296,172
Total vulnerabilities in the database
there is a possible Authentication Bypass due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Software | From | Fixed in |
---|---|---|
google / android | 13.0 | 13.0.x |