Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7rhm-rf4m-m5cr

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The OpenSSLX509Certificate class in org/conscrypt/OpenSSLX509Certificate.java in Android before 5.1.1 LMY48I improperly includes certain context data during serialization and deserialization, which allows attackers to execute arbitrary code via an application that sends a crafted Intent, aka internal bug 21437603.

The OpenSSLX509Certificate class in org/conscrypt/OpenSSLX509Certificate.java in Android before 5.1.1 LMY48I improperly includes certain context data during serialization and deserialization, which allows attackers to execute arbitrary code via an application that sends a crafted Intent, aka internal bug 21437603.

EPSS

Процентиль: 73%
0.00792
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 10 лет назад

The OpenSSLX509Certificate class in org/conscrypt/OpenSSLX509Certificate.java in Android before 5.1.1 LMY48I improperly includes certain context data during serialization and deserialization, which allows attackers to execute arbitrary code via an application that sends a crafted Intent, aka internal bug 21437603.

fstec
больше 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 73%
0.00792
Низкий

Дефекты

CWE-20