Page 149 of 1840 results (0.006 seconds)

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

An elevation of privilege vulnerability in the NVIDIA Libnvparser component due to a memcpy into a fixed sized buffer with a user-controlled size could lead to a memory corruption and possible remote code execution. This issue is rated as High. Product: Android. Version: N/A. Android ID: A-33968204. • http://www.securityfocus.com/bid/99477 https://source.android.com/security/bulletin/2017-07-01 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 0%CPEs: 8EXPL: 0

A elevation of privilege vulnerability in the Android framework. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37285689. Una vulnerabilidad de elevación de privilegios en el Framework de Android. • http://www.securityfocus.com/bid/99470 https://source.android.com/security/bulletin/2017-07-01 • CWE-682: Incorrect Calculation •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

A denial of service vulnerability in the Android libraries. Product: Android. Versions: 7.0, 7.1.1, 7.1.2. Android ID: A-34778578. Una vulnerabilidad de denegación de servicio en las librerías de Android. • https://source.android.com/security/bulletin/2017-07-01 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

An elevation of privilege vulnerability in the NVIDIA sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High due to the possibility of local arbitrary code execution in a privileged process in the kernel. Product: Android. Versions: N/A. Android ID: A-34386301. • http://www.securityfocus.com/bid/98876 http://www.securitytracker.com/id/1038623 https://source.android.com/security/bulletin/2017-06-01 •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 7.0, 7.1.1, 7.1.2. Android ID: A-36588422. Una vulnerabilidad de ejecución remota de código en el Framework de medios de Android. • http://www.securityfocus.com/bid/99478 https://source.android.com/security/bulletin/2017-07-01 •