Google

Android

7930 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 82.19%
  • Veröffentlicht 15.12.2014 18:59:15
  • Zuletzt bearbeitet 12.04.2025 10:46:40

luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attacker...

  • EPSS 0.14%
  • Veröffentlicht 04.09.2014 17:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The get_option function in dhcpcd 4.0.0 through 6.x before 6.4.3 allows remote DHCP servers to cause a denial of service by resetting the DHO_OPTIONSOVERLOADED option in the (1) bootfile or (2) servername section, which triggers the option to be proc...

Exploit
  • EPSS 1.04%
  • Veröffentlicht 02.07.2014 04:14:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Stack-based buffer overflow in the encode_key function in /system/bin/keystore in the KeyStore service in Android 4.3 allows attackers to execute arbitrary code, and consequently obtain sensitive key information or bypass intended restrictions on cry...

  • EPSS 0.19%
  • Veröffentlicht 14.05.2014 00:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Android OS before 2.2 does not display the correct SSL certificate in certain cases, which might allow remote attackers to spoof trusted web sites via a web page containing references to external sources in which (1) the certificate of the last loade...

  • EPSS 0.23%
  • Veröffentlicht 29.04.2014 20:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.

Exploit
  • EPSS 0.72%
  • Veröffentlicht 29.04.2014 20:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptogr...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 31.03.2014 14:58:57
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.3 and 4.4 does not properly restrict the set of users who can execute /system/xbin/su with the --daemon option, which allows attackers to gain privileges by leveraging ADB she...

  • EPSS 75.99%
  • Veröffentlicht 03.03.2014 04:50:46
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Android 3.0 through 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote attackers to execute arbitrary methods of Java objects or cause a denial of service ...

  • EPSS 0.19%
  • Veröffentlicht 03.03.2014 04:50:46
  • Zuletzt bearbeitet 12.04.2025 10:46:40

java/android/webkit/BrowserFrame.java in Android before 4.4 uses the addJavascriptInterface API in conjunction with creating an object of the SearchBoxImpl class, which allows attackers to execute arbitrary Java code by leveraging access to the searc...

Exploit
  • EPSS 21.72%
  • Veröffentlicht 14.12.2013 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android.settings.ChooseLockGeneric class with the PASSWOR...