Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
android android browser vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-0985
Heap-based buffer overflow in the GIF library in the WebKit framework for Google Android SDK m3-rc37a and previous versions allows remote malicious users to execute arbitrary code via a crafted GIF file whose logical screen height and width are different than the actual height an...
Google Android Sdk M3-rc37a
1 EDB exploit
NA
CVE-2014-5774
The Web Browser & Explorer (aka internetexplorer.browser.webexplorer) application 4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Web Browser \\& Explorer Project Web Browser \\& Explorer 4.0
NA
CVE-2014-5936
The INCOgnito Private Browser (aka com.SL.InCoBrowser) application 1.4.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Incognito Private Browser Project Incognito Private Browser 1.4.0
NA
CVE-2014-7466
The Live TV Browser (aka com.wHDSmartBrowser) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Live Tv Browser Project Live Tv Browser 2
8.8
CVSSv3
CVE-2014-4968
The WebView class and use of the WebView.addJavascriptInterface method in the Boat Browser application 8.0 and 8.0.1 for Android allow remote malicious users to execute arbitrary code via a crafted web site, a related issue to CVE-2012-6636.
Boatmob Boat Browser 8.0
Boatmob Boat Browser 8.0.1
1 EDB exploit
6.5
CVSSv3
CVE-2015-3830
The stock Android browser address bar in all Android operating systems suffers from Address Bar Spoofing, which allows remote malicious users to trick a victim by displaying a malicious page for legitimate domain names.
Google Android -
NA
CVE-2014-5751
The Tor Browser the Short Guide (aka com.wTorShortUserManual) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Tor Browser The Short Guide Project Tor Browser The Short Guide 0.1
NA
CVE-2012-6301
The Browser application in Android 4.0.3 allows remote malicious users to cause a denial of service (application crash) via a crafted market: URI in the SRC attribute of an IFRAME element.
Google Android 4.0.3
4.7
CVSSv3
CVE-2016-9473
Brave Browser iOS prior to 1.2.18 and Brave Browser Android 1.9.56 and previous versions suffer from Full Address Bar Spoofing, allowing malicious users to trick a victim by displaying a malicious page for legitimate domain names.
Brave Browser
6.1
CVSSv3
CVE-2023-28364
An Open Redirect vulnerability exists prior to version 1.52.117, where the built-in QR scanner in Brave Browser Android navigated to scanned URLs automatically without showing the URL first. Now the user must manually navigate to the URL.
Brave Browser
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »