Samsung Galaxy J6+ Phone

Platform Information https://www.samsung.com/nz/smartphones/galaxy-j6-j610-spark/SM-J610GZAATNZ/
Search Engine Search on Google
End of Sales -
End of Support -
Wired Connection -
Wireless Connection Yes
Fingerprinting Source BROWSER MAC OUI NIC VENDOR
Added at Jan 08, 2019
Manufacturer Name SAMSUNG ELECTRONICS CO., LTD.
Homepage http://www.samsung.com
Headquarters Korea (Republic of)
Business Status Ongoing

Platform’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
No records found.
Manufacturer’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2018-10751
05/29/2018
MEDIUM
MEDIUM
A malformed OMACP WAP push message can cause memory corruption on a Samsung S7 Edge device when processing the String Extension portion of the WbXml payload. This is due to an integer overflow in memory allocation for this string. The Samsung ID is SVE-2018-11463.
CVE-2018-9143
03/30/2018
CRITICAL
HIGH
On Samsung mobile devices with M(6.0) and N(7.x) software, a heap overflow in the sensorhub binder service leads to code execution in a privileged process, aka SVE-2017-10991.
CVE-2018-9142
03/30/2018
HIGH
HIGH
On Samsung mobile devices with N(7.x) software, attackers can install an arbitrary APK in the Secure Folder SD Card area because of faulty validation of a package signature and package name, aka SVE-2017-10932.
CVE-2018-9141
03/30/2018
HIGH
HIGH
On Samsung mobile devices with L(5.x), M(6.0), and N(7.x) software, Gallery allows remote attackers to execute arbitrary code via a BMP file with a crafted resolution, aka SVE-2017-11105.
CVE-2018-9140
03/30/2018
MEDIUM
MEDIUM
On Samsung mobile devices with M(6.0) software, the Email application allows XSS via an event attribute and arbitrary file loading via a src attribute, aka SVE-2017-10747.