there is a possible Authentication Bypass due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ { "events": [ { "introduced": "0" }, { "last_affected": "13.0" } ] } ]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-22005.json"