Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w5cr-gcpx-w5wp

Опубликовано: 24 мар. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.3

Описание

In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246

In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246

EPSS

Процентиль: 1%
0.00012
Низкий

7.3 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.3
nvd
почти 3 года назад

In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246

EPSS

Процентиль: 1%
0.00012
Низкий

7.3 High

CVSS3

Дефекты

CWE-20