[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253390

 
 

909

 
 

197257

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10984 Download | Alert*

In binder_free_transaction of binder.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-133758011References: Upstream kernel

In binder_thread_release of binder.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145286050References: Upstream kernel

In all android releases from CAF using the linux kernel, if there is an unlikely memory alloc failure for the secure pool in boot, it can result in wrong pointer access causing kernel panic.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle cursors. Successful exploitation will allow an attacker to cause a denial of service.

The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle cursors. Successful exploitation will allow an attacker to cause a denial of service.

The host is installed with Google Chrome before 7.0.517.41 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly set the PATH environment variable. Successful exploitation has unspecified impact and attack vectors..

The host is installed with Google Chrome before 7.0.517.41 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly set the PATH environment variable. Successful exploitation has unspecified impact and attack vectors..

The host is installed with Google Chrome before 7.0.517.41 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly constrain worker processes. Successful exploitation allows attackers to bypass intended access restrictions.

The host is installed with Google Chrome before 7.0.517.41 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly constrain worker processes. Successful exploitation allows attackers to bypass intended access restrictions.

The host is installed with Google Chrome before 9.0.597.107 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read).


Pages:      Start    1070    1071    1072    1073    1074    1075    1076    1077    1078    1079    1080    1081    1082    1083    ..   1098

© SecPod Technologies