296,172
Total vulnerabilities in the database
In multiple functions of ZygoteProcess.java, there is a possible way to achieve code execution as any app via WRITE_SECURE_SETTINGS due to unsafe deserialization. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
Software | From | Fixed in |
---|---|---|
google / android | 12.0 | 12.0.x |
google / android | 12.1 | 12.1.x |
google / android | 13.0 | 13.0.x |
google / android | 14.0 | 14.0.x |