Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
google android 3.2.6 vulnerabilities and exploits
(subscribe to this query)
941
VMScore
CVE-2013-4710
Android 3.0 up to and including 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote malicious users to execute arbitrary methods of Java objects or cause a denial of service (reboot) via...
Google Android 4.0
Google Android 3.2.6
Google Android 3.2.4
Google Android 3.2.2
Google Android 4.0.4
Google Android 4.0.2
Google Android 3.2
Google Android 3.0
Google Android 4.1.2
Google Android 4.1
Google Android 4.0.3
Google Android 4.0.1
Google Android 3.2.1
Google Android 3.1
2 EDB exploits
2 Github repositories
1 Article
606
VMScore
CVE-2012-4220
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses cr...
Google Android 2.3.3
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
Google Android 2.3
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
3 Github repositories
605
VMScore
CVE-2012-4221
Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service via an application that uses crafted argume...
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 4.0
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.0.2
Google Android 4.2
Google Android 2.3.7
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 2.3.3
Google Android 2.3.5
Google Android 3.2.2
Google Android 3.2.6
Google Android 4.0.1
383
VMScore
CVE-2012-4222
drivers/gpu/msm/kgsl.c in the Qualcomm Innovation Center (QuIC) Graphics KGSL kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to cause a denial of service (NULL pointer dereference) via an application that uses crafted arguments in a local kgsl_i...
Google Android 3.1
Google Android 3.2
Google Android 3.0
Google Android 3.2.2
Google Android 2.3.5
Google Android 2.3.7
Google Android 3.2.6
Google Android 4.0
Google Android 4.0.1
Google Android 2.3
Google Android 2.3.1
Google Android 2.3.2
Google Android 2.3.3
Google Android 4.1
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.0.2
Google Android 2.3.4
Google Android 2.3.6
Google Android 3.2.1
Google Android 3.2.4
Google Android 4.2
935
VMScore
CVE-2013-4787
Android 1.6 Donut up to and including 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows malicious users to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic s...
Google Android 2.3.3
Google Android 2.3.4
Google Android 4.0
Google Android 4.1.2
Google Android 4.0.4
Google Android 4.0.3
Google Android 4.0.2
Google Android 4.2
Google Android 4.0.1
Google Android 2.3
Google Android 2.2.2
Google Android 1.6
Google Android 2.1
Google Android 3.1
Google Android 2.3.2
Google Android 3.2.2
Google Android 3.2.1
Google Android 2.2.1
Google Android 2.3.5
Google Android 2.2
Google Android 2.3.6
Google Android 3.0
1 EDB exploit
785
VMScore
CVE-2011-3918
The Zygote process in Android 4.0.3 and previous versions accepts fork requests from processes with arbitrary UIDs, which allows remote malicious users to cause a denial of service (reboot loop) via a crafted application.
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 1.6
Google Android 2.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 2.3.6
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 2.3.1
Google Android 2.3.5
Google Android 1.5
Google Android 3.1
Google Android 2.2.1
Google Android 2.2.2
1 EDB exploit
891
VMScore
CVE-2014-7920
mediaserver in Android 2.2 up to and including 5.x prior to 5.1 allows malicious users to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7921.
Google Android 2.2.3
Google Android 3.2.6
Google Android 4.2
Google Android 4.1
Google Android 3.2.4
Google Android 5.0.2
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 4.4.4
Google Android 3.0
Google Android 4.2.1
Google Android 2.3.1
Google Android 2.3.5
Google Android 5.0.1
2 Github repositories
668
VMScore
CVE-2013-7373
Android prior to 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for malicious users to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
Google Android 1.0
Google Android 1.1
Google Android 1.5
Google Android 1.6
Google Android 2.3.4
Google Android 2.3.5
Google Android 2.3.6
Google Android 2.3.7
Google Android 4.1.2
Google Android 4.2
Google Android 4.2.1
Google Android 4.2.2
Google Android 2.0
Google Android 2.1
Google Android 2.3
Google Android 2.3.2
Google Android 3.1
Google Android 3.2.1
Google Android 4.0.1
Google Android 4.0.3
Google Android 4.1
Google Android 4.3
644
VMScore
CVE-2014-7911
luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android prior to 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows malicious users to execute arbitrary...
Google Android 2.2.3
Google Android 2.0.1
Google Android 1.0
Google Android 3.2.6
Google Android 4.2
Google Android 1.6
Google Android 2.1
Google Android 4.1
Google Android 3.2.4
Google Android 3.2
Google Android 3.2.2
Google Android 4.0.2
Google Android 2.3
Google Android 4.4.3
Google Android 2.3.6
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 2.3.3
Google Android 3.0
Google Android 2.0
Google Android 4.2.1
10 Github repositories
294
VMScore
CVE-2014-8610
AndroidManifest.xml in Android prior to 5.0.0 does not require the SEND_SMS permission for the SmsReceiver receiver, which allows malicious users to send stored SMS messages, and consequently transmit arbitrary new draft SMS messages or trigger additional per-message charges from...
Google Android 4.4.3
Google Android 1.5
Google Android 1.6
Google Android 2.0
Google Android 2.3.5
Google Android 2.3.6
Google Android 2.3.7
Google Android 3.0
Google Android 4.1.2
Google Android 4.2
Google Android 4.2.1
Google Android 4.2.2
Google Android 4.3
Google Android 1.1
Google Android 2.1
Google Android 2.2
Google Android 2.3
Google Android 2.3.2
Google Android 2.3.4
Google Android 3.1
Google Android 3.2.1
Google Android 4.0.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »