Android versions 2.0, 2.1, and 2.1.1 WebKit use-after-free exploit.
ab58ac8cc9c0e22587cba2b5f2c0de161b1d1d1f508a000c21040aed212e232b
Zero Day Initiative Advisory 10-091 - This vulnerability allows remote attackers to execute remote code on vulnerable installations of Apple Webkit. User interaction is required in that a target must be coerced into visiting a malicious page. The specific flaw exists within Webkit's process for destructing attribute objects via the removeChild method. If an attribute's child object is accessed after the attribute was removed from the document, an invalid pointer is referenced. This can be exploited by an attacker to execute remote code under the context of the user running the browser.
f4afa92d20e5763b95c6abf19991774d188549e0017aeb5a33c8eb1db271a7b8