Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-13218

Summary
Assigner-google_android
Assigner Org ID-baff130e-b8d5-4e15-b3d3-c3cf5d5545c6
Published At-12 Jan, 2018 | 23:00
Updated At-16 Sep, 2024 | 20:21
Rejected At-
Credits

Access to CNTVCT_EL0 in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear could be used for side channel attacks and this could lead to local information disclosure with no additional execution privileges needed in FSM9055, IPQ4019, IPQ8064, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8909W, QCA4531, QCA9980, QCN5502, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:google_android
Assigner Org ID:baff130e-b8d5-4e15-b3d3-c3cf5d5545c6
Published At:12 Jan, 2018 | 23:00
Updated At:16 Sep, 2024 | 20:21
Rejected At:
▼CVE Numbering Authority (CNA)

Access to CNTVCT_EL0 in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear could be used for side channel attacks and this could lead to local information disclosure with no additional execution privileges needed in FSM9055, IPQ4019, IPQ8064, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8909W, QCA4531, QCA9980, QCN5502, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845.

Affected Products
Vendor
Qualcomm Technologies, Inc.Qualcomm, Inc.
Product
Android for MSM, Firefox OS for MSM, QRD Android
Versions
Affected
  • All Android releases from CAF using the Linux kernel
Problem Types
TypeCWE IDDescription
textN/APermissions, Privileges and Access control issue in Kernel
Type: text
CWE ID: N/A
Description: Permissions, Privileges and Access control issue in Kernel
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
x_refsource_CONFIRM
http://www.securityfocus.com/bid/102390
vdb-entry
x_refsource_BID
https://source.android.com/security/bulletin/2018-01-01
x_refsource_CONFIRM
https://www.codeaurora.org/security-bulletin/2018/06/04/june-2018-code-aurora-security-bulletin
x_refsource_MISC
http://www.securitytracker.com/id/1040106
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/102390
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://source.android.com/security/bulletin/2018-01-01
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.codeaurora.org/security-bulletin/2018/06/04/june-2018-code-aurora-security-bulletin
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id/1040106
Resource:
vdb-entry
x_refsource_SECTRACK
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/102390
vdb-entry
x_refsource_BID
x_transferred
https://source.android.com/security/bulletin/2018-01-01
x_refsource_CONFIRM
x_transferred
https://www.codeaurora.org/security-bulletin/2018/06/04/june-2018-code-aurora-security-bulletin
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id/1040106
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/102390
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://source.android.com/security/bulletin/2018-01-01
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.codeaurora.org/security-bulletin/2018/06/04/june-2018-code-aurora-security-bulletin
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id/1040106
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@android.com
Published At:12 Jan, 2018 | 23:29
Updated At:19 Jul, 2018 | 01:29

Access to CNTVCT_EL0 in Small Cell SoC, Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear could be used for side channel attacks and this could lead to local information disclosure with no additional execution privileges needed in FSM9055, IPQ4019, IPQ8064, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8909W, QCA4531, QCA9980, QCN5502, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.04.7MEDIUM
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.04.7MEDIUM
AV:L/AC:M/Au:N/C:C/I:N/A:N
Type: Primary
Version: 3.0
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.7
Base severity: MEDIUM
Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CPE Matches

Google LLC
google
>>android>>-
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE ID: CWE-200
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlsecurity@android.com
N/A
http://www.securityfocus.com/bid/102390security@android.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040106security@android.com
Third Party Advisory
VDB Entry
https://source.android.com/security/bulletin/2018-01-01security@android.com
Vendor Advisory
https://www.codeaurora.org/security-bulletin/2018/06/04/june-2018-code-aurora-security-bulletinsecurity@android.com
N/A
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: security@android.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/102390
Source: security@android.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040106
Source: security@android.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://source.android.com/security/bulletin/2018-01-01
Source: security@android.com
Resource:
Vendor Advisory
Hyperlink: https://www.codeaurora.org/security-bulletin/2018/06/04/june-2018-code-aurora-security-bulletin
Source: security@android.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

