Логотип exploitDog
bind:CVE-2020-0486
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-0486

Количество 2

Количество 2

nvd логотип

CVE-2020-0486

около 5 лет назад

In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-w7qc-fcjr-rrg9

больше 3 лет назад

In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-0486

In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116

CVSS3: 7.8
0%
Низкий
около 5 лет назад
github логотип
GHSA-w7qc-fcjr-rrg9

In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу