Show filters
14 Total Results
Displaying 1-10 of 14
Sort by:
Attacker Value
Unknown

CVE-2016-1155

Disclosure Date: April 13, 2017 (last updated November 26, 2024)
HTTP header injection vulnerability in the URLConnection class in Android OS 2.2 through 6.0 allows remote attackers to execute arbitrary scripts or set arbitrary values in cookies.
0
Attacker Value
Unknown

CVE-2014-7920

Disclosure Date: April 13, 2017 (last updated November 08, 2023)
mediaserver in Android 2.2 through 5.x before 5.1 allows attackers to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7921.
0
Attacker Value
Unknown

CVE-2014-7911

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291.
0
Attacker Value
Unknown

CVE-2014-8507

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
Multiple SQL injection vulnerabilities in the queryLastApp method in packages/WAPPushManager/src/com/android/smspush/WapPushManager.java in the WAPPushManager module in Android before 5.0.0 allow remote attackers to execute arbitrary SQL commands, and consequently launch an activity or service, via the (1) wapAppId or (2) contentType field of a PDU for a malformed WAPPush message, aka Bug 17969135.
0
Attacker Value
Unknown

CVE-2014-8610

Disclosure Date: December 15, 2014 (last updated October 05, 2023)
AndroidManifest.xml in Android before 5.0.0 does not require the SEND_SMS permission for the SmsReceiver receiver, which allows attackers to send stored SMS messages, and consequently transmit arbitrary new draft SMS messages or trigger additional per-message charges from a network operator for old messages, via a crafted application that broadcasts an intent with the com.android.mms.transaction.MESSAGE_SENT action, aka Bug 17671795.
0
Attacker Value
Unknown

CVE-2013-7373

Disclosure Date: April 29, 2014 (last updated October 05, 2023)
Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
0
Attacker Value
Unknown

CVE-2013-4787

Disclosure Date: July 09, 2013 (last updated October 05, 2023)
Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic signature, probably involving multiple entries in a Zip file with the same name in which one entry is validated but the other entry is installed, aka Android security bug 8219321 and the "Master Key" vulnerability.
0
Attacker Value
Unknown

CVE-2011-1350

Disclosure Date: February 05, 2013 (last updated October 05, 2023)
The PowerVR SGX driver in Android before 2.3.6 allows attackers to obtain potentially sensitive information from kernel stack memory via an application that uses a crafted length parameter in a request to the pvrsrvkm device.
0
Attacker Value
Unknown

CVE-2011-1352

Disclosure Date: February 05, 2013 (last updated October 05, 2023)
The PowerVR SGX driver in Android before 2.3.6 allows attackers to gain root privileges via an application that triggers kernel memory corruption using crafted user data to the pvrsrvkm device.
0
Attacker Value
Unknown

CVE-2012-4220

Disclosure Date: November 30, 2012 (last updated October 05, 2023)
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
0