Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ghv3-33fj-4x9g

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In parseChunk of MPEG4Extractor.cpp, there is a possible out of bounds write due to incompletely initialized data. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-151159638

In parseChunk of MPEG4Extractor.cpp, there is a possible out of bounds write due to incompletely initialized data. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-151159638

EPSS

Процентиль: 65%
0.00481
Низкий

Связанные уязвимости

CVSS3: 8.8
nvd
больше 5 лет назад

In parseChunk of MPEG4Extractor.cpp, there is a possible out of bounds write due to incompletely initialized data. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-151159638

EPSS

Процентиль: 65%
0.00481
Низкий