|Improper Restriction of Operations within the Bounds of a Memory Buffer||
|Improper Input Validation|
|Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')|
|Permissions, Privileges, and Access Controls|
|Improper Control of Generation of Code ('Code Injection')|
|Vulnerability||Severity Score||Release Date||Summary|
|CVE-2013-4787||9.3||July 9, 2013||
Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic signature, probably involving multiple entries in a Zip file with the same name in which one entry is validated but the other entry is installed, aka Android security bug 8219321 and the "Master Key" vulnerability.
|CVE-2013-6271||8.8||Dec. 14, 2013||
Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android.settings.ChooseLockGeneric class with the PASSWORD_QUALITY_UNSPECIFIED option.
|CVE-2013-6774||10.0||March 31, 2014||
Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and earlier, CyanogenMod/ClockWorkMod/Koush Superuser package 220.127.116.11 for Android 4.2.x and earlier, and Chainfire SuperSU package before 1.69 for Android 4.2.x and earlier allows attackers to load an arbitrary .jar file and gain privileges via a crafted BOOTCLASSPATH environment variable for a /system/xbin/su process. NOTE: another researcher was unable to reproduce this with ChainsDD Superuser.
|CVE-2013-6768||5.0||March 31, 2014||
Untrusted search path vulnerability in the CyanogenMod/ClockWorkMod/Koush Superuser package 18.104.22.168 for Android 4.2.x and earlier allows attackers to trigger the launch of a Trojan horse app_process program via a crafted PATH environment variable for a /system/xbin/su process.
|CVE-2013-6775||10.0||March 31, 2014||
The Chainfire SuperSU package before 1.69 for Android allows attackers to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su.
|CVE-2014-1939||7.5||March 2, 2014||
|CVE-2014-1979||6.8||March 19, 2014||
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.
|CVE-2012-5248||10.0||Oct. 9, 2012||
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 22.214.171.124 on Linux, before 126.96.36.199 on Android 2.x and 3.x, and before 188.8.131.52 on Android 4.x; Adobe AIR before 184.108.40.20610; and Adobe AIR SDK before 220.127.116.1110 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
|CVE-2013-3361||10.0||Sept. 12, 2013||
Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 18.104.22.1680 on Linux, before 22.214.171.124 on Android 2.x and 3.x, and before 126.96.36.199 on Android 4.x; Adobe AIR before 188.8.131.520; and Adobe AIR SDK & Compiler before 184.108.40.2060 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3362, CVE-2013-3363, and CVE-2013-5324.
|CVE-2013-3642||4.3||June 16, 2013||
The Angel Browser application 1.47b and earlier for Android 1.6 through 2.1, 1.62b and earlier for Android 2.2 through 2.3.4, 1.68b and earlier for Android 3.0 through 4.0.3, and 1.76b and earlier for Android 4.1 through 4.2 does not properly implement the WebView class, which allows attackers to obtain sensitive information via a crafted application.