In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 | |
Metrics |
cvssV3_1
|
Tue, 28 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | |
References |
|

Status: PUBLISHED
Assigner: google_android
Published: 2025-01-28T19:13:40.927Z
Updated: 2025-02-03T15:12:41.839Z
Reserved: 2024-07-08T18:54:51.200Z
Link: CVE-2024-40673

Updated: 2025-01-28T21:07:19.923Z

Status : Awaiting Analysis
Published: 2025-01-28T20:15:49.530
Modified: 2025-02-03T16:15:32.823
Link: CVE-2024-40673

No data.