667Records found

CVE-2011-1810
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-4.3||MEDIUM
EPSS-0.53% / 67.42%
||
7 Day CHG~0.00%
Published-09 Jun, 2011 | 19:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Cascading Style Sheets (CSS) implementation in Google Chrome before 12.0.742.91 does not properly restrict access to the visit history, which allows remote attackers to obtain sensitive information via unspecified vectors.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-4925
Matching Score-6
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-6
Assigner-Adobe Systems Incorporated
CVSS Score-7.5||HIGH
EPSS-3.46% / 87.66%
||
7 Day CHG~0.00%
Published-19 May, 2018 | 17:00
Updated-05 Aug, 2024 | 05:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Digital Editions versions 4.5.7 and below have an exploitable Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-n/aAdobe Inc.Apple Inc.Google LLCMicrosoft Corporation
Product-digital_editionsiphone_osandroidmac_os_xwindowsAdobe Digital Editions 4.5.7 and below
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-125
Out-of-bounds Read
CVE-2013-2879
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-5.8||MEDIUM
EPSS-0.47% / 64.97%
||
7 Day CHG~0.00%
Published-10 Jul, 2013 | 10:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Google Chrome before 28.0.1500.71 does not properly determine the circumstances in which a renderer process can be considered a trusted process for sign-in and subsequent sync operations, which makes it easier for remote attackers to conduct phishing attacks via a crafted web site.

Action-Not Available
Vendor-n/aGoogle LLCDebian GNU/Linux
Product-chromedebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-0579
Matching Score-6
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-6
Assigner-Adobe Systems Incorporated
CVSS Score-5||MEDIUM
EPSS-0.97% / 76.83%
||
7 Day CHG~0.00%
Published-13 May, 2011 | 22:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to obtain sensitive information via unspecified vectors.

Action-Not Available
Vendor-n/aApple Inc.Oracle CorporationGoogle LLCLinux Kernel Organization, IncMicrosoft CorporationAdobe Inc.
Product-mac_os_xsolariswindowsflash_playerandroidlinux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-5858
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.14% / 33.99%
||
7 Day CHG~0.00%
Published-16 Aug, 2017 | 15:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In an ioctl handler in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, if a user supplies a value too large, then an out-of-bounds read occurs.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAll Qualcomm products
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-0776
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.23% / 45.35%
||
7 Day CHG~0.00%
Published-04 Feb, 2011 | 17:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sandbox implementation in Google Chrome before 9.0.597.84 on Mac OS X might allow remote attackers to obtain potentially sensitive information about local files via vectors related to the stat system call.

Action-Not Available
Vendor-n/aGoogle LLCApple Inc.
Product-chromemacosn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-5069
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.13% / 32.44%
||
7 Day CHG~0.00%
Published-07 Dec, 2011 | 19:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Cascading Style Sheets (CSS) implementation in Google Chrome 4 does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document. NOTE: this may overlap CVE-2010-2264.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-5855
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.11% / 29.05%
||
7 Day CHG~0.00%
Published-16 Aug, 2017 | 15:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In a driver in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, a user-supplied buffer is casted to a structure without checking if the source buffer is large enough.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAll Qualcomm products
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-4804
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-62.17% / 98.37%
||
7 Day CHG~0.00%
Published-09 Jun, 2011 | 10:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Android browser in Android before 2.3.4 allows remote attackers to obtain SD card contents via crafted content:// URIs, related to (1) BrowserActivity.java and (2) BrowserSettings.java in com/android/browser/.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-53011
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.9||HIGH
EPSS-0.06% / 19.82%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Permissions, Privileges, and Access Controls in Video Analytics and Processing

