Vulnerabilities > Google > Android > 4.1.1

DATE CVE VULNERABILITY TITLE RISK
2014-12-15 CVE-2014-8609 Permissions, Privileges, and Access Controls vulnerability in Google Android
The addAccount method in src/com/android/settings/accounts/AddAccountSettings.java in the Settings application in Android before 5.0.0 does not properly create a PendingIntent, which allows attackers to use the SYSTEM uid for broadcasting an intent with arbitrary component, action, or category information via a third-party authenticator in a crafted application, aka Bug 17356824.
local
low complexity
google CWE-264
7.2
2014-12-15 CVE-2014-8507 SQL Injection vulnerability in Google Android
Multiple SQL injection vulnerabilities in the queryLastApp method in packages/WAPPushManager/src/com/android/smspush/WapPushManager.java in the WAPPushManager module in Android before 5.0.0 allow remote attackers to execute arbitrary SQL commands, and consequently launch an activity or service, via the (1) wapAppId or (2) contentType field of a PDU for a malformed WAPPush message, aka Bug 17969135.
network
low complexity
google CWE-89
7.5
2014-09-04 CVE-2014-6060 Resource Management Errors vulnerability in multiple products
The get_option function in dhcpcd 4.0.0 through 6.x before 6.4.3 allows remote DHCP servers to cause a denial of service by resetting the DHO_OPTIONSOVERLOADED option in the (1) bootfile or (2) servername section, which triggers the option to be processed again.
low complexity
dhcpcd-project google CWE-399
3.3
2014-04-29 CVE-2013-7373 Information Exposure vulnerability in Google Android
Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
network
low complexity
google CWE-200
7.5
2014-04-29 CVE-2013-7372 Cryptographic Issues vulnerability in multiple products
The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android before 4.4 and other products, when no seed is provided by the user, uses an incorrect offset value, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging the resulting PRNG predictability, as exploited in the wild against Bitcoin wallet applications in August 2013.
network
low complexity
apache google CWE-310
5.0
2014-03-03 CVE-2014-1939 Code Injection vulnerability in multiple products
java/android/webkit/BrowserFrame.java in Android before 4.4 uses the addJavascriptInterface API in conjunction with creating an object of the SearchBoxImpl class, which allows attackers to execute arbitrary Java code by leveraging access to the searchBoxJavaBridge_ interface at certain Android API levels.
network
low complexity
google lenovo CWE-94
7.5