Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-26072
An issue exists in Samsung Mobile Chipset and Baseband Modem Chipset for Exynos 850, Exynos 980, Exynos 1080, Exynos 1280, Exynos 2200, Exynos Modem 5123, Exynos Modem 5300, and Exynos Auto T5123. A heap-based buffer overflow in the 5G MM message codec can occur due to insufficie...
Samsung Exynos 850 Firmware -
Samsung Exynos 980 Firmware -
Samsung Exynos 1080 Firmware -
Samsung Exynos 1280 Firmware -
Samsung Exynos 2200 Firmware -
Samsung Exynos Modem 5123 Firmware -
Samsung Exynos Modem 5300 Firmware -
Samsung Exynos Auto T5123 Firmware -
Samsung Exynos W920 Firmware -
1 Article
9.8
CVSSv3
CVE-2023-24033
The Samsung Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, and Exynos Auto T512 baseband modem chipsets do not properly check format types specified by the Session Description Protocol (SDP) module, which can lead to a denial of service.
Samsung Exynos Modem 5300 Firmware -
Samsung Exynos Modem 5123 Firmware -
Samsung Exynos 980 Firmware -
Samsung Exynos 1080 Firmware -
Samsung Exynos Auto T5123 Firmware -
1 Article
9.8
CVSSv3
CVE-2023-26075
An issue exists in Samsung Mobile Chipset and Baseband Modem Chipset for Exynos 850, Exynos 980, Exynos 1080, Exynos 1280, Exynos 2200, Exynos Modem 5123, Exynos Modem 5300, and Exynos Auto T5123. An intra-object overflow in the 5G MM message codec can occur due to insufficient p...
Samsung Exynos 850 Firmware -
Samsung Exynos 980 Firmware -
Samsung Exynos 1080 Firmware -
Samsung Exynos 1280 Firmware -
Samsung Exynos 2200 Firmware -
Samsung Exynos Modem 5123 Firmware -
Samsung Exynos Modem 5300 Firmware -
Samsung Exynos Auto T5123 Firmware -
Samsung Exynos W920 Firmware -
1 Article
9.8
CVSSv3
CVE-2023-20946
In onStart of BluetoothSwitchPreferenceController.java, there is a possible permission bypass due to a confused deputy. This could lead to remote escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for explo...
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
9.8
CVSSv3
CVE-2022-42529
Product: AndroidVersions: Android kernelAndroid ID: A-235292841References: N/A
Google Android -
9.8
CVSSv3
CVE-2022-20473
In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: And...
Google Android 10.0
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
9.8
CVSSv3
CVE-2022-20472
In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: And...
Google Android 10.0
Google Android 11.0
Google Android 12.0
Google Android 12.1
Google Android 13.0
9.8
CVSSv3
CVE-2021-0942
The path in this case is a little bit convoluted. The end result is that via an ioctl an untrusted app can control the ui32PageIndex offset in the expression:sPA.uiAddr = page_to_phys(psOSPageArrayData->pagearray[ui32PageIndex]);With the current PoC this crashes as an OOB read...
Google Android -
9.8
CVSSv3
CVE-2022-20386
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227328
Google Android -
9.8
CVSSv3
CVE-2022-20388
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227323
Google Android -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »