Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 5.1.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2015-6575
SampleTable.cpp in libstagefright in Android prior to 5.1.1 LMY48I does not properly consider integer promotion, which allows remote malicious users to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via crafted atoms in MP4 data, aka ...
Google Android
10
CVSSv2
CVE-2015-3828
The MPEG4Extractor::parse3GPPMetaData function in MPEG4Extractor.cpp in libstagefright in Android prior to 5.1.1 LMY48I does not enforce a minimum size for UTF-16 strings containing a Byte Order Mark (BOM), which allows remote malicious users to execute arbitrary code or cause a ...
Google Android
10
CVSSv2
CVE-2015-3829
Off-by-one error in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android prior to 5.1.1 LMY48I allows remote malicious users to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via crafted MPEG-4 co...
Google Android
10
CVSSv2
CVE-2015-3832
Multiple buffer overflows in MPEG4Extractor.cpp in libstagefright in Android prior to 5.1.1 LMY48I allow remote malicious users to execute arbitrary code via invalid size values of NAL units in MP4 data, aka internal bug 19641538.
Google Android
1 Github repository
10
CVSSv2
CVE-2015-3834
Multiple integer overflows in the BnHDCP::onTransact function in media/libmedia/IHDCP.cpp in libstagefright in Android prior to 5.1.1 LMY48I allow malicious users to execute arbitrary code via a crafted application that uses HDCP encryption, leading to a heap-based buffer overflo...
Google Android
10
CVSSv2
CVE-2015-1539
Multiple integer underflows in the ESDS::parseESDescriptor function in ESDS.cpp in libstagefright in Android prior to 5.1.1 LMY48I allow remote malicious users to execute arbitrary code via crafted ESDS atoms, aka internal bug 20139950, a related issue to CVE-2015-4493.
Google Android
9.3
CVSSv2
CVE-2017-13230
In hevc codec, there is an out-of-bounds write due to an incorrect bounds check with the i2_pic_width_in_luma_samples value. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: And...
Google Android 6.0
Google Android 8.0
Google Android 7.0
Google Android 7.1.1
Google Android 7.1.2
Google Android 8.1
Google Android 6.0.1
Google Android 5.1.1
9.3
CVSSv2
CVE-2017-13176
In the parseURL function of URLStreamHandler, there is improper input validation of the host field. This could lead to a remote elevation of privilege that could enable bypassing user interaction requirements with no additional execution privileges needed. User interaction is nee...
Google Android 6.0.1
Google Android 7.0
Google Android 7.1.1
Google Android 7.1.2
Google Android 5.1.1
Google Android 8.1
Google Android 6.0
Google Android 8.0
9.3
CVSSv2
CVE-2017-0841
A remote code execution vulnerability in the Android system (libutils). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-37723026.
Google Android 8.0
Google Android 5.1.1
Google Android 7.1.1
Google Android 7.1.2
Google Android 6.0
Google Android 6.0.1
Google Android 7.0
Google Android 5.0.2
1 Article
9.3
CVSSv2
CVE-2017-0836
A remote code execution vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64893226.
Google Android 5.1.1
Google Android 6.0
Google Android 5.0.2
Google Android 8.0
Google Android 7.0
Google Android 7.1.1
Google Android 7.1.2
Google Android 6.0.1
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »