|Improper Restriction of Operations within the Bounds of a Memory Buffer||
|Improper Input Validation|
|Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')|
|Permissions, Privileges, and Access Controls|
|Improper Control of Generation of Code ('Code Injection')|
|Vulnerability||Severity Score||Release Date||Summary|
|CVE-2013-4787||9.3||July 9, 2013||
Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic signature, probably involving multiple entries in a Zip file with the same name in which one entry is validated but the other entry is installed, aka Android security bug 8219321 and the "Master Key" vulnerability.
|CVE-2013-6271||8.8||Dec. 14, 2013||
Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android.settings.ChooseLockGeneric class with the PASSWORD_QUALITY_UNSPECIFIED option.
|CVE-2013-6774||10.0||March 31, 2014||
Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and earlier, CyanogenMod/ClockWorkMod/Koush Superuser package 126.96.36.199 for Android 4.2.x and earlier, and Chainfire SuperSU package before 1.69 for Android 4.2.x and earlier allows attackers to load an arbitrary .jar file and gain privileges via a crafted BOOTCLASSPATH environment variable for a /system/xbin/su process. NOTE: another researcher was unable to reproduce this with ChainsDD Superuser.
|CVE-2013-6768||5.0||March 31, 2014||
Untrusted search path vulnerability in the CyanogenMod/ClockWorkMod/Koush Superuser package 188.8.131.52 for Android 4.2.x and earlier allows attackers to trigger the launch of a Trojan horse app_process program via a crafted PATH environment variable for a /system/xbin/su process.
|CVE-2013-6775||10.0||March 31, 2014||
The Chainfire SuperSU package before 1.69 for Android allows attackers to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su.
|CVE-2014-1939||7.5||March 2, 2014||
|CVE-2014-1979||6.8||March 19, 2014||
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.
|CVE-2012-5248||10.0||Oct. 9, 2012||
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 184.108.40.206 on Linux, before 220.127.116.11 on Android 2.x and 3.x, and before 18.104.22.168 on Android 4.x; Adobe AIR before 22.214.171.12410; and Adobe AIR SDK before 126.96.36.19910 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
|CVE-2013-3361||10.0||Sept. 12, 2013||
Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 188.8.131.520 on Linux, before 184.108.40.206 on Android 2.x and 3.x, and before 220.127.116.11 on Android 4.x; Adobe AIR before 18.104.22.1680; and Adobe AIR SDK & Compiler before 22.214.171.1240 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3362, CVE-2013-3363, and CVE-2013-5324.
|CVE-2013-3642||4.3||June 16, 2013||
The Angel Browser application 1.47b and earlier for Android 1.6 through 2.1, 1.62b and earlier for Android 2.2 through 2.3.4, 1.68b and earlier for Android 3.0 through 4.0.3, and 1.76b and earlier for Android 4.1 through 4.2 does not properly implement the WebView class, which allows attackers to obtain sensitive information via a crafted application.