Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-696w-hpm2-563w

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In doSendObjectInfo of MtpServer.cpp, there is a possible path traversal attack due to insufficient input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is required for exploitation.Product: AndroidVersions: Android-10Android ID: A-130656917

In doSendObjectInfo of MtpServer.cpp, there is a possible path traversal attack due to insufficient input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is required for exploitation.Product: AndroidVersions: Android-10Android ID: A-130656917

EPSS

Процентиль: 12%
0.0004
Низкий

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

In doSendObjectInfo of MtpServer.cpp, there is a possible path traversal attack due to insufficient input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is required for exploitation.Product: AndroidVersions: Android-10Android ID: A-130656917

EPSS

Процентиль: 12%
0.0004
Низкий

Дефекты

CWE-20