Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 8.1 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2020-15580
An issue exists on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. Attackers can bypass Factory Reset Protection (FRP) by enrolling a new lock password. The Samsung ID is SVE-2020-17328 (July 2020).
Google Android 8.0
Google Android 8.1
Google Android 9.0
Google Android 10.0
5.3
CVSSv3
CVE-2020-15581
An issue exists on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The kernel logging feature allows malicious users to discover virtual addresses via vectors involving shared memory. The Samsung ID is SVE-2020-17605 (July 2020).
Google Android 8.0
Google Android 8.1
Google Android 9.0
Google Android 10.0
5.5
CVSSv3
CVE-2020-15583
An issue exists on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. StickerProvider allows directory traversal for access to system files. The Samsung ID is SVE-2020-17665 (July 2020).
Google Android 8.0
Google Android 8.1
Google Android 9.0
Google Android 10.0
6.5
CVSSv3
CVE-2021-0632
In wifi driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a proximal attacker under certain build conditions with no additional execution privileges needed. User interaction is not needed for exploita...
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
5.5
CVSSv3
CVE-2021-0641
In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not need...
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
7.8
CVSSv3
CVE-2021-0646
In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process's SQL with no additional execution privileges neede...
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
7.8
CVSSv3
CVE-2021-0652
In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not n...
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
5.5
CVSSv3
CVE-2021-0672
In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndro...
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
5.5
CVSSv3
CVE-2021-0674
In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS0606423...
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
7.8
CVSSv3
CVE-2021-0675
In alac decoder, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064...
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »