Samsung

Samsung Mobile

65 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.76%
  • Published 23.03.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

The kbase_dispatch function in arm/t7xx/r5p0/mali_kbase_core_linux.c in the GPU driver on Samsung devices with M(6.0) and N(7.0) software and Exynos AP chipsets allows attackers to have unspecified impact via unknown vectors, which trigger an out-of-...

  • EPSS 0.56%
  • Published 13.02.2017 18:59:00
  • Last modified 20.04.2025 01:37:25

Samsung devices with Android KK(4.4), L(5.0/5.1), or M(6.0) allow attackers to cause a denial of service (system crash) via a crafted system call to TvoutService_C.

  • EPSS 0.05%
  • Published 13.02.2017 18:59:00
  • Last modified 20.04.2025 01:37:25

Samsung devices with Android KK(4.4) or L(5.0/5.1) allow local users to cause a denial of service (IAndroidShm service crash) via crafted data in a service call.

  • EPSS 0.04%
  • Published 01.02.2017 15:59:00
  • Last modified 20.04.2025 01:37:25

Array index error in the msm_sensor_config function in kernel/SM-G9008V_CHN_KK_Opensource/Kernel/drivers/media/platform/msm/camera_v2/sensor/msm_sensor.c in Samsung devices with Android KK(4.4) or L and an APQ8084, MSM8974, or MSM8974pro chipset allo...

  • EPSS 0.13%
  • Published 18.01.2017 17:59:00
  • Last modified 20.04.2025 01:37:25

The SmartCall Activity component in Telecom application on Samsung Note device L(5.0/5.1) and M(6.0) allows attackers to cause a denial of service (crash and reboot) or possibly gain privileges via a malformed serializable object.

  • EPSS 0.13%
  • Published 18.01.2017 17:59:00
  • Last modified 20.04.2025 01:37:25

The SpamCall Activity component in Telecom application on Samsung Note device L(5.0/5.1) and M(6.0) allows attackers to cause a denial of service (crash and reboot) or possibly gain privileges via a malformed serializable object.

  • EPSS 0.36%
  • Published 12.01.2017 06:59:00
  • Last modified 20.04.2025 01:37:25

Samsung Note devices with KK(4.4), L(5.0/5.1), and M(6.0) software allow attackers to crash the system by creating an arbitrarily large number of active VR service threads. The Samsung ID is SVE-2016-7650.

  • EPSS 0.54%
  • Published 12.01.2017 06:59:00
  • Last modified 20.04.2025 01:37:25

Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allow attackers to crash systemUI by leveraging incomplete exception handling. The Samsung ID is SVE-2016-7122.

  • EPSS 0.15%
  • Published 09.01.2017 08:59:00
  • Last modified 20.04.2025 01:37:25

Installing a zero-permission Android application on certain Samsung Android devices with KK(4.4), L(5.0/5.1), and M(6.0) software can continually crash the system_server process in the Android OS. The zero-permission app will create an active install...

  • EPSS 0.49%
  • Published 16.12.2016 09:59:00
  • Last modified 12.04.2025 10:46:40

Lack of appropriate exception handling in some receivers of the Telecom application on Samsung Note devices with L(5.0/5.1), M(6.0), and N(7.0) software allows attackers to crash the system easily resulting in a possible DoS attack, or possibly gain ...