Information disclosure may occur due to improper permission and access controls to Video Analytics engine.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8_gen_3_mobile_platform_firmwareqcm8550_firmwaresa6150p_firmwarewcn6650wsa8845_firmwarewsa8832qcs8155_firmwarewcd9378_firmwareqca6595sm8735sm7675pwcd9370qca6696sm8475wcn7880_firmwarewcn7860_firmwaresc8380xpsxr2330p_firmwaresa4150p_firmwarewcd9395_firmwarewcn7881_firmwaresnapdragon_ar1_gen_1_platform_firmwarewcn7750wcn6450fastconnect_6700qca6564ausa4150pwsa8832_firmwaresa8195p_firmwarewcd9395sg8275p_firmwareqca6574au_firmwareqca6564_firmwareqca6574auwcd9390flight_rb5_5g_platformwsa8845h_firmwaresm8650q_firmwaresm8750wcn7860sa4155p_firmwaresa8155sa4155pssg2115pwcn6755_firmwarewcn6650_firmwaresc8380xp_firmwareqca6595_firmwareqcs7230fastconnect_7800_firmwarefastconnect_6900sm8635sm8635_firmwarewcd9385_firmwarefastconnect_6900_firmwarewcd9380sa6145p_firmwaresa6155_firmwaresxr2230psa8155_firmwareqmp1000_firmwarewcn7880sa8150psnapdragon_ar2_gen_1_platform_firmwaresxr2330psnapdragon_8_gen_1_mobile_platform_firmwarewcn6755snapdragon_ar1_gen_1_platformsnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845sa6155psnapdragon_ar1_gen_1_platform_\"luna1\"_firmwareqca6564au_firmwaresxr1230pvideo_collaboration_vc5_platform_firmwaresnapdragon_8\+_gen_2_mobile_platformsm6650wcn7881qca6595ausxr2250p_firmwaresa6155p_firmwarewsa8840qca6688aqqcs8550_firmwarewcd9385sm8750psnapdragon_8\+_gen_1_mobile_platformsnapdragon_8_gen_2_mobile_platformqcs7230_firmwaresm8635psxr1230p_firmwarewcd9390_firmwareqmp1000snapdragon_8_gen_3_mobile_platformsg8275pwcd9370_firmwaresm8750_firmwaressg2125pqca6574asa8195pwcn7861_firmwarewcn7861video_collaboration_vc5_platformsm8550p_firmwaresxr2250pqcm8550qcn9274sm6650_firmwareqrb5165n_firmwareqca6574wsa8835qca6595au_firmwareqca6391_firmwaresxr2230p_firmwarewsa8840_firmwaresnapdragon_ar2_gen_1_platformqca6696_firmwarewsa8845hwcd9380_firmwaresa6150pqca6574_firmwaresm8650qsa8155p_firmwaresa8155pwsa8830sm8550psnapdragon_8\+_gen_1_mobile_platform_firmwaresa6145psm7675_firmwareflight_rb5_5g_platform_firmwareqca6574a_firmwaresm7635_firmwareqca6564sa6155wcn7750_firmwarewcn6450_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"wcd9375_firmwarerobotics_rb5_platformqca6391qcn9274_firmwaresm8475_firmwaressg2125p_firmwaresm7635qrb5165nsnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_8_gen_1_mobile_platformrobotics_rb5_platform_firmwareqcs8550sm8735_firmwarefastconnect_7800sa8145p_firmwarewcd9378qcs8155sm8635p_firmwareqca6688aq_firmwaresm8750p_firmwarewcd9375sa8150p_firmwarefastconnect_6700_firmwaresm7675sa8145pwsa8835_firmwaressg2115p_firmwaresm7675p_firmwarewsa8830_firmwareSnapdragon
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-3259
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.82% / 74.62%
||
7 Day CHG~0.00%
Published-07 Sep, 2010 | 17:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, does not properly restrict read access to images derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive image data via a crafted web site.

Action-Not Available
Vendor-webkitgtkn/aCanonical Ltd.Apple Inc.Google LLC
Product-ubuntu_linuxiphone_ossafarichromewebkitgtkn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-3917
Matching Score-6
Assigner-JPCERT/CC
ShareView Details
Matching Score-6
Assigner-JPCERT/CC
CVSS Score-6.5||MEDIUM
EPSS-0.47% / 64.61%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 12:52
Updated-07 Aug, 2024 | 03:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Google Chrome before 3.0 does not properly handle XML documents, which allows remote attackers to obtain sensitive information via a crafted web site.

Action-Not Available
Vendor-Google LLC
Product-chromeChrome
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-5212
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-0.37% / 59.21%
||
7 Day CHG~0.00%
Published-19 Jan, 2017 | 05:43
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android insufficiently sanitized DevTools URLs, which allowed a remote attacker to read local files via a crafted HTML page.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromeGoogle Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-3118
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.23% / 45.35%
||
7 Day CHG~0.00%
Published-24 Aug, 2010 | 19:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The autosuggest feature in the Omnibox implementation in Google Chrome before 5.0.375.127 does not anticipate entry of passwords, which might allow remote attackers to obtain sensitive information by reading the network traffic generated by this feature.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21624
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.05% / 14.61%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Exposure in DSP Services

