mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
31 lines
No EOL
1.3 KiB
JSON
31 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 582711807,
|
|
"name": "CVE-2022-20470",
|
|
"full_name": "Live-Hack-CVE\/CVE-2022-20470",
|
|
"owner": {
|
|
"login": "Live-Hack-CVE",
|
|
"id": 121191732,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20470",
|
|
"description": "In bindRemoteViewsService of AppWidgetServiceImpl.java, there is a possible way to bypass background activity launch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions CVE project by @Sn0wAlice",
|
|
"fork": false,
|
|
"created_at": "2022-12-27T16:48:38Z",
|
|
"updated_at": "2022-12-27T16:48:38Z",
|
|
"pushed_at": "2022-12-27T16:48:40Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |