Google

Android

7895 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 8.97%
  • Veröffentlicht 16.02.2015 00:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that tr...

Exploit
  • EPSS 5.76%
  • Veröffentlicht 17.12.2014 11:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access t...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 15.12.2014 18:59:19
  • Zuletzt bearbeitet 12.04.2025 10:46:40

AndroidManifest.xml in Android before 5.0.0 does not require the SEND_SMS permission for the SmsReceiver receiver, which allows attackers to send stored SMS messages, and consequently transmit arbitrary new draft SMS messages or trigger additional pe...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 15.12.2014 18:59:18
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The addAccount method in src/com/android/settings/accounts/AddAccountSettings.java in the Settings application in Android before 5.0.0 does not properly create a PendingIntent, which allows attackers to use the SYSTEM uid for broadcasting an intent w...

Exploit
  • EPSS 3.4%
  • Veröffentlicht 15.12.2014 18:59:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple SQL injection vulnerabilities in the queryLastApp method in packages/WAPPushManager/src/com/android/smspush/WapPushManager.java in the WAPPushManager module in Android before 5.0.0 allow remote attackers to execute arbitrary SQL commands, an...

  • EPSS 82.19%
  • Veröffentlicht 15.12.2014 18:59:15
  • Zuletzt bearbeitet 12.04.2025 10:46:40

luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attacker...

  • EPSS 0.14%
  • Veröffentlicht 04.09.2014 17:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The get_option function in dhcpcd 4.0.0 through 6.x before 6.4.3 allows remote DHCP servers to cause a denial of service by resetting the DHO_OPTIONSOVERLOADED option in the (1) bootfile or (2) servername section, which triggers the option to be proc...

Exploit
  • EPSS 1.04%
  • Veröffentlicht 02.07.2014 04:14:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Stack-based buffer overflow in the encode_key function in /system/bin/keystore in the KeyStore service in Android 4.3 allows attackers to execute arbitrary code, and consequently obtain sensitive key information or bypass intended restrictions on cry...

  • EPSS 0.19%
  • Veröffentlicht 14.05.2014 00:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Android OS before 2.2 does not display the correct SSL certificate in certain cases, which might allow remote attackers to spoof trusted web sites via a web page containing references to external sources in which (1) the certificate of the last loade...

  • EPSS 0.23%
  • Veröffentlicht 29.04.2014 20:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.