Information disclosure in DSP Services while loading dynamic module.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830sa6150p_firmwaresa8145p_firmwaresnapdragon_7c\+_gen_3_firmwaresnapdragon_778g\+_firmwaresa8150p_firmwareqca6595au_firmwaresa6155snapdragon_x55_5gsnapdragon_wear_4100\+wcd9370snapdragon_835_firmwareqca6426wcn3990_firmwarewcd9385_firmwaresnapdragon_782g_firmwarewcn3660bsnapdragon_888\+_firmwaresa8155qca6320_firmwaresm7315_firmwareqca6574au_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwareqca6595ausa6155_firmwarewcd9375_firmwaresnapdragon_865\+wcn3610_firmwareqca6436_firmwaresnapdragon_xr2_5gsnapdragon_w5\+_gen_1sa6155p_firmwareqca6310qcs8155qca6698aqsa8155_firmwaresnapdragon_778g_5g_firmwaresa6145p_firmwarefastconnect_6700_firmwaresa8195pwcd9340wsa8810_firmwaresw5100qca6436sa8255p_firmwaresa6155psnapdragon_865_firmwarewcd9335snapdragon_780g_firmwareqca6698aq_firmwarewcd9385sxr2130_firmwaresa8255pwcd9341qca6696_firmwareqca6797aqsnapdragon_xr2_5g_firmwarewcd9375sa8150psnapdragon_870wsa8830_firmwaresd865_5g_firmwaresnapdragon_778g_5gwsa8815_firmwarewsa8835_firmwaresnapdragon_870_firmwaresa8195p_firmwarefastconnect_6800_firmwaresnapdragon_865\+_firmwarewcn3610wcd9380_firmwarewcn3990sw5100psd865_5gfastconnect_6800snapdragon_778g\+snapdragon_865snapdragon_780gsd888wsa8835qca6574wcd9380snapdragon_7c\+_gen_3fastconnect_6700sxr2130qca6574asm7325psnapdragon_888_firmwareqca6310_firmwarewcd9335_firmwarewcn3980qca6574_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqca6320snapdragon_782gqca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd835wcn3980_firmwaresm7315qca6391snapdragon_w5\+_gen_1_firmwarewcn6740_firmwaresnapdragon_wear_4100\+_firmwarefastconnect_6900fastconnect_6900_firmwareqca6797aq_firmwareqca6574ausa8155p_firmwarewcd9341_firmwarewsa8810sw5100p_firmwaresa6145pwcn3680bsd835_firmwaresnapdragon_835snapdragon_888sa8145psnapdragon_888\+qca6696wcn6740qca6391_firmwarewcd9370_firmwaresa6150psd888_firmwaresa8155pqcs8155_firmwaresw5100_firmwareqam8255pSnapdragon
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21267
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.21%
||
7 Day CHG~0.00%
Published-14 Aug, 2023 | 20:59
Updated-02 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of KeyguardViewMediator.java, there is a possible way to bypass lockdown mode with screen pinning due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21237
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.2||MEDIUM
EPSS-0.72% / 72.74%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-23 Oct, 2025 | 14:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-03-26||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912

Action-Not Available
Vendor-n/aAndroidGoogle LLC
Product-androidAndroidandroidPixel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21067
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.03%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-20 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Product: AndroidVersions: Android kernelAndroid ID: A-254114726References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-5166
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-3.1||LOW
EPSS-0.63% / 70.55%
||
7 Day CHG~0.00%
Published-11 Sep, 2016 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the "Save page as" menu choice.

Action-Not Available
Vendor-n/aGoogle LLCopenSUSE
Product-chromeleapn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-5172
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-1.13% / 78.52%
||
7 Day CHG~0.00%
Published-25 Sep, 2016 | 20:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.

