You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Multiple SQL injection vulnerabilities in the queryLastApp method in packages/WAPPushManager/src/com/android/smspush/WapPushManager.java in the WAPPushManager module in Android before 5.0.0 allow remote attackers to execute arbitrary SQL commands, and consequently launch an activity or service, via the (1) wapAppId or (2) contentType field of a PDU for a malformed WAPPush message, aka Bug 17969135.
CVE-2014-8507 - High Severity Vulnerability
Vulnerable Library - basejb-mr1.1-dev
Library home page: https://android.googlesource.com/platform/frameworks/base
Found in HEAD commit: 8f34e6b923df3b4968e0a767f6dec326066356db
Found in base branch: master
Vulnerable Source Files (2)
/packages/WAPPushManager/src/com/android/smspush/WapPushManager.java
/packages/WAPPushManager/src/com/android/smspush/WapPushManager.java
Vulnerability Details
Multiple SQL injection vulnerabilities in the queryLastApp method in packages/WAPPushManager/src/com/android/smspush/WapPushManager.java in the WAPPushManager module in Android before 5.0.0 allow remote attackers to execute arbitrary SQL commands, and consequently launch an activity or service, via the (1) wapAppId or (2) contentType field of a PDU for a malformed WAPPush message, aka Bug 17969135.
Publish Date: 2014-12-15
URL: CVE-2014-8507
CVSS 3 Score Details (7.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8507
Release Date: 2014-12-15
Fix Resolution: 5.0.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: