Page 249 of 2938 results (0.025 seconds)

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

07 Apr 2017 — An elevation of privilege vulnerability in the Synaptics Touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-34325986. • http://www.securityfocus.com/bid/97335 •

CVSS: 7.6EPSS: 0%CPEs: 2EXPL: 0

07 Apr 2017 — An elevation of privilege vulnerability in the Qualcomm CP access driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and because of vulnerability specific details which limit the impact of the issue. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32068683. • http://www.securityfocus.com/bid/97368 •

CVSS: 7.6EPSS: 0%CPEs: 2EXPL: 0

07 Apr 2017 — An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34199963. • http://www.securityfocus.com/bid/97331 •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

07 Apr 2017 — An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-33842951. • http://www.securityfocus.com/bid/97348 •

CVSS: 7.6EPSS: 0%CPEs: 2EXPL: 0

07 Apr 2017 — An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34469904. • http://www.securityfocus.com/bid/97331 •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

07 Apr 2017 — An elevation of privilege vulnerability in the Synaptics Touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-34614485. • http://www.securityfocus.com/bid/97335 •

CVSS: 7.6EPSS: 0%CPEs: 2EXPL: 0

07 Apr 2017 — An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34624457. • http://www.securityfocus.com/bid/97331 •

CVSS: 7.6EPSS: 0%CPEs: 2EXPL: 1

07 Apr 2017 — An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34198729. • https://www.exploit-db.com/exploits/41808 • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 4.7EPSS: 0%CPEs: 2EXPL: 0

07 Apr 2017 — An information disclosure vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32074353. • http://www.securityfocus.com/bid/97363 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 1

07 Apr 2017 — An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203. • https://github.com/guoygang/CVE-2017-0564-ION-PoC •