{"uuid": "a059a6c2-cb6f-4f41-8fec-d6c2f3f7bda7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40673", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3288", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40673\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-28T21:31:04Z\n\ud83d\udccf Modified: 2025-01-28T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-40673\n2. https://android.googlesource.com/platform/libcore/+/b17fd2f8fe468e7d32e713b442f610cd33e4e7a9\n3. https://source.android.com/security/bulletin/2024-10-01", "creation_timestamp": "2025-01-28T22:09:30.000000Z"}