Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 2.3.7 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2011-3901
Android SQLite Journal prior to 4.0.1 has an information disclosure vulnerability.
Google Android 2.3.7
9.8
CVSSv3
CVE-2016-1155
HTTP header injection vulnerability in the URLConnection class in Android OS 2.2 up to and including 6.0 allows remote malicious users to execute arbitrary scripts or set arbitrary values in cookies.
Google Android 2.2.3
Google Android 3.2.6
Google Android 5.1.0
Google Android 4.2
Google Android 4.1
Google Android 3.2.4
Google Android 5.0.2
Google Android 6.0
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 4.4.4
Google Android 3.0
Google Android 4.2.1
Google Android 2.3.1
9.8
CVSSv3
CVE-2014-7920
mediaserver in Android 2.2 up to and including 5.x prior to 5.1 allows malicious users to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7921.
Google Android 2.2.3
Google Android 3.2.6
Google Android 4.2
Google Android 4.1
Google Android 3.2.4
Google Android 5.0.2
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 4.4.4
Google Android 3.0
Google Android 4.2.1
Google Android 2.3.1
Google Android 2.3.5
Google Android 5.0.1
2 Github repositories
NA
CVE-2014-8610
AndroidManifest.xml in Android prior to 5.0.0 does not require the SEND_SMS permission for the SmsReceiver receiver, which allows malicious users to send stored SMS messages, and consequently transmit arbitrary new draft SMS messages or trigger additional per-message charges from...
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 4.2.1
NA
CVE-2014-8507
Multiple SQL injection vulnerabilities in the queryLastApp method in packages/WAPPushManager/src/com/android/smspush/WapPushManager.java in the WAPPushManager module in Android prior to 5.0.0 allow remote malicious users to execute arbitrary SQL commands, and consequently launch ...
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 4.2.1
1 EDB exploit
NA
CVE-2014-7911
luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android prior to 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows malicious users to execute arbitrary...
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 4.2.1
10 Github repositories
NA
CVE-2013-7373
Android prior to 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for malicious users to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 4.2.1
NA
CVE-2013-4777
A certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless uses init to create a /dev/socket/init_runit socket that listens for shell commands, which allows local users to gain privileges by interacting with a LocalSocket object.
Google Android 2.3.7
Motorola Defy Xt -
NA
CVE-2013-5933
Stack-based buffer overflow in the sub_E110 function in init in a certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless allows local users to gain privileges or cause a denial of service (memory corruption) by writing a long string to the /dev...
Google Android 2.3.7
Motorola Defy Xt -
NA
CVE-2013-4787
Android 1.6 Donut up to and including 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows malicious users to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic s...
Google Android 2.2.3
Google Android 2.0.1
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 3.1
Google Android 4.0.3
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »