Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-05-09 | CVE-2016-2434 | Permissions, Privileges, and Access Controls vulnerability in Google Android The NVIDIA video driver in Android before 2016-05-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27251090. | 7.8 |
2016-05-09 | CVE-2016-2432 | Permissions, Privileges, and Access Controls vulnerability in Google Android The Qualcomm TrustZone component in Android before 2016-05-01 on Nexus 6 and Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 25913059. | 7.8 |
2016-05-09 | CVE-2016-2431 | Permissions, Privileges, and Access Controls vulnerability in Google Android The Qualcomm TrustZone component in Android before 2016-05-01 on Nexus 5, Nexus 6, Nexus 7 (2013), and Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 24968809. | 7.8 |
2016-05-09 | CVE-2016-2430 | Permissions, Privileges, and Access Controls vulnerability in Google Android libbacktrace/Backtrace.cpp in debuggerd in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 allows attackers to gain privileges via an application containing a crafted symbol name, aka internal bug 27299236. | 7.8 |
2016-05-09 | CVE-2016-2060 | Permissions, Privileges, and Access Controls vulnerability in Google Android server/TetherController.cpp in the tethering controller in netd, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate upstream interface names, which allows attackers to bypass intended access restrictions via a crafted application. | 7.8 |
2016-05-09 | CVE-2015-0571 | Missing Authorization vulnerability in Linux Kernel The WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not verify authorization for private SET IOCTL calls, which allows attackers to gain privileges via a crafted application, related to wlan_hdd_hostapd.c and wlan_hdd_wext.c. | 7.8 |
2016-05-09 | CVE-2015-0570 | Out-of-bounds Write vulnerability in Linux Kernel Stack-based buffer overflow in the SET_WPS_IE IOCTL implementation in wlan_hdd_hostapd.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that uses a long WPS IE element. | 7.8 |
2016-05-09 | CVE-2015-0569 | Out-of-bounds Write vulnerability in Linux Kernel Heap-based buffer overflow in the private wireless extensions IOCTL implementation in wlan_hdd_wext.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that establishes a packet filter. | 7.8 |
2016-05-07 | CVE-2016-2353 | Unspecified vulnerability in Accellion File Transfer Appliance 80540/911200/911210 The Accellion File Transfer Appliance (FTA) before FTA_9_12_40 allows local users to add an SSH key to an arbitrary group, and consequently gain privileges, via unspecified vectors. | 7.8 |
2016-05-07 | CVE-2016-2352 | Permissions, Privileges, and Access Controls vulnerability in Accellion File Transfer Appliance 80540/911200/911210 The Accellion File Transfer Appliance (FTA) before FTA_9_12_40 allows remote authenticated users to execute arbitrary commands by leveraging the YUM_CLIENT restricted-user role. | 8.8 |