Логотип exploitDog
bind:CVE-2016-3922
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-3922

Количество 3

Количество 3

ubuntu логотип

CVE-2016-3922

больше 9 лет назад

libril/RilSapSocket.cpp in Telephony in Android 6.x before 2016-10-01 and 7.0 before 2016-10-01 relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka internal bug 30202619.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2016-3922

больше 9 лет назад

libril/RilSapSocket.cpp in Telephony in Android 6.x before 2016-10-01 and 7.0 before 2016-10-01 relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka internal bug 30202619.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-6p68-2qv9-mg8h

больше 3 лет назад

libril/RilSapSocket.cpp in Telephony in Android 6.x before 2016-10-01 and 7.0 before 2016-10-01 relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka internal bug 30202619.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-3922

libril/RilSapSocket.cpp in Telephony in Android 6.x before 2016-10-01 and 7.0 before 2016-10-01 relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka internal bug 30202619.

CVSS3: 7.8
0%
Низкий
больше 9 лет назад
nvd логотип
CVE-2016-3922

libril/RilSapSocket.cpp in Telephony in Android 6.x before 2016-10-01 and 7.0 before 2016-10-01 relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka internal bug 30202619.

CVSS3: 7.8
0%
Низкий
больше 9 лет назад
github логотип
GHSA-6p68-2qv9-mg8h

libril/RilSapSocket.cpp in Telephony in Android 6.x before 2016-10-01 and 7.0 before 2016-10-01 relies on variable-length arrays, which allows attackers to gain privileges via a crafted application, aka internal bug 30202619.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу