Page 171 of 995 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 61EXPL: 0

The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application. La aplicación de correo NTT DOCOMO sp mode 6300 y anteriores para Android 4.0.x y 6700 y anteriores para Android 4.1 hasta 4.4 utiliza permisos débiles para adjuntos durante el procesamiento de mensajes email entrantes, lo que permite a atacantes remotos obtener información sensible a través de una aplicación manipulada. • http://jvn.jp/en/jp/JVN81739241/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 3%CPEs: 14EXPL: 3

Android 3.0 through 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote attackers to execute arbitrary methods of Java objects or cause a denial of service (reboot) via a crafted web page, as demonstrated by use of the WebView.addJavascriptInterface method, a related issue to CVE-2012-6636. Android 3.0 hasta 4.1.x en Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, y otros dispositivos no implementa debidamente la clase WebView, lo que permite a atacantes remotos ejecutar métodos arbitrarios de objetos Java o causar una denegación de servicio (reinicio) a través de una página web manipulada, tal y como se demostró mediante el uso del método WebView.addJavascriptInterface, un problema relacionado con CVE-2012-6636. • https://www.exploit-db.com/exploits/41675 https://www.exploit-db.com/exploits/31519 https://github.com/Snip3R69/CVE-2013-4710-WebView-RCE-Vulnerability http://50.56.33.56/blog/?p=314 http://emobile.jp/products/sh/a01sh/systemsoftware.html http://jvn.jp/en/jp/JVN53768697/113349/index.html http://jvn.jp/en/jp/JVN53768697/397327/index.html http://jvn.jp/en/jp/JVN53768697/995293/index.html http://jvn.jp/en/jp/JVN53768697/995312/index.html http://jvn.jp • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

java/android/webkit/BrowserFrame.java in Android before 4.4 uses the addJavascriptInterface API in conjunction with creating an object of the SearchBoxImpl class, which allows attackers to execute arbitrary Java code by leveraging access to the searchBoxJavaBridge_ interface at certain Android API levels. java/android/webkit/BrowserFrame.java en Android anterior a 4.4 utiliza la API addJavascriptInterface en conjunto con la creación de un objeto de la clase SearchBoxImpl, lo que permite a atacantes ejecutar código Java arbitrario mediante el aprovechamiento del acceso a la interfaz searchBoxJavaBridge_ en ciertos niveles API de Android. • http://blog.chromium.org/2013/11/introducing-chromium-powered-android.html http://openwall.com/lists/oss-security/2014/02/11/2 https://support.lenovo.com/us/en/product_security/len_6421 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.8EPSS: 0%CPEs: 8EXPL: 0

Directory traversal vulnerability in the tetra filer application 2.3.1 and earlier for Android 4.0.3, tetra filer free application 2.3.1 and earlier for Android 4.0.3, tetra filer application 1.5.1 and earlier for Android before 4.0.3, and tetra filer free application 1.5.1 and earlier for Android before 4.0.3 allows attackers to overwrite or create arbitrary files via unspecified vectors. Vulnerabilidad de recorrido de directorios en la aplicación tetra filer 2.3.1 y anteriores para Android 4.0.3, tetra filer free 2.3.1 y anteriores para Android 4.0.3, tetra filer 1.5.1 y anteriores para Android anteriores a 4.0.3, y tetra filer free 1.5.1 y anteriores para Android adteriores a 4.0.3 permite a atacantes sobreescribir o crear archivos de forma arbitraria a través de vectores no especificados. • http://jvn.jp/en/jp/JVN51285738/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2014-000002 https://play.google.com/store/apps/details?id=jp.main.brits.android.filer.app https://play.google.com/store/apps/details?id=jp.main.brits.android.filer.free • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 11EXPL: 2

Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android.settings.ChooseLockGeneric class with the PASSWORD_QUALITY_UNSPECIFIED option. Android 4.0 a 4.3, permite a atacantes eludir las restricciones de acceso previstas y eliminar los bloqueos del dispositivo a través de una aplicación manipulada que invoca el método updateUnlockMethodAndFinish en la clase com.android.settings.ChooseLockGeneric con la opción PASSWORD_QUALITY_UNSPECIFIED. • http://seclists.org/fulldisclosure/2013/Nov/204 http://www.securitytracker.com/id/1029410 http://www.theregister.co.uk/2013/12/10/android_has_lockbypass_bug https://cureblog.de/2013/11/cve-2013-6271-remove-device-locks-from-android-phone • CWE-264: Permissions, Privileges, and Access Controls •