Page 521 of 3777 results (0.020 seconds)

CVSS: 7.6EPSS: 0%CPEs: 2EXPL: 0

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34199963. • http://www.securityfocus.com/bid/97331 http://www.securitytracker.com/id/1038201 https://source.android.com/security/bulletin/2017-04-01 •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-34198931. • http://www.securityfocus.com/bid/97331 http://www.securitytracker.com/id/1038201 https://source.android.com/security/bulletin/2017-04-01 •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32089409. • http://seclists.org/fulldisclosure/2017/May/19 http://www.securityfocus.com/bid/97342 http://www.securitytracker.com/id/1038201 https://alephsecurity.com/vulns/aleph-2017009 https://github.com/alephsecurity/PoCs/tree/master/CVE-2017-0563 https://source.android.com/security/bulletin/2017-04-01 • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

An elevation of privilege vulnerability in the Synaptics Touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-34325986. • http://www.securityfocus.com/bid/97335 http://www.securitytracker.com/id/1038201 https://source.android.com/security/bulletin/2017-04-01 •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 1

An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203. • https://github.com/guoygang/CVE-2017-0564-ION-PoC http://www.securityfocus.com/bid/97344 http://www.securitytracker.com/id/1038201 https://source.android.com/security/bulletin/2017-04-01 https://source.android.com/security/bulletin/2017-12-01 •