Логотип exploitDog
bind:CVE-2023-21063
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-21063

Количество 2

Количество 2

nvd логотип

CVE-2023-21063

почти 3 года назад

In ParseWithAuthType of simdata.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243129862References: N/A

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-mj95-c6pq-6cm4

почти 3 года назад

In ParseWithAuthType of simdata.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243129862References: N/A

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-21063

In ParseWithAuthType of simdata.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243129862References: N/A

CVSS3: 6.7
0%
Низкий
почти 3 года назад
github логотип
GHSA-mj95-c6pq-6cm4

In ParseWithAuthType of simdata.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243129862References: N/A

CVSS3: 6.7
0%
Низкий
почти 3 года назад

Уязвимостей на страницу