296,223
Total vulnerabilities in the database
In Bluetooth, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege when connecting to a Bluetooth device with no additional execution privileges needed. User interaction is not needed for exploitation.
Software | From | Fixed in |
---|---|---|
google / android | - | 14.0 |