Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 2.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-1149
Android prior to 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and...
Google Android 1.6
Google Android 2.1
Google Android 1.5
Google Android 2.2.1
Google Android 2.2
Google Android
NA
CVE-2011-0680
data/WorkingMessage.java in the Mms application in Android prior to 2.2.2 and 2.3.x prior to 2.3.2 does not properly manage the draft cache, which allows remote malicious users to read SMS messages intended for other recipients in opportunistic circumstances via a standard text m...
Google Android 1.6
Google Android 2.1
Google Android 2.3
Google Android 1.5
Google Android 2.2
Google Android
NA
CVE-2010-4804
The Android browser in Android prior to 2.3.4 allows remote malicious users to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.
Google Android 1.6
Google Android 2.1
Google Android 2.3
Google Android 1.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android
1 EDB exploit
2 Github repositories
NA
CVE-2011-2344
Android Picasa in Android 3.0 and 2.x up to and including 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote malicious users to gain privileges and access private pictures and web albums by sniffing the token from co...
Google Android 2.1
Google Android 2.3
Google Android 2.3.3
Google Android 3.0
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
NA
CVE-2011-1823
The vold volume manager daemon on Android 3.0 and 2.x prior to 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in t...
Google Android 2.2.3
Google Android 2.1
Google Android 2.3
Google Android 2.3.3
Google Android 3.0
Google Android 2.3.1
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.2
NA
CVE-2011-3874
Stack-based buffer overflow in libsysutils in Android 2.2.x up to and including 2.2.2 and 2.3.x up to and including 2.3.6 allows user-assisted remote malicious users to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wro...
Google Android 2.3
Google Android 2.3.6
Google Android 2.3.3
Google Android 2.3.1
Google Android 2.3.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
Google Android 2.3.2
NA
CVE-2011-1350
The PowerVR SGX driver in Android prior to 2.3.6 allows malicious users to obtain potentially sensitive information from kernel stack memory via an application that uses a crafted length parameter in a request to the pvrsrvkm device.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 1.6
Google Android 2.1
Google Android 2.3.3
Google Android 2.0
Google Android 2.3.1
Google Android
Google Android 1.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
Google Android 1.1
Google Android 2.3.2
Google Android 2.3
1 EDB exploit
NA
CVE-2011-1352
The PowerVR SGX driver in Android prior to 2.3.6 allows malicious users to gain root privileges via an application that triggers kernel memory corruption using crafted user data to the pvrsrvkm device.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 1.6
Google Android 2.1
Google Android 2.3.3
Google Android 2.0
Google Android 2.3.1
Google Android
Google Android 1.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
Google Android 1.1
Google Android 2.3.2
Google Android 2.3
NA
CVE-2013-4787
Android 1.6 Donut up to and including 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows malicious users to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic s...
Google Android 2.2.3
Google Android 2.0.1
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 3.1
Google Android 4.0.3
1 EDB exploit
NA
CVE-2011-3918
The Zygote process in Android 4.0.3 and previous versions accepts fork requests from processes with arbitrary UIDs, which allows remote malicious users to cause a denial of service (reboot loop) via a crafted application.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 1.6
Google Android 2.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 1.5
Google Android 3.1
Google Android 2.2.1
Google Android 2.2.2
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »