Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 3.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-20661
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560782; Issue ID: ALPS07560782.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2023-20662
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560765; Issue ID: ALPS07560765.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2023-20674
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588552.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
4.3
CVSSv2
CVE-2012-4222
drivers/gpu/msm/kgsl.c in the Qualcomm Innovation Center (QuIC) Graphics KGSL kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to cause a denial of service (NULL pointer dereference) via an application that uses crafted arguments in a local kgsl_i...
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 3.2.2
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.6
Google Android 4.0
Google Android 4.0.1
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 2.3.3
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.0.2
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.2
6.8
CVSSv2
CVE-2012-4220
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses cr...
Google Android 2.3.3
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
Google Android 2.3
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
3 Github repositories
6.8
CVSSv2
CVE-2012-4221
Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service via an application that uses crafted argume...
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
Google Android 2.3.7
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.3
Google Android 2.3.5
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
9.3
CVSSv2
CVE-2013-4787
Android 1.6 Donut up to and including 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows malicious users to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic s...
Google Android 2.3.3
Google Android 2.3.4
Google Android 4.0
Google Android 4.1.2
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.0.2
Google Android 4.2
Google Android 4.0.1
Google Android 2.3
Google Android 2.2.2
Google Android 1.6
Google Android 2.1
Google Android 3.1
Google Android 2.3.2
Google Android 3.2.2
Google Android 3.2.1
Google Android 2.2.1
Google Android 2.3.5
Google Android 2.2
Google Android 2.3.6
Google Android 3.0
1 EDB exploit
NA
CVE-2023-32810
In bluetooth driver, there is a possible out of bounds read due to improper input validation. This could lead to local information leak with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07867212; Issue ID: ALPS07867212.
Linuxfoundation Yocto 3.1
Linuxfoundation Yocto 3.3
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
Linux Linux Kernel 4.19
NA
CVE-2023-32829
In apusys, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07713478; Issue ID: ALPS07713478.
Linuxfoundation Yocto 3.1
Linuxfoundation Yocto 3.3
Linuxfoundation Yocto 4.0
Mediatek Iot Yocto 23.0
Google Android 12.0
Google Android 13.0
NA
CVE-2023-20838
In imgsys, there is a possible out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07326455; Issue ID: ALPS07326418.
Linuxfoundation Yocto 3.1
Linuxfoundation Yocto 3.3
Linuxfoundation Yocto 4.0
Google Android 12.0
Google Android 13.0
Linux Linux Kernel 4.19
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
CVE-2024-20360
CVE-2021-47559
XXE
CVE-2024-5229
CVE-2021-47543
CVE-2021-47571
SSTI
CVE-2024-4978
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »