Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 3.1 vulnerabilities and exploits
(subscribe to this query)
6.7
CVSSv3
CVE-2023-20663
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560741; Issue ID: ALPS07560741.
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2011-3918
The Zygote process in Android 4.0.3 and previous versions accepts fork requests from processes with arbitrary UIDs, which allows remote malicious users to cause a denial of service (reboot loop) via a crafted application.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 1.6
Google Android 2.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 1.5
Google Android 3.1
Google Android 2.2.1
Google Android 2.2.2
1 EDB exploit
9.8
CVSSv3
CVE-2014-7920
mediaserver in Android 2.2 up to and including 5.x prior to 5.1 allows malicious users to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7921.
Google Android 2.2.3
Google Android 3.2.6
Google Android 4.2
Google Android 4.1
Google Android 3.2.4
Google Android 5.0.2
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 4.4.4
Google Android 3.0
Google Android 4.2.1
Google Android 2.3.1
Google Android 2.3.5
Google Android 5.0.1
2 Github repositories
NA
CVE-2013-7373
Android prior to 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for malicious users to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
Google Android 1.0
Google Android 1.1
Google Android 1.5
Google Android 1.6
Google Android 2.3.4
Google Android 2.3.5
Google Android 2.3.6
Google Android 2.3.7
Google Android 4.1.2
Google Android 4.2
Google Android 4.2.1
Google Android 4.2.2
Google Android 2.0
Google Android 2.1
Google Android 2.3
Google Android 2.3.2
Google Android 3.1
Google Android 3.2.1
Google Android 4.0.1
Google Android 4.0.3
Google Android 4.1
Google Android 4.3
NA
CVE-2014-8507
Multiple SQL injection vulnerabilities in the queryLastApp method in packages/WAPPushManager/src/com/android/smspush/WapPushManager.java in the WAPPushManager module in Android prior to 5.0.0 allow remote malicious users to execute arbitrary SQL commands, and consequently launch ...
Google Android 4.0.3
Google Android 4.0.2
Google Android 4.0.1
Google Android 4.0
Google Android 2.3.2
Google Android 2.3.1
Google Android 4.4
Google Android 4.3.1
Google Android 4.3
Google Android 4.2.2
Google Android 4.2.1
Google Android 3.2
Google Android 3.1
Google Android 3.0
Google Android 2.3.7
Google Android 2.1
Google Android 2.0.1
Google Android 2.0
Google Android 1.6
Google Android 2.3
Google Android 2.2.3
Google Android
1 EDB exploit
NA
CVE-2014-8610
AndroidManifest.xml in Android prior to 5.0.0 does not require the SEND_SMS permission for the SmsReceiver receiver, which allows malicious users to send stored SMS messages, and consequently transmit arbitrary new draft SMS messages or trigger additional per-message charges from...
Google Android 4.4.3
Google Android 1.5
Google Android 1.6
Google Android 2.0
Google Android 2.3.5
Google Android 2.3.6
Google Android 2.3.7
Google Android 3.0
Google Android 4.1.2
Google Android 4.2
Google Android 4.2.1
Google Android 4.2.2
Google Android 4.3
Google Android 1.1
Google Android 2.1
Google Android 2.2
Google Android 2.3
Google Android 2.3.2
Google Android 2.3.4
Google Android 3.1
Google Android 3.2.1
Google Android 4.0.3
9.8
CVSSv3
CVE-2016-1155
HTTP header injection vulnerability in the URLConnection class in Android OS 2.2 up to and including 6.0 allows remote malicious users to execute arbitrary scripts or set arbitrary values in cookies.
Google Android 2.2
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2.3
Google Android 3.2.1
Google Android 3.2.2
Google Android 3.2.4
Google Android 3.2.6
Google Android 4.4.1
Google Android 4.4.2
Google Android 4.4.3
Google Android 4.4.4
Google Android 2.3.3
Google Android 2.3.4
Google Android 2.3.5
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.1
Google Android 4.1.2
Google Android 4.2
Google Android 4.2.1
Google Android 5.1.0
NA
CVE-2014-7911
luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android prior to 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows malicious users to execute arbitrary...
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 4.2.1
10 Github repositories
4.4
CVSSv3
CVE-2023-20729
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573552; Issue ID: ALPS07573575.
Linuxfoundation Yocto 3.1
Linuxfoundation Yocto 3.3
Linuxfoundation Yocto 4.0
Google Android 13.0
4.4
CVSSv3
CVE-2023-20730
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573552; Issue ID: ALPS07573552.
Linuxfoundation Yocto 3.1
Linuxfoundation Yocto 3.3
Linuxfoundation Yocto 4.0
Google Android 13.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »