Логотип exploitDog
bind:CVE-2020-0086
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-0086

Количество 2

Количество 2

nvd логотип

CVE-2020-0086

почти 6 лет назад

In readCString of Parcel.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to arbitrary code execution if IntSan were not enabled, which it is by default. No additional execution privileges are required. User interaction is not needed for exploitation. Product: Android Versions: Android-10 Android ID: A-131859347

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-cc6c-7c4q-p82p

больше 3 лет назад

In readCString of Parcel.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to arbitrary code execution if IntSan were not enabled, which it is by default. No additional execution privileges are required. User interaction is not needed for exploitation. Product: Android Versions: Android-10 Android ID: A-131859347

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-0086

In readCString of Parcel.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to arbitrary code execution if IntSan were not enabled, which it is by default. No additional execution privileges are required. User interaction is not needed for exploitation. Product: Android Versions: Android-10 Android ID: A-131859347

CVSS3: 9.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-cc6c-7c4q-p82p

In readCString of Parcel.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to arbitrary code execution if IntSan were not enabled, which it is by default. No additional execution privileges are required. User interaction is not needed for exploitation. Product: Android Versions: Android-10 Android ID: A-131859347

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу