Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2qfp-jwvh-rfmc

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060

In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060

EPSS

Процентиль: 0%
0.00006
Низкий

Связанные уязвимости

CVSS3: 7.3
nvd
больше 5 лет назад

In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060

EPSS

Процентиль: 0%
0.00006
Низкий