Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 1.6 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2011-0680
data/WorkingMessage.java in the Mms application in Android prior to 2.2.2 and 2.3.x prior to 2.3.2 does not properly manage the draft cache, which allows remote malicious users to read SMS messages intended for other recipients in opportunistic circumstances via a standard text m...
Google Android 1.6
Google Android 2.1
Google Android 2.3
Google Android 1.5
Google Android 2.2
Google Android
7.2
CVSSv2
CVE-2011-1149
Android prior to 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and...
Google Android 1.6
Google Android 2.1
Google Android 1.5
Google Android 2.2.1
Google Android 2.2
Google Android
4.3
CVSSv2
CVE-2010-4832
Android OS prior to 2.2 does not display the correct SSL certificate in certain cases, which might allow remote malicious users to spoof trusted web sites via a web page containing references to external sources in which (1) the certificate of the last loaded resource is checked,...
Google Android
Google Android 2.0.1
Google Android 1.0
Google Android 1.6
Google Android 2.0
Google Android 1.5
Google Android 1.1
4.3
CVSSv2
CVE-2010-4804
The Android browser in Android prior to 2.3.4 allows remote malicious users to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.
Google Android 1.6
Google Android 2.1
Google Android 2.3
Google Android 1.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android
1 EDB exploit
2 Github repositories
4.3
CVSSv2
CVE-2011-1001
dexdump in Android SDK prior to 2.3 does not properly perform structural verification, which allows user-assisted remote malicious users to cause a denial of service (dexdump crash) and possibly execute arbitrary code via a malformed APK or dex file that calls a method using more...
Google Android Sdk 1.6
Google Android Sdk 1.5
Google Android Sdk
Google Android Sdk 2.1
Google Android Sdk 1.1
Google Android Sdk 2.0
Google Android Sdk 2.0.1
7.1
CVSSv2
CVE-2011-1350
The PowerVR SGX driver in Android prior to 2.3.6 allows malicious users to obtain potentially sensitive information from kernel stack memory via an application that uses a crafted length parameter in a request to the pvrsrvkm device.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 1.6
Google Android 2.1
Google Android 2.3.3
Google Android 2.0
Google Android 2.3.1
Google Android
Google Android 1.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
Google Android 1.1
Google Android 2.3.2
Google Android 2.3
1 EDB exploit
6.9
CVSSv2
CVE-2011-1352
The PowerVR SGX driver in Android prior to 2.3.6 allows malicious users to gain root privileges via an application that triggers kernel memory corruption using crafted user data to the pvrsrvkm device.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 1.6
Google Android 2.1
Google Android 2.3.3
Google Android 2.0
Google Android 2.3.1
Google Android
Google Android 1.5
Google Android 2.2.1
Google Android 2.2.2
Google Android 2.2
Google Android 2.3.4
Google Android 1.1
Google Android 2.3.2
Google Android 2.3
9.3
CVSSv2
CVE-2013-4787
Android 1.6 Donut up to and including 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows malicious users to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic s...
Google Android 2.2.3
Google Android 2.0.1
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 3.1
Google Android 4.0.3
1 EDB exploit
7.8
CVSSv2
CVE-2011-3918
The Zygote process in Android 4.0.3 and previous versions accepts fork requests from processes with arbitrary UIDs, which allows remote malicious users to cause a denial of service (reboot loop) via a crafted application.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 1.6
Google Android 2.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 1.5
Google Android 3.1
Google Android 2.2.1
Google Android 2.2.2
1 EDB exploit
7.5
CVSSv2
CVE-2013-7373
Android prior to 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for malicious users to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 4.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »