Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 2.2 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2017-7376
Buffer overflow in libxml2 allows remote malicious users to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Xmlsoft Libxml2
Google Android 7.1.2
Google Android 6.0.1
Google Android 5.0.2
Google Android 5.1.1
Google Android 4.4.4
Google Android 7.1.1
Google Android 7.0
Google Android 6.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
1 Github repository
10
CVSSv2
CVE-2014-7920
mediaserver in Android 2.2 up to and including 5.x prior to 5.1 allows malicious users to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7921.
Google Android 2.2.3
Google Android 3.2.6
Google Android 4.2
Google Android 4.1
Google Android 3.2.4
Google Android 5.0.2
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 4.4.4
Google Android 3.0
Google Android 4.2.1
Google Android 2.3.1
Google Android 2.3.5
Google Android 5.0.1
2 Github repositories
10
CVSSv2
CVE-2011-2344
Android Picasa in Android 3.0 and 2.x up to and including 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote malicious users to gain privileges and access private pictures and web albums by sniffing the token from co...
Google Android 2.1
Google Android 2.3
Google Android 2.3.3
Google Android 3.0
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
10
CVSSv2
CVE-2010-2300
Use-after-free vulnerability in the Element::normalizeAttributes function in dom/Element.cpp in WebCore in WebKit in Google Chrome prior to 5.0.375.70 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to h...
Google Chrome
1 EDB exploit
10
CVSSv2
CVE-2010-1119
Use-after-free vulnerability in WebKit in Apple Safari prior to 5.0 on Mac OS X 10.5 up to and including 10.6 and Windows, Safari prior to 4.1 on Mac OS X 10.4, and Safari on Apple iPhone OS allows remote malicious users to execute arbitrary code or cause a denial of service (app...
Apple Safari 4.0.4
Apple Safari
Apple Safari 3.0.1
Apple Safari 3.0.1b
Apple Safari 3.1
Apple Safari 3.1.0
Apple Safari 3.2.3
Apple Safari 2
Apple Safari 2.0.3
Apple Safari 1.0.2
Apple Safari 1.0.3
Apple Safari 1.1.1
Apple Safari 1.2
Apple Safari 1.3.0
Apple Safari 1.3.1
Apple Safari 4.0.0b
Apple Safari 4.0
Apple Safari 4.1
Apple Safari 3.0.2
Apple Safari 3.0.2b
Apple Safari 3.1.0b
Apple Safari 3.1.1
1 EDB exploit
9.3
CVSSv2
CVE-2013-4787
Android 1.6 Donut up to and including 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows malicious users to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic s...
Google Android 2.3.3
Google Android 2.3.4
Google Android 4.0
Google Android 4.1.2
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.0.2
Google Android 4.2
Google Android 4.0.1
Google Android 2.3
Google Android 2.2.2
Google Android 1.6
Google Android 2.1
Google Android 3.1
Google Android 2.3.2
Google Android 3.2.2
Google Android 3.2.1
Google Android 2.2.1
Google Android 2.3.5
Google Android 2.2
Google Android 2.3.6
Google Android 3.0
1 EDB exploit
9.3
CVSSv2
CVE-2011-3874
Stack-based buffer overflow in libsysutils in Android 2.2.x up to and including 2.2.2 and 2.3.x up to and including 2.3.6 allows user-assisted remote malicious users to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wro...
Google Android 2.3
Google Android 2.3.6
Google Android 2.3.3
Google Android 2.3.1
Google Android 2.3.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
Google Android 2.3.2
9.3
CVSSv2
CVE-2010-1807
WebKit in Apple Safari 4.x prior to 4.1.2 and 5.x prior to 5.0.2; Android prior to 2.2; and webkitgtk prior to 1.2.6; does not properly validate floating-point data, which allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via...
Apple Safari 4.0.5
Apple Safari 4.1
Apple Safari 4.0.0b
Apple Safari 4.1.1
Apple Safari 4.0
Apple Safari 4.0.3
Apple Safari 4.0.4
Apple Safari 4.0.1
Apple Safari 4.0.2
Apple Safari 5.0.1
Apple Safari 5.0
Google Android
Google Android 1.6
Google Android 1.5
Google Android 2.0
Google Android 1.1
Google Android 1.0
Webkitgtk Webkitgtk 1.2.0
Webkitgtk Webkitgtk 1.2.2
Webkitgtk Webkitgtk 1.2.1
Webkitgtk Webkitgtk 1.2.4
Webkitgtk Webkitgtk 1.2.3
2 EDB exploits
7.8
CVSSv2
CVE-2011-3918
The Zygote process in Android 4.0.3 and previous versions accepts fork requests from processes with arbitrary UIDs, which allows remote malicious users to cause a denial of service (reboot loop) via a crafted application.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 1.6
Google Android 2.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 1.5
Google Android 3.1
Google Android 2.2.1
Google Android 2.2.2
1 EDB exploit
7.5
CVSSv2
CVE-2017-7375
A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surfa...
Xmlsoft Libxml2
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 7.0
Google Android 5.1.1
Google Android 6.0.1
Google Android 5.0.2
Google Android 7.1.1
Google Android 7.1.2
Google Android 4.4.4
Google Android 6.0
Google Android 7.0
Xmlsoft Libxml2 2.9.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »