Vulnerabilities > Google > Android > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-09-08 | CVE-2017-0775 | Excessive Iteration vulnerability in Google Android A denial of service vulnerability in the Android media framework (libstagefright). | 5.5 |
2017-09-08 | CVE-2017-0774 | Unchecked Return Value vulnerability in Google Android A denial of service vulnerability in the Android media framework (libstagefright). | 5.5 |
2017-09-08 | CVE-2017-0773 | Unspecified vulnerability in Google Android A denial of service vulnerability in the Android media framework (libhevc). | 5.5 |
2017-09-08 | CVE-2017-0772 | Unspecified vulnerability in Google Android A denial of service vulnerability in the Android media framework (libavc). | 5.5 |
2017-09-08 | CVE-2017-0771 | Allocation of Resources Without Limits or Throttling vulnerability in Google Android A denial of service vulnerability in the Android media framework (libskia). | 5.5 |
2017-08-18 | CVE-2017-9682 | Race Condition vulnerability in Google Android In all Qualcomm products with Android releases from CAF using the Linux kernel, a race condition in two KGSL driver functions can lead to a Use After Free condition. | 4.7 |
2017-08-18 | CVE-2017-8254 | Information Exposure vulnerability in Google Android In all Qualcomm products with Android releases from CAF using the Linux kernel, an audio client pointer is dereferenced before being checked if it is valid. | 5.5 |
2017-08-18 | CVE-2017-0687 | Unspecified vulnerability in Google Android A denial of service vulnerability in the Android media framework (libavc). | 5.5 |
2017-08-16 | CVE-2016-5858 | Information Exposure vulnerability in Google Android In an ioctl handler in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, if a user supplies a value too large, then an out-of-bounds read occurs. | 4.7 |
2017-08-16 | CVE-2016-5855 | Information Exposure vulnerability in Google Android In a driver in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, a user-supplied buffer is casted to a structure without checking if the source buffer is large enough. | 4.7 |