Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
android api vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2016-8437
Improper input validation in Access Control APIs. Access control API may return memory range checking incorrectly. Product: Android. Versions: Kernel 3.18. Android ID: A-31623057. References: QC-CR#1009695.
Linux Linux Kernel 3.18
9.8
CVSSv3
CVE-2022-39862
Improper authorization in Dynamic Lockscreen prior to SMR Sep-2022 Release 1 in Android R(11) and 3.3.03.66 in Android S(12) allows unauthorized use of javascript interface api.
Samsung Dynamic Lockscreen
9.8
CVSSv3
CVE-2016-8439
Possible buffer overflow in trust zone access control API. Buffer overflow may occur due to lack of buffer size checking. Product: Android. Versions: Kernel 3.18. Android ID: A-31625204. References: QC-CR#1027804.
Linux Linux Kernel 3.18
3.3
CVSSv3
CVE-2022-0131
Jimoty App for Android versions before 3.7.42 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
Jmty Jimoty
9.8
CVSSv3
CVE-2018-18006
Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names o...
Ricoh Myprint 2.2.7
Ricoh Myprint 2.9.2.4
7.8
CVSSv3
CVE-2023-22429
Android App 'Wolt Delivery: Food and more' version 4.27.2 and previous versions uses hard-coded credentials (API key for an external service), which may allow a local malicious user to obtain the hard-coded API key via reverse-engineering the application binary.
Wolt Wolt Delivery
7.5
CVSSv3
CVE-2016-11058
The NETGEAR genie application prior to 2.4.34 for Android is affected by mishandling of hard-coded API keys and session IDs.
Netgear Genie
7.5
CVSSv3
CVE-2022-35734
'Hulu / ????' App for Android from version 3.0.47 to the version before 3.1.2 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
Hjholdings Hulu
NA
CVE-2014-0806
The Sleipnir Mobile application 2.12.1 and previous versions and Sleipnir Mobile Black Edition application 2.12.1 and previous versions for Android provide Geolocation API data without verifying user consent, which allows remote malicious users to obtain sensitive location inform...
Fenrir-inc Sleipnir Mobile 2.10
Fenrir-inc Sleipnir Mobile 2.11
Fenrir-inc Sleipnir Mobile 1.2.0
Fenrir-inc Sleipnir Mobile 1.3.0
Fenrir-inc Sleipnir Mobile 1.4.0
Fenrir-inc Sleipnir Mobile 2.0.1
Fenrir-inc Sleipnir Mobile 2.0.2
Fenrir-inc Sleipnir Mobile 2.2.2
Fenrir-inc Sleipnir Mobile 2.2.3
Fenrir-inc Sleipnir Mobile 2.3.0
Fenrir-inc Sleipnir Mobile 2.7.0
Fenrir-inc Sleipnir Mobile 2.8.0
Fenrir-inc Sleipnir Mobile 2.9.0
Fenrir-inc Sleipnir Mobile 2.12
Fenrir-inc Sleipnir Mobile 2.12.1
Fenrir-inc Sleipnir Mobile 1.0.0
Fenrir-inc Sleipnir Mobile 1.1.0
Fenrir-inc Sleipnir Mobile 1.5.0
Fenrir-inc Sleipnir Mobile 1.5.1
Fenrir-inc Sleipnir Mobile 1.7.1
Fenrir-inc Sleipnir Mobile 2.0.0
Fenrir-inc Sleipnir Mobile 2.0.3
5.5
CVSSv3
CVE-2020-5667
Studyplus App for Android v6.3.7 and previous versions and Studyplus App for iOS v8.29.0 and previous versions use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
Wantedlyinc Studyplus
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »