Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wmhm-48vh-qjwg

Опубликовано: 06 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.4

Описание

Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.

Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.

EPSS

Процентиль: 10%
0.00035
Низкий

8.4 High

CVSS3

Дефекты

CWE-190
CWE-787

Связанные уязвимости

CVSS3: 8.4
nvd
около 1 года назад

Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.

EPSS

Процентиль: 10%
0.00035
Низкий

8.4 High

CVSS3

Дефекты

CWE-190
CWE-787