Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rgr9-m4j3-v8c4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311

In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311

EPSS

Процентиль: 1%
0.00011
Низкий

Дефекты

CWE-1021

Связанные уязвимости

CVSS3: 7.3
nvd
больше 4 лет назад

In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311

EPSS

Процентиль: 1%
0.00011
Низкий

Дефекты

CWE-1021