Google

Android

8032 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 03.03.2014 04:50:46
  • Zuletzt bearbeitet 12.04.2025 10:46:40

java/android/webkit/BrowserFrame.java in Android before 4.4 uses the addJavascriptInterface API in conjunction with creating an object of the SearchBoxImpl class, which allows attackers to execute arbitrary Java code by leveraging access to the searc...

Exploit
  • EPSS 21.72%
  • Veröffentlicht 14.12.2013 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android.settings.ChooseLockGeneric class with the PASSWOR...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 25.09.2013 10:31:29
  • Zuletzt bearbeitet 11.04.2025 00:51:21

A certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless uses init to create a /dev/socket/init_runit socket that listens for shell commands, which allows local users to gain privileges by interacting with a LocalS...

  • EPSS 0.07%
  • Veröffentlicht 25.09.2013 10:31:29
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the sub_E110 function in init in a certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless allows local users to gain privileges or cause a denial of service (memory corruption) by wri...

  • EPSS 52.6%
  • Veröffentlicht 09.07.2013 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cry...

  • EPSS 0.08%
  • Veröffentlicht 29.05.2013 14:29:09
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The LG Hidden Menu component for Android on the LG Optimus G E973 allows physically proximate attackers to execute arbitrary commands by entering USB Debugging mode, using Android Debug Bridge (adb) to establish a USB connection, dialing 3845#*973#, ...

  • EPSS 4.05%
  • Veröffentlicht 05.02.2013 15:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The PowerVR SGX driver in Android before 2.3.6 allows attackers to obtain potentially sensitive information from kernel stack memory via an application that uses a crafted length parameter in a request to the pvrsrvkm device.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 05.02.2013 15:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The PowerVR SGX driver in Android before 2.3.6 allows attackers to gain root privileges via an application that triggers kernel memory corruption using crafted user data to the pvrsrvkm device.

Exploit
  • EPSS 43.03%
  • Veröffentlicht 10.12.2012 20:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Browser application in Android 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted market: URI in the SRC attribute of an IFRAME element.

  • EPSS 17.84%
  • Veröffentlicht 30.11.2012 12:54:16
  • Zuletzt bearbeitet 11.04.2025 00:51:21

diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application ...