Логотип exploitDog
bind:CVE-2022-20532
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-20532

Количество 2

Количество 2

nvd логотип

CVE-2022-20532

почти 3 года назад

In parseTrackFragmentRun() of MPEG4Extractor.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-232242894

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-qwv2-3fqv-753q

почти 3 года назад

In parseTrackFragmentRun() of MPEG4Extractor.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-232242894

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-20532

In parseTrackFragmentRun() of MPEG4Extractor.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-232242894

CVSS3: 9.8
1%
Низкий
почти 3 года назад
github логотип
GHSA-qwv2-3fqv-753q

In parseTrackFragmentRun() of MPEG4Extractor.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-232242894

CVSS3: 9.8
1%
Низкий
почти 3 года назад

Уязвимостей на страницу