Логотип exploitDog
bind:CVE-2025-48539
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-48539

Количество 3

Количество 3

nvd логотип

CVE-2025-48539

13 дней назад

In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-f769-ghq4-665p

13 дней назад

In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 8
EPSS: Низкий
fstec логотип

BDU:2025-10997

16 дней назад

Уязвимость функции SendPacketToPeer файла acl_arbiter.cc операционных систем Android, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-48539

In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 8
0%
Низкий
13 дней назад
github логотип
GHSA-f769-ghq4-665p

In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 8
0%
Низкий
13 дней назад
fstec логотип
BDU:2025-10997

Уязвимость функции SendPacketToPeer файла acl_arbiter.cc операционных систем Android, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
0%
Низкий
16 дней назад

Уязвимостей на страницу