Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-7911

EPSS 82.19% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-7911

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Android 权限许可和访问控制漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Google Chrome是美国谷歌(Google)公司开发的一款Web浏览器。Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。 Android 5.0.0之前版本的java.io.ObjectInputStream实现中的luni/src/main/java/java/io/ObjectInputStream.java文件存在安全漏洞,该漏洞源于程序没有检查反序列化的对象是否可以序列化。攻击者可借助序列化对象的finalize方
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-7911

#POC DescriptionSource LinkShenlong Link
1Local root exploit for Nexus5 Android 4.4.4(KTU84P)https://github.com/retme7/CVE-2014-7911_pocPOC Details
2Nonehttps://github.com/ele7enxxh/CVE-2014-7911POC Details
3Nonehttps://github.com/heeeeen/CVE-2014-7911pocPOC Details
4exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;https://github.com/GeneBlue/cve-2014-7911-expPOC Details
5vulnerabilities‘ Poc and Exploithttps://github.com/koozxcv/CVE-2014-7911POC Details
6CVE-2014-7911 vulnerability and CVE-2014-4322 vulnerability to get root privilege!https://github.com/koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilegePOC Details
7exp for cve-2014-7911 which can get system privillagehttps://github.com/mabin004/cve-2014-7911POC Details
8Nonehttps://github.com/CytQ/CVE-2014-7911_pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-7911

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-12-15 · 27 CVEs total

CVE-2014-8507Android WAPPushManager模块SQL注入漏洞
CVE-2014-9386Zenoss Core 会话劫持漏洞
CVE-2014-9385Zenoss Core 跨站请求伪造漏洞
CVE-2014-9252Zenoss Core 信息泄露漏洞
CVE-2014-9251Zenoss Core 加密问题漏洞
CVE-2014-9250Zenoss Core 信息泄露漏洞
CVE-2014-9249Zenoss Core 信息泄露漏洞
CVE-2014-9248Zenoss Core 加密问题漏洞
CVE-2014-9247Zenoss Core 用户枚举漏洞
CVE-2014-9245Zenoss Core 信息泄露漏洞
CVE-2014-8967Microsoft Internet Explorer 释放后重用漏洞
CVE-2014-8610Android 信息泄露漏洞
CVE-2014-8609Android Settings应用程序权限许可和访问控制漏洞
CVE-2014-1569Mozilla Network Security Services 安全绕过漏洞
CVE-2014-6261Zenoss Core 代码注入漏洞
CVE-2014-6260Zenoss Core 权限许可和访问控制漏洞
CVE-2014-6259Zenoss 拒绝服务漏洞
CVE-2014-6258Zenoss Core 拒绝服务漏洞
CVE-2014-6257Zenoss Core 权限许可和访问控制漏洞
CVE-2014-6256Zenoss Core 权限许可和访问控制漏洞

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2014-7911

No comments yet


Leave a comment