Логотип exploitDog
bind:CVE-2025-48543
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-48543

Количество 3

Количество 3

nvd логотип

CVE-2025-48543

5 месяцев назад

In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-98cr-q848-h9x3

5 месяцев назад

In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-10824

5 месяцев назад

Уязвимость среды выполнения ART (Android Runtime) операционной системы Android, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-48543

In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 8.8
0%
Низкий
5 месяцев назад
github логотип
GHSA-98cr-q848-h9x3

In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 8.8
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-10824

Уязвимость среды выполнения ART (Android Runtime) операционной системы Android, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
0%
Низкий
5 месяцев назад

Уязвимостей на страницу