Show filters
16 Total Results
Displaying 11-16 of 16
Sort by:
Attacker Value
Unknown
CVE-2012-4221
Disclosure Date: November 30, 2012 (last updated October 05, 2023)
Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service via an application that uses crafted arguments in a local diagchar_ioctl call.
0
Attacker Value
Unknown
CVE-2012-4222
Disclosure Date: November 30, 2012 (last updated October 05, 2023)
drivers/gpu/msm/kgsl.c in the Qualcomm Innovation Center (QuIC) Graphics KGSL kernel-mode driver for Android 2.3 through 4.2 allows attackers to cause a denial of service (NULL pointer dereference) via an application that uses crafted arguments in a local kgsl_ioctl call.
0
Attacker Value
Unknown
CVE-2011-3918
Disclosure Date: October 07, 2012 (last updated October 05, 2023)
The Zygote process in Android 4.0.3 and earlier accepts fork requests from processes with arbitrary UIDs, which allows remote attackers to cause a denial of service (reboot loop) via a crafted application.
0
Attacker Value
Unknown
CVE-2011-3874
Disclosure Date: January 27, 2012 (last updated October 04, 2023)
Stack-based buffer overflow in libsysutils in Android 2.2.x through 2.2.2 and 2.3.x through 2.3.6 allows user-assisted remote attackers to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wrong number of arguments, as demonstrated by zergRush to trigger a use-after-free error.
0
Attacker Value
Unknown
CVE-2011-4276
Disclosure Date: January 25, 2012 (last updated October 04, 2023)
The Bluetooth service (com/android/phone/BluetoothHeadsetService.java) in Android 2.3 before 2.3.6 allows remote attackers within Bluetooth range to obtain contact data via an AT phonebook transfer.
0
Attacker Value
Unknown
CVE-2011-2344
Disclosure Date: July 08, 2011 (last updated October 04, 2023)
Android Picasa in Android 3.0 and 2.x through 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote attackers to gain privileges and access private pictures and web albums by sniffing the token from connections with picasaweb.google.com.
0