Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 8.0 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2018-9457
In onCheckedChanged of BluetoothPairingController.java, there is a possible way to retrieve contact information due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploita...
Google Android 8.1
Google Android 9.0
Google Android 8.0
7.8
CVSSv3
CVE-2018-9488
In the SELinux permissions of crash_dump.te, there is a permissions bypass due to a missing restriction. This could lead to a local escalation of privilege, with System privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0 Andr...
Google Android 8.1
Google Android 9.0
Google Android 8.0
1 EDB exploit
7.8
CVSSv3
CVE-2018-9492
In checkGrantUriPermissionLocked of ActivityManagerService.java, there is a possible permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: An...
Google Android 8.0
Google Android 8.1
Google Android 9.0
7
CVSSv3
CVE-2018-9539
In the ClearKey CAS descrambler, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 A...
Google Android 9.0
Google Android 8.1
Google Android 8.0
1 Github repository
5.5
CVSSv3
CVE-2019-9376
In Account of Account.java, there is a possible boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Android; Versions: Android-9, Android-8....
Google Android 8.0
Google Android 8.1
Google Android 9.0
8.8
CVSSv3
CVE-2019-1988
In sample6 of SkSwizzler.cpp, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution in system_server with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Version...
Google Android 8.1
Google Android 9.0
Google Android 8.0
1 Github repository
1 Article
7.8
CVSSv3
CVE-2019-1993
In register_app of btif_hd.cc, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8...
Google Android 9.0
Google Android 8.1
Google Android 8.0
1 Article
8.8
CVSSv3
CVE-2019-1994
In refresh of DevelopmentTiles.java, there is the possibility of leaving development settings accessible due to an insecure default value. This could lead to unwanted access to development settings, with no additional execution privileges needed. User interaction is needed for ex...
Google Android 9.0
Google Android 8.0
Google Android 8.1
1 Article
5.5
CVSSv3
CVE-2020-0453
In updateNotification of BeamTransferManager.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions...
Google Android 8.0
Google Android 8.1
Google Android 9.0
6.2
CVSSv3
CVE-2019-20535
An issue exists on Samsung mobile devices with O(8.x) and P(9.0) software. A connection to a new Bluetooth devices can be established from the lock screen. The Samsung ID is SVE-2019-15533 (December 2019).
Google Android 8.0
Google Android 8.1
Google Android 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »