Google

Android

7895 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.72%
  • Veröffentlicht 29.04.2014 20:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptogr...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 31.03.2014 14:58:57
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.3 and 4.4 does not properly restrict the set of users who can execute /system/xbin/su with the --daemon option, which allows attackers to gain privileges by leveraging ADB she...

  • EPSS 75.99%
  • Veröffentlicht 03.03.2014 04:50:46
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Android 3.0 through 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote attackers to execute arbitrary methods of Java objects or cause a denial of service ...

  • EPSS 0.19%
  • Veröffentlicht 03.03.2014 04:50:46
  • Zuletzt bearbeitet 12.04.2025 10:46:40

java/android/webkit/BrowserFrame.java in Android before 4.4 uses the addJavascriptInterface API in conjunction with creating an object of the SearchBoxImpl class, which allows attackers to execute arbitrary Java code by leveraging access to the searc...

Exploit
  • EPSS 20.65%
  • Veröffentlicht 14.12.2013 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android.settings.ChooseLockGeneric class with the PASSWOR...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 25.09.2013 10:31:29
  • Zuletzt bearbeitet 11.04.2025 00:51:21

A certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless uses init to create a /dev/socket/init_runit socket that listens for shell commands, which allows local users to gain privileges by interacting with a LocalS...

  • EPSS 0.07%
  • Veröffentlicht 25.09.2013 10:31:29
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the sub_E110 function in init in a certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless allows local users to gain privileges or cause a denial of service (memory corruption) by wri...

  • EPSS 52.6%
  • Veröffentlicht 09.07.2013 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cry...

  • EPSS 0.08%
  • Veröffentlicht 29.05.2013 14:29:09
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The LG Hidden Menu component for Android on the LG Optimus G E973 allows physically proximate attackers to execute arbitrary commands by entering USB Debugging mode, using Android Debug Bridge (adb) to establish a USB connection, dialing 3845#*973#, ...

  • EPSS 4.05%
  • Veröffentlicht 05.02.2013 15:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The PowerVR SGX driver in Android before 2.3.6 allows attackers to obtain potentially sensitive information from kernel stack memory via an application that uses a crafted length parameter in a request to the pvrsrvkm device.