Логотип exploitDog
bind:CVE-2020-0133
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-0133

Количество 2

Количество 2

nvd логотип

CVE-2020-0133

больше 5 лет назад

In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-2qfp-jwvh-rfmc

больше 3 лет назад

In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-0133

In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060

CVSS3: 7.3
0%
Низкий
больше 5 лет назад
github логотип
GHSA-2qfp-jwvh-rfmc

In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу