Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 2.3 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2011-1149
Android prior to 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and...
Google Android 1.6
Google Android 2.1
Google Android 1.5
Google Android 2.2.1
Google Android 2.2
Google Android
7.1
CVSSv2
CVE-2011-1350
The PowerVR SGX driver in Android prior to 2.3.6 allows malicious users to obtain potentially sensitive information from kernel stack memory via an application that uses a crafted length parameter in a request to the pvrsrvkm device.
Google Android 2.3.4
Google Android 2.3.3
Google Android 2.3.2
Google Android 2.3.1
Google Android
Google Android 2.2.3
Google Android 2.2.1
Google Android 1.6
Google Android 1.1
Google Android 2.2
Google Android 2.1
Google Android 2.0.1
Google Android 2.0
Google Android 2.3
Google Android 2.2.2
Google Android 1.5
Google Android 1.0
1 EDB exploit
6.9
CVSSv2
CVE-2011-1352
The PowerVR SGX driver in Android prior to 2.3.6 allows malicious users to gain root privileges via an application that triggers kernel memory corruption using crafted user data to the pvrsrvkm device.
Google Android 2.3.4
Google Android 1.1
Google Android 1.0
Google Android
Google Android 2.3.3
Google Android 2.3.1
Google Android 2.0.1
Google Android 1.6
Google Android 2.2.3
Google Android 2.2.2
Google Android 2.2.1
Google Android 2.2
Google Android 2.3.2
Google Android 2.3
Google Android 2.1
Google Android 2.0
Google Android 1.5
6.8
CVSSv2
CVE-2012-4220
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses cr...
Google Android 2.3.3
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
Google Android 2.3
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
3 Github repositories
6.8
CVSSv2
CVE-2012-4221
Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service via an application that uses crafted argume...
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
Google Android 2.3.7
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.3
Google Android 2.3.5
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
5
CVSSv2
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
5
CVSSv2
CVE-2011-0680
data/WorkingMessage.java in the Mms application in Android prior to 2.2.2 and 2.3.x prior to 2.3.2 does not properly manage the draft cache, which allows remote malicious users to read SMS messages intended for other recipients in opportunistic circumstances via a standard text m...
Google Android 1.6
Google Android 2.1
Google Android 2.3
Google Android 1.5
Google Android 2.2
Google Android
4.3
CVSSv2
CVE-2012-4222
drivers/gpu/msm/kgsl.c in the Qualcomm Innovation Center (QuIC) Graphics KGSL kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to cause a denial of service (NULL pointer dereference) via an application that uses crafted arguments in a local kgsl_i...
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 3.2.2
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.6
Google Android 4.0
Google Android 4.0.1
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 2.3.3
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.0.2
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.2
4.3
CVSSv2
CVE-2011-4276
The Bluetooth service (com/android/phone/BluetoothHeadsetService.java) in Android 2.3 prior to 2.3.6 allows remote attackers within Bluetooth range to obtain contact data via an AT phonebook transfer.
Google Android 2.3.5
Google Android 2.3.3
Google Android 2.3
Google Android 2.3.4
4.3
CVSSv2
CVE-2011-1001
dexdump in Android SDK prior to 2.3 does not properly perform structural verification, which allows user-assisted remote malicious users to cause a denial of service (dexdump crash) and possibly execute arbitrary code via a malformed APK or dex file that calls a method using more...
Google Android Sdk 1.6
Google Android Sdk 1.5
Google Android Sdk
Google Android Sdk 2.1
Google Android Sdk 1.1
Google Android Sdk 2.0
Google Android Sdk 2.0.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »