### [CVE-2024-40675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40675) ![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=12%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=12L%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=13%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=14%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20service&color=brightgreen) ### Description In parseUriInternal of Intent.java, there is a possible infinite loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Aakashmom/intent_CVE-2024-40675 - https://github.com/nomi-sec/PoC-in-GitHub