Action-Not Available
Vendor-n/aDebian GNU/LinuxGoogle LLCNode.js (OpenJS Foundation)
Product-chromedebian_linuxnode.jsn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-49734
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.5||HIGH
EPSS-1.30% / 79.92%
||
7 Day CHG~0.00%
Published-21 Jan, 2025 | 23:04
Updated-22 Apr, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of ConnectivityService.java, there is a possible way for a Wi-Fi AP to determine what site a device has connected to through a VPN due to side channel information disclosure. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3816
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.96%
||
7 Day CHG~0.00%
Published-11 Jul, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The MediaTek display driver in Android before 2016-07-05 on Android One devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28402240.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3813
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.36%
||
7 Day CHG~0.00%
Published-11 Jul, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Qualcomm USB driver in Android before 2016-07-05 on Nexus 5, 5X, 6, and 6P devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28172322 and Qualcomm internal bug CR1010222.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-49733
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.81%
||
7 Day CHG~0.00%
Published-21 Jan, 2025 | 23:04
Updated-22 Apr, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In reload of ServiceListing.java , there is a possible way to allow a malicious app to hide an NLS from Settings due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3902
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 25.39%
||
7 Day CHG~0.00%
Published-10 Oct, 2016 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

drivers/platform/msm/ipa/ipa_qmi_service.c in the Qualcomm IPA driver in Android before 2016-10-05 on Nexus 5X and 6P devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 29953313 and Qualcomm internal bug CR 1044072.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3834
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 28.06%
||
7 Day CHG~0.00%
Published-05 Aug, 2016 | 20:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The camera APIs in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allow attackers to bypass intended access restrictions and obtain sensitive information about ANW buffer addresses via a crafted application, aka internal bug 28466701.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3761
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4||MEDIUM
EPSS-0.02% / 5.08%
||
7 Day CHG~0.00%
Published-11 Jul, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NfcService.java in NFC in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to obtain sensitive foreground-application information via a crafted background application, aka internal bug 28300969.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3860
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 28.06%
||
7 Day CHG~0.00%
Published-10 Oct, 2016 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

sound/soc/msm/qdsp6v2/audio_calibration.c in the Qualcomm sound driver in Android before 2016-10-05 on Nexus 5X, Nexus 6P, and Android One devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 29323142 and Qualcomm internal bug CR 1038127.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-10406
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.22% / 44.04%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 14:00
Updated-16 Sep, 2024 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, and SD 835, while printing debug message of a pointer in wlan_qmi_err_cb, the real kernel address will be printed regardless of the kptr_restrict system settings.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_412sd_808_firmwaresd_415sd_616sd_430_firmwaresd_615mdm9650sd_650_firmwaresd_625sd_615_firmwaresd_210sd_820_firmwaresd_820sd_650sd_808sd_450_firmwaresd_410sd_617sd_652sd_212_firmwaresd_625_firmwaresd_450sd_412_firmwaresd_430sd_810sd_835_firmwaremdm9650_firmwaresd_410_firmwaresd_835sd_205sd_210_firmwaresd_415_firmwaresd_652_firmwaresd_810_firmwaresd_616_firmwaresd_205_firmwaresd_212sd_617_firmwareSnapdragon Mobile
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3906
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.11% / 28.89%
||
7 Day CHG~0.00%
Published-25 Nov, 2016 | 16:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability in Qualcomm components including the GPU driver, power driver, SMSM Point-to-Point driver, and sound driver in Android before 2016-11-05 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Android ID: A-30445973. References: Qualcomm QC-CR#1054344.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid Kernel-3.10
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-47325
Matching Score-6
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Matching Score-6
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.26%
||
7 Day CHG~0.00%
Published-06 Feb, 2023 | 05:27
Updated-26 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t610t820sc9832et760t606s8000t616t310androidt618sc7731et612sc9863at770SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-862
Missing Authorization
CVE-2022-47324
Matching Score-6
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Matching Score-6
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.26%
||
7 Day CHG~0.00%
Published-06 Feb, 2023 | 05:27
Updated-26 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t610t820sc9832et760t606s8000t616t310androidt618sc7731et612sc9863at770SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-862
Missing Authorization
CVE-2022-47329
Matching Score-6
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Matching Score-6
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.01% / 1.26%
||
7 Day CHG~0.00%
Published-06 Feb, 2023 | 05:27
Updated-26 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t610t820sc9832et760t606s8000t616t310androidt618sc7731et612sc9863at770SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-862
Missing Authorization
CVE-2022-47367
Matching Score-6
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Matching Score-6
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 2.08%
||
7 Day CHG~0.00%
Published-06 Feb, 2023 | 05:28
Updated-26 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In bluetooth driver, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t610t820sc9832et760t606s8000t616t310androidt618sc7731et612sc9863at770SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-862
Missing Authorization
CVE-2016-3918
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 28.06%
||
7 Day CHG~0.00%
Published-10 Oct, 2016 | 10:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

