CVE-2023-21172
https://notcve.org/view.php?id=CVE-2023-21172
This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2023-06-01 •
CVE-2023-21179
https://notcve.org/view.php?id=CVE-2023-21179
This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2023-06-01 •
CVE-2023-21209
https://notcve.org/view.php?id=CVE-2023-21209
This could lead to local escalation of privilege with System execution privileges needed. • https://source.android.com/security/bulletin/pixel/2023-06-01 • CWE-502: Deserialization of Untrusted Data •
CVE-2023-21159
https://notcve.org/view.php?id=CVE-2023-21159
This could lead to local escalation of privilege with System execution privileges needed. • https://source.android.com/security/bulletin/pixel/2023-06-01 • CWE-787: Out-of-bounds Write •
CVE-2023-2005 – Tenable Plugin Feed ID #202306261202 Fixes Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2023-2005
Vulnerability in Tenable Tenable.Io, Tenable Nessus, Tenable Security Center.This issue affects Tenable.Io: before Plugin Feed ID #202306261202 ; Nessus: before Plugin Feed ID #202306261202 ; Security Center: before Plugin Feed ID #202306261202 . This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges. • https://www.tenable.com/security/tns-2023-21 •