serializable object.
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 6.0
7.8
CVSSv2
CVE-2016-9277
Integer overflow in SystemUI in KK(4.4) and L(5.0/5.1) on Samsung Note devices allows malicious users to cause a denial of service (UI restart) via vectors involving APIs and an activity that computes an out-of-bounds array index, aka SVE-2016-6906.
Samsung Samsung Mobile 4.4
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
2.1
CVSSv2
CVE-2016-4546
Samsung devices with Android KK(4.4) or L(5.0/5.1) allow local users to cause a denial of service (IAndroidShm service crash) via crafted data in a service call.
Samsung Samsung Mobile 4.4
Samsung Samsung Mobile 5.0
Samsung Samsung Mobile 5.1
4.4
CVSSv2
CVE-2015-7891
Race condition in the ioctl implementation in the Samsung Graphics 2D driver (aka /dev/fimg2d) in Samsung devices with Android L(5.0/5.1) allows local users to trigger memory errors by leveraging definition of g2d_lock and g2d_unlock lock macros as no-ops, aka SVE-2015-4598.
Samsung Samsung Mobile 5.1
Samsung Samsung Mobile 5.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »