HTML Code:
----------- [ Android Browser 4.0.x-4.3.x remote2local exploit ] ---------------
--------------------- [ Compatibility list and tests ] -------------------------

The remote2local exploit is compatible with the stock Android Browser
from version 4.0 to 4.3. The devices and versions tested are shown in the table 
below.

R2L = Remote to Local
L2R = Local to Root

YES = exploit working reliably
NO = exploit not working or working very unreliably

| Device                   | Version | R2L  | L2R | Notes |
| Alcatel One Touch        |   4.1.1 | YES  | YES |       |
| CAT B15                  |   4.1.2 | YES  | YES |       |
| HTC One                  |     4.x | NO   | ?   | (1)   |
| LG G2                    |   4.2.2 | YES  | YES |       |
| LG Nexus 4               |   4.2.2 | YES  | YES |       |
| Samsung Galaxy Nexus     |   4.0.4 | YES  | YES |       |
| Samsung Galaxy Nexus     |     4.3 | YES  | YES |       |
| Samsung Galaxy Note      |   4.1.2 | YES  | YES |       |
| Samsung Galaxy Note 2    |   4.1.1 | YES  | YES |       |
| Samsung Galaxy S2        |   4.0.4 | YES  | YES |       |
| Samsung Galaxy S3        |     4.3 | YES  | NO  |       |
| Samsung Galaxy S3 Mini   |   4.1.1 | YES  | YES |       |
| Samsung Galaxy S4 Mini   |   4.2.2 | NO   | NO  | (2)   |
| Samsung Galaxy Tab 2 7.0 |   4.0.3 | YES* | YES | (3)   |
| Samsung Galaxy Tab 2 7.0 |   4.1.2 | YES* | YES | (3)   |
| Huawei Ascend Y530       |     4.3 | YES  | NO  |       |

(1): Versions up to 4.4.3 are vulnerable but due to phone
     peculiarities the browser might not be exploitable
(2): This phone runs a patched version of the browser and is therefore
     not vulnerable
(3): Exploitation is not very reliable