Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jfhm-j25g-cc8g

Опубликовано: 16 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.

In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.

EPSS

Процентиль: 0%
0.00006
Низкий

7.8 High

CVSS3

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 6.7
nvd
около 1 года назад

In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.

EPSS

Процентиль: 0%
0.00006
Низкий

7.8 High

CVSS3

Дефекты

CWE-276