296,172
Total vulnerabilities in the database
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
Software | From | Fixed in |
---|---|---|
google / android | 3.2.6 | 3.2.6.x |
google / android | 4.2 | 4.2.x |
google / android | 4.1 | 4.1.x |
google / android | 3.2.4 | 3.2.4.x |
google / android | 3.2 | 3.2.x |
google / android | 3.2.2 | 3.2.2.x |
google / android | 4.0.2 | 4.0.2.x |
google / android | 2.3-rev1 | 2.3-rev1.x |
google / android | 2.3.6 | 2.3.6.x |
google / android | 4.0.4 | 4.0.4.x |
google / android | 4.0.1 | 4.0.1.x |
google / android | 2.3.3 | 2.3.3.x |
google / android | 3.0 | 3.0.x |
google / android | 2.3.1 | 2.3.1.x |
google / android | 2.3.5 | 2.3.5.x |
google / android | 3.1 | 3.1.x |
google / android | 4.0.3 | 4.0.3.x |
google / android | 2.3.4 | 2.3.4.x |
google / android | 4.0 | 4.0.x |
google / android | 2.3.7 | 2.3.7.x |
google / android | 2.3.2 | 2.3.2.x |
google / android | 3.2.1 | 3.2.1.x |
google / android | 2.3 | 2.3.x |