Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2014-7911
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Android 权限许可和访问控制漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Google Chrome是美国谷歌(Google)公司开发的一款Web浏览器。Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。 Android 5.0.0之前版本的java.io.ObjectInputStream实现中的luni/src/main/java/java/io/ObjectInputStream.java文件存在安全漏洞,该漏洞源于程序没有检查反序列化的对象是否可以序列化。攻击者可借助序列化对象的finalize方
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2014-7911
#POC DescriptionSource LinkShenlong Link
1Local root exploit for Nexus5 Android 4.4.4(KTU84P)https://github.com/retme7/CVE-2014-7911_pocPOC Details
2Nonehttps://github.com/ele7enxxh/CVE-2014-7911POC Details
3Nonehttps://github.com/heeeeen/CVE-2014-7911pocPOC Details
4exploit for cve-2014-7911; android; java deserialization ;system privilege;ace;https://github.com/GeneBlue/cve-2014-7911-expPOC Details
5vulnerabilities‘ Poc and Exploithttps://github.com/koozxcv/CVE-2014-7911POC Details
6CVE-2014-7911 vulnerability and CVE-2014-4322 vulnerability to get root privilege!https://github.com/koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilegePOC Details
7exp for cve-2014-7911 which can get system privillagehttps://github.com/mabin004/cve-2014-7911POC Details
8Nonehttps://github.com/CytQ/CVE-2014-7911_pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2014-7911
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2014-7911

No comments yet


Leave a comment