Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 3.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2011-2344
Android Picasa in Android 3.0 and 2.x up to and including 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote malicious users to gain privileges and access private pictures and web albums by sniffing the token from co...
Google Android 2.1
Google Android 2.3
Google Android 2.3.3
Google Android 3.0
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
7.2
CVSSv2
CVE-2011-1823
The vold volume manager daemon on Android 3.0 and 2.x prior to 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in t...
Google Android 2.2.3
Google Android 2.1
Google Android 2.3
Google Android 2.3.3
Google Android 3.0
Google Android 2.3.1
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.2
9.3
CVSSv2
CVE-2013-4710
Android 3.0 up to and including 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote malicious users to execute arbitrary methods of Java objects or cause a denial of service (reboot) via...
Google Android 4.0
Google Android 3.2.6
Google Android 3.2.4
Google Android 3.2.2
Google Android 4.0.4
Google Android 4.0.2
Google Android 3.2
Google Android 3.0
Google Android 4.1.2
Google Android 4.1
Google Android 4.0.3
Google Android 4.0.1
Google Android 3.2.1
Google Android 3.1
2 EDB exploits
2 Github repositories
1 Article
6.8
CVSSv2
CVE-2012-4220
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses cr...
Google Android 2.3.3
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
Google Android 2.3
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
3 Github repositories
6.8
CVSSv2
CVE-2012-4221
Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service via an application that uses crafted argume...
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
Google Android 2.3.7
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.3
Google Android 2.3.5
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
4.3
CVSSv2
CVE-2012-4222
drivers/gpu/msm/kgsl.c in the Qualcomm Innovation Center (QuIC) Graphics KGSL kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to cause a denial of service (NULL pointer dereference) via an application that uses crafted arguments in a local kgsl_i...
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 3.2.2
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.6
Google Android 4.0
Google Android 4.0.1
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 2.3.3
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.0.2
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.2
6.8
CVSSv2
CVE-2012-6636
The Android API prior to 17 does not properly restrict the WebView.addJavascriptInterface method, which allows remote malicious users to execute arbitrary methods of Java objects by using the Java Reflection API within crafted JavaScript code that is loaded into the WebView compo...
Google Android Api 6.0
Google Android Api 15.0
Google Android Api 3.0
Google Android Api 8.0
Google Android Api 11.0
Google Android Api 9.0
Google Android Api 2.0
Google Android Api 12.0
Google Android Api 7.0
Google Android Api 1.0
Google Android Api 13.0
Google Android Api 14.0
Google Android Api 4.0
Google Android Api
Google Android Api 5.0
Google Android Api 10.0
1 EDB exploit
4 Github repositories
1 Article
9.3
CVSSv2
CVE-2013-4787
Android 1.6 Donut up to and including 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows malicious users to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic s...
Google Android 2.3.3
Google Android 2.3.4
Google Android 4.0
Google Android 4.1.2
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.0.2
Google Android 4.2
Google Android 4.0.1
Google Android 2.3
Google Android 2.2.2
Google Android 1.6
Google Android 2.1
Google Android 3.1
Google Android 2.3.2
Google Android 3.2.2
Google Android 3.2.1
Google Android 2.2.1
Google Android 2.3.5
Google Android 2.2
Google Android 2.3.6
Google Android 3.0
1 EDB exploit
7.8
CVSSv2
CVE-2011-3918
The Zygote process in Android 4.0.3 and previous versions accepts fork requests from processes with arbitrary UIDs, which allows remote malicious users to cause a denial of service (reboot loop) via a crafted application.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 1.6
Google Android 2.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 1.5
Google Android 3.1
Google Android 2.2.1
Google Android 2.2.2
1 EDB exploit
10
CVSSv2
CVE-2014-7920
mediaserver in Android 2.2 up to and including 5.x prior to 5.1 allows malicious users to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7921.
Google Android 2.2.3
Google Android 3.2.6
Google Android 4.2
Google Android 4.1
Google Android 3.2.4
Google Android 5.0.2
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 4.4.4
Google Android 3.0
Google Android 4.2.1
Google Android 2.3.1
Google Android 2.3.5
Google Android 5.0.1
2 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »