Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 2.3 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2011-4276
The Bluetooth service (com/android/phone/BluetoothHeadsetService.java) in Android 2.3 prior to 2.3.6 allows remote attackers within Bluetooth range to obtain contact data via an AT phonebook transfer.
Google Android 2.3.5
Google Android 2.3.3
Google Android 2.3
Google Android 2.3.4
5
CVSSv2
CVE-2011-0680
data/WorkingMessage.java in the Mms application in Android prior to 2.2.2 and 2.3.x prior to 2.3.2 does not properly manage the draft cache, which allows remote malicious users to read SMS messages intended for other recipients in opportunistic circumstances via a standard text m...
Google Android 1.6
Google Android 2.1
Google Android 2.3
Google Android 1.5
Google Android 2.2
Google Android
4.3
CVSSv2
CVE-2010-4804
The Android browser in Android prior to 2.3.4 allows remote malicious users to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.
Google Android 1.6
Google Android 2.1
Google Android 2.3
Google Android 1.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android
1 EDB exploit
2 Github repositories
10
CVSSv2
CVE-2011-2344
Android Picasa in Android 3.0 and 2.x up to and including 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote malicious users to gain privileges and access private pictures and web albums by sniffing the token from co...
Google Android 2.1
Google Android 2.3
Google Android 2.3.3
Google Android 3.0
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
9.3
CVSSv2
CVE-2011-3874
Stack-based buffer overflow in libsysutils in Android 2.2.x up to and including 2.2.2 and 2.3.x up to and including 2.3.6 allows user-assisted remote malicious users to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wro...
Google Android 2.3
Google Android 2.3.6
Google Android 2.3.3
Google Android 2.3.1
Google Android 2.3.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
Google Android 2.3.2
7.2
CVSSv2
CVE-2011-1823
The vold volume manager daemon on Android 3.0 and 2.x prior to 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in t...
Google Android 2.2.3
Google Android 2.1
Google Android 2.3
Google Android 2.3.3
Google Android 3.0
Google Android 2.3.1
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.2
6.9
CVSSv2
CVE-2011-1352
The PowerVR SGX driver in Android prior to 2.3.6 allows malicious users to gain root privileges via an application that triggers kernel memory corruption using crafted user data to the pvrsrvkm device.
Google Android 2.3.4
Google Android 1.1
Google Android 1.0
Google Android
Google Android 2.3.3
Google Android 2.3.1
Google Android 2.0.1
Google Android 1.6
Google Android 2.2.3
Google Android 2.2.2
Google Android 2.2.1
Google Android 2.2
Google Android 2.3.2
Google Android 2.3
Google Android 2.1
Google Android 2.0
Google Android 1.5
7.1
CVSSv2
CVE-2011-1350
The PowerVR SGX driver in Android prior to 2.3.6 allows malicious users to obtain potentially sensitive information from kernel stack memory via an application that uses a crafted length parameter in a request to the pvrsrvkm device.
Google Android 2.3.4
Google Android 2.3.3
Google Android 2.3.2
Google Android 2.3.1
Google Android
Google Android 2.2.3
Google Android 2.2.1
Google Android 1.6
Google Android 1.1
Google Android 2.2
Google Android 2.1
Google Android 2.0.1
Google Android 2.0
Google Android 2.3
Google Android 2.2.2
Google Android 1.5
Google Android 1.0
1 EDB exploit
6.8
CVSSv2
CVE-2012-4220
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses cr...
Google Android 2.3.3
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
Google Android 2.3
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
3 Github repositories
6.8
CVSSv2
CVE-2012-4221
Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service via an application that uses crafted argume...
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
Google Android 2.3.7
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.3
Google Android 2.3.5
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »