Google

Android

7930 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.52%
  • Veröffentlicht 01.10.2015 00:59:26
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Region_createFromParcel function in core/jni/android/graphics/Region.cpp in Region in Android before 5.1.1 LMY48M does not check the return values of certain read operations, which allows attackers to execute arbitrary code via an application tha...

  • EPSS 0.11%
  • Veröffentlicht 01.10.2015 00:59:25
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different applic...

  • EPSS 0.11%
  • Veröffentlicht 01.10.2015 00:59:24
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The getProcessRecordLocked method in services/core/java/com/android/server/am/ActivityManagerService.java in ActivityManager in Android before 5.1.1 LMY48I allows attackers to trigger incorrect process loading via a crafted application, as demonstrat...

  • EPSS 0.49%
  • Veröffentlicht 01.10.2015 00:59:23
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SIM Toolkit (STK) framework in Android before 5.1.1 LMY48I allows attackers to (1) intercept or (2) emulate unspecified Telephony STK SIM commands via an application that sends a crafted Intent, related to com/android/internal/telephony/cat/AppIn...

  • EPSS 0.47%
  • Veröffentlicht 01.10.2015 00:59:22
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple heap-based buffer overflows in libeffects in the Audio Policy Service in mediaserver in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application, aka internal bug 21953516.

  • EPSS 0.79%
  • Veröffentlicht 01.10.2015 00:59:21
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The OpenSSLX509Certificate class in org/conscrypt/OpenSSLX509Certificate.java in Android before 5.1.1 LMY48I improperly includes certain context data during serialization and deserialization, which allows attackers to execute arbitrary code via an ap...

  • EPSS 4.34%
  • Veröffentlicht 01.10.2015 00:59:20
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Parse_wave function in arm-wt-22k/lib_src/eas_mdls.c in the Sonivox DLS-to-EAS converter in Android before 5.1.1 LMY48I does not reject a negative value for a certain size field, which allows remote attackers to execute arbitrary code or cause a ...

  • EPSS 0.7%
  • Veröffentlicht 01.10.2015 00:59:19
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the OMXNodeInstance::emptyBuffer function in omx/OMXNodeInstance.cpp in libstagefright in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 20634516.

  • EPSS 0.19%
  • Veröffentlicht 01.10.2015 00:59:18
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in the BnHDCP::onTransact function in media/libmedia/IHDCP.cpp in libstagefright in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application that uses HDCP encryption, leading to a hea...

  • EPSS 0.13%
  • Veröffentlicht 01.10.2015 00:59:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The getRunningAppProcesses function in services/core/java/com/android/server/am/ActivityManagerService.java in Android before 5.1.1 LMY48I allows attackers to bypass intended getRecentTasks restrictions and discover the name of the foreground applica...