Show filters
782 Total Results
Displaying 1-10 of 782
Sort by:
Attacker Value
Very High

CVE-2020-8899 Samsung Quarm RCE via MMS

Disclosure Date: May 06, 2020 (last updated May 24, 2024)
There is a buffer overwrite vulnerability in the Quram qmg library of Samsung's Android OS versions O(8.x), P(9.0) and Q(10.0). An unauthenticated, unauthorized attacker sending a specially crafted MMS to a vulnerable phone can trigger a heap-based buffer overflow in the Quram image codec leading to an arbitrary remote code execution (RCE) without any user interaction. The Samsung ID is SVE-2020-16747.
Attacker Value
Moderate

CVE-2019-2215

Disclosure Date: October 11, 2019 (last updated July 26, 2024)
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
Attacker Value
Unknown

CVE-2020-0022

Disclosure Date: February 13, 2020 (last updated February 03, 2024)
In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715
Attacker Value
Unknown

CVE-2017-7376

Disclosure Date: February 19, 2018 (last updated November 26, 2024)
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
1
Attacker Value
Unknown

CVE-2012-6636

Disclosure Date: March 03, 2014 (last updated October 05, 2023)
The Android API before 17 does not properly restrict the WebView.addJavascriptInterface method, which allows remote attackers to execute arbitrary methods of Java objects by using the Java Reflection API within crafted JavaScript code that is loaded into the WebView component in an application targeted to API level 16 or earlier, a related issue to CVE-2013-4710.
1
Attacker Value
Unknown

CVE-2017-13322

Disclosure Date: January 17, 2025 (last updated January 24, 2025)
In endCallForSubscriber of PhoneInterfaceManager.java, there is a possible way to prevent access to emergency services due to a logic error in the code. This could lead to a local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Attacker Value
Unknown

CVE-2018-9449

Disclosure Date: December 03, 2024 (last updated December 19, 2024)
In process_service_search_attr_rsp of sdp_discovery.cc, there is a possible out of bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Attacker Value
Unknown

CVE-2018-9441

Disclosure Date: December 03, 2024 (last updated December 19, 2024)
In sdp_copy_raw_data of sdp_discovery.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.
Attacker Value
Unknown

CVE-2018-9435

Disclosure Date: December 02, 2024 (last updated December 19, 2024)
In gatt_process_error_rsp of gatt_cl.cc, there is a possible out of bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Attacker Value
Unknown

CVE-2018-9431

Disclosure Date: December 02, 2024 (last updated December 19, 2024)
In OSUInfo of OSUInfo.java, there is a possible escalation of privilege due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.