Логотип exploitDog
bind:CVE-2023-20976
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20976

Количество 2

Количество 2

nvd логотип

CVE-2023-20976

почти 3 года назад

In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-w5cr-gcpx-w5wp

почти 3 года назад

In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20976

In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246

CVSS3: 7.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-w5cr-gcpx-w5wp

In getConfirmationMessage of DefaultAutofillPicker.java, there is a possible way to mislead the user to select default autofill application due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-216117246

CVSS3: 7.3
0%
Низкий
почти 3 года назад

Уязвимостей на страницу