5282 results (0.073 seconds)

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with System execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-06-01 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-06-01 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-06-01 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-06-01 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-06-01 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-08-01 •

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-08-01 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-07-01 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://source.android.com/security/bulletin/pixel/2018-06-01 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

17 Jan 2025 — This could lead to local escalation of privilege with no additional execution privileges needed. • https://github.com/IOActive/AOSP-ExploitUserDictionary •