email/provider/AttachmentProvider.java in AOSP Mail in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 does not ensure that certain values are integers, which allows attackers to read arbitrary attachments via a crafted application that provides a pathname value, aka internal bug 30745403.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3759
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-3.3||LOW
EPSS-0.06% / 19.01%
||
7 Day CHG~0.00%
Published-11 Jul, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Framework APIs in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allow attackers to read backup data via a crafted application that leverages priv-app access to insert a backup transport, aka internal bug 28406080.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3810
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.96%
||
7 Day CHG~0.00%
Published-11 Jul, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The MediaTek Wi-Fi driver in Android before 2016-07-05 on Android One devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28175522 and MediaTek internal bug ALPS02694389.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-46646
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-2.2||LOW
EPSS-0.10% / 27.36%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of sensitive information to an unauthorized actor for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3814
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.96%
||
7 Day CHG~0.00%
Published-11 Jul, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The NVIDIA camera driver in Android before 2016-07-05 on Nexus 9 devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28193342.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3897
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 31.61%
||
7 Day CHG~0.00%
Published-11 Sep, 2016 | 21:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WifiEnterpriseConfig class in net/wifi/WifiEnterpriseConfig.java in Wi-Fi in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-09-01 includes a password in the return value of a toString method call, which allows attackers to obtain sensitive information via a crafted application, aka internal bug 25624963.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3812
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.96%
||
7 Day CHG~0.00%
Published-11 Jul, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The MediaTek video codec driver in Android before 2016-07-05 on Android One devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28174833 and MediaTek internal bug ALPS02688832.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3836
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 28.06%
||
7 Day CHG~0.00%
Published-05 Aug, 2016 | 20:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SurfaceFlinger service in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows attackers to obtain sensitive information via a crafted application, related to lack of a default constructor in include/ui/FrameStats.h, aka internal bug 28592402.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-3892
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.28%
||
7 Day CHG~0.00%
Published-11 Sep, 2016 | 21:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Qualcomm SPMI driver in Android before 2016-09-05 on Nexus 5, 5X, 6, and 6P devices allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28760543 and Qualcomm internal bug CR1024197.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-43046
Matching Score-6
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-6
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.77%
||
7 Day CHG-0.01%
Published-07 Apr, 2025 | 10:15
Updated-06 Oct, 2025 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Exposure in TZ Secure OS

There may be information disclosure during memory re-allocation in TZ Secure OS.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6426qcn9274_firmwareqdu1010_firmwareqca6698aq_firmwareipq6010snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sdx55qcs4290_firmwaresnapdragon_xr2_5g_platform_firmwaresdx80mwcn3620sd670_firmwareqcn6023_firmwarefastconnect_6200_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)qcn5121_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)sd670sxr2330psnapdragon_auto_5g_modem-rf_gen_2qca9984qcn6274_firmwaresnapdragon_4_gen_1_mobile_platformsd_675_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)qcn5021qca6574aqcs8550_firmware9205_lte_modem_firmwaresd888_firmwaresc8380xp_firmwareqcn5052_firmwareipq5312_firmwareipq6010_firmwareipq5312qcn9012sa8155_firmwaresdx80m_firmwareqcn9012_firmwareqcn9024snapdragon_865_5g_mobile_platformaqt1000smart_audio_400_platformsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_wear_4100\+_platformqdu1210snapdragon_8_gen_3_mobile_platformsd_675snapdragon_wear_1300_platformqcn9160qca8386sxr2130snapdragon_ar2_gen_1_platform_firmwareqcn6402qca6574ausxr2130_firmwareqam8620psnapdragon_ar1_gen_1_platform_\"luna1\"snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sxr2230psnapdragon_865_5g_mobile_platform_firmwarewcn3680bsd675sa7775p_firmwareipq6028qcn9072_firmwaresd460sa8255pqca6574qcn7606_firmwareqca6574au_firmwareqcn6274snapdragon_x65_5g_modem-rf_system_firmwareqcn9070vision_intelligence_300_platformwcd9335_firmwaresa8295pqam8775pqcn9000_firmwarecsra6640_firmwareqcn6412wcd9341_firmwarewcn6650sa8620p_firmwaressg2125p_firmwaresd662_firmwaresd865_5g_firmwaresnapdragon_780g_5g_mobile_platformqca8084sd460_firmwareqca6678aq_firmwareqsm8350_firmwaresdx55_firmwaresnapdragon_429_mobile_platformqxm8083fastconnect_6700wsa8832_firmwareipq6000_firmwarewcn7861qsm8250_firmwarewcn3950qcc710qca6431_firmwaresa6145pqca6421_firmwareqca8082_firmwareqca6420qcf8000sfpqcm5430_firmwaresnapdragon_x35_5g_modem-rf_systemwcd9380wcn3950_firmwareqcm6490_firmwaresnapdragon_780g_5g_mobile_platform_firmwarewcn6650_firmwareipq6000qam8620p_firmwaresnapdragon_662_mobile_platform_firmwaresnapdragon_x62_5g_modem-rf_systemqca6335_firmwarewcn3988_firmwareqcn5021_firmwarecsr8811robotics_rb2_platformwcn7880_firmwarewsa8810snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)sxr2250p_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcn3910_firmwareqcm8550qamsrv1haqt1000_firmwaresnapdragon_8\+_gen_1_mobile_platformsa8770p_firmwareqca6574a_firmwaresm6370snapdragon_x50_5g_modem-rf_systemsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6688aqqca6595au_firmwaresnapdragon_460_mobile_platformsm4125_firmwareqcn7606qca6698aqsnapdragon_695_5g_mobile_platformsnapdragon_855_mobile_platform_firmwaresa8650p_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_x24_lte_modemsm6650_firmwareqca8081_firmwaresnapdragon_665_mobile_platform_firmwareqcs4290fastconnect_6200qcn9024_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresm7635qcm4490_firmwareipq9048_firmwareqru1032315_5g_iot_modemqcn6402_firmwaresm7315_firmwareqca6595snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarewcn6740_firmwaresnapdragon_850_mobile_compute_platform_firmwarewcd9390snapdragon_8\+_gen_2_mobile_platform_firmwarecsra6620_firmwareqcn9070_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwareqcn9022snapdragon_675_mobile_platform_firmwareipq6005_firmwareqam8255p_firmwaresdx57msm7325p_firmwarevision_intelligence_400_platform_firmwareqca6688aq_firmwaresrv1l_firmwarewcn7881_firmwareqcn6422_firmwareimmersive_home_3210_platformqcn6023sxr2330p_firmwaresnapdragon_x72_5g_modem-rf_systemwcd9385_firmwarecsr8811_firmwarefastconnect_6700_firmwareqca8072_firmwaresnapdragon_4_gen_2_mobile_platformsnapdragon_888_5g_mobile_platform_firmwarear8035qcm2290_firmwaresnapdragon_690_5g_mobile_platformsnapdragon_8_gen_1_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwaresm7635_firmwarewcn3660bipq9574_firmwaresm7250pqru1032_firmwaresnapdragon_480_5g_mobile_platformsa8150p_firmwareqcn5052ipq9048qca6564aqcn9013_firmwaresa6155p_firmwareipq5302_firmwaresnapdragon_xr2\+_gen_1_platformtalynplusqca0000qca6574_firmwareqamsrv1h_firmwareqcm8550_firmwareqam8650pqcn9274snapdragon_ar2_gen_1_platformqdu1210_firmwareqfw7124_firmwareipq9570sdx71msd_8cx_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwareqmp1000ipq5300qcn6432wcn7881wcd9326_firmwaresnapdragon_460_mobile_platform_firmwareqcs6490snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareimmersive_home_326_platform_firmwarewcn6755_firmwaresdx71m_firmwaresd_8_gen1_5gsnapdragon_x75_5g_modem-rf_systemqcs5430_firmwaresm7675snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresa8155psnapdragon_x62_5g_modem-rf_system_firmwarewcn7750_firmwaresxr2250pwcn3990_firmwarewcn6450ipq9554sm8750_firmwareqca9377_firmwaresnapdragon_670_mobile_platformqcf8000qcs9100qdu1110_firmwareqru1052_firmwareqca6335wsa8815qca6564auqca4024_firmwareqcs2290wcd9340qcn5124qcn6412_firmwaresm7325psa8530probotics_rb3_platformsnapdragon_662_mobile_platformsnapdragon_wear_1300_platform_firmwareqcn9011ipq5332ipq6028_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6174a_firmwaresrv1htalynplus_firmwarefastconnect_6900_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwareqcn9072snapdragon_wear_4100\+_platform_firmwarewcd9326snapdragon_680_4g_mobile_platformqca9984_firmwareqca4004smart_audio_400_platform_firmwarear8031snapdragon_8cx_compute_platform_\(sc8180x-ab\)snapdragon_845_mobile_platform_firmwarewsa8845qfw7114sd675_firmwaresrv1h_firmwareqca8081snapdragon_ar1_gen_1_platform_\"luna1\"_firmwarewsa8830_firmwarewsa8840sxr1230psa6145p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwaresnapdragon_auto_5g_modem-rfqam8295psnapdragon_x55_5g_modem-rf_systemsa8540p_firmwareqca0000_firmwareqdu1010qam8295p_firmwareqca8072qcn9160_firmwaresm8635p_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemwcn3620_firmwaresm6650qru1062_firmwaresa8775psdm429w_firmwaresdx65m_firmwareqca6564au_firmwareqca8075qca4024sd888sm8750pqca6430snapdragon_8\+_gen_2_mobile_platformsm7250p_firmwareqca8082qca8084_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresa7255psd_8cxipq6018ipq6018_firmwaresnapdragon_ar1_gen_1_platformssg2115p_firmwaresnapdragon_675_mobile_platformsnapdragon_7c\+_gen_3_computesm7675p_firmwaresd855_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)fastconnect_7800_firmwaresnapdragon_888_5g_mobile_platformqcm2290sm8735_firmwareqcf8000_firmwaresdx61_firmwarewcn7860sm7315sg8275p_firmwareqcn9074_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresm8750p_firmwaresa8155p_firmwaressg2115psa7255p_firmwareqca6431fastconnect_7800sm8550pqca8386_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca6436snapdragon_8_gen_2_mobile_platformsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwareqcs5430wcn3990qca6584au_firmwareqxm8083_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarefastconnect_6800wcn6755fastconnect_6900qca6426_firmwaresa9000p_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8832qca8085qdu1110qdx1011_firmwaresdx61snapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarefastconnect_6800_firmwareqdu1000_firmwarewcn3910snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_8\+_gen_1_mobile_platform_firmwarewcn7880snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_765_5g_mobile_platform_\(sm7250-aa\)qfw7114_firmwareqcn5122snapdragon_870_5g_mobile_platform_\(sm8250-ac\)sa8530p_firmwaresd855snapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewsa8835_firmwaresa8255p_firmwaresm4635_firmwarerobotics_rb2_platform_firmwarewsa8830wcn6450_firmwareqca6564a_firmwareipq9008_firmwaresrv1m_firmwaresa6155pqcn5022csra6620sc8380xpqam8775p_firmwarewcn3980qcn5121immersive_home_3210_platform_firmwareqcs6490_firmwaresd_8_gen1_5g_firmwareipq6005qcn5022_firmwarewcd9378qca6391_firmwaresnapdragon_778g_5g_mobile_platformwcd9340_firmwareipq9554_firmwaresnapdragon_480_5g_mobile_platform_firmwaresnapdragon_665_mobile_platformqcn9000ipq5332_firmwarevideo_collaboration_vc3_platformqca8337qca6696_firmwareqcm4290wcd9380_firmwareqep8111_firmwarewcn7860_firmware315_5g_iot_modem_firmwarear8035_firmwaresa8295p_firmwareqmp1000_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)snapdragon_750g_5g_mobile_platformar8031_firmwarewcd9360_firmwareqca6797aqimmersive_home_326_platformqca6174asxr2230p_firmwareqcm4490snapdragon_x35_5g_modem-rf_system_firmwarewcd9306_firmwareqcn6422qamsrv1msnapdragon_670_mobile_platform_firmwareqcn6432_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresrv1lsa6155_firmwarewcd9378_firmwareqcc710_firmwarewcd9335qca6584auwsa8845hsnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwarewsa8840_firmwareqcs8300qca6421wsa8815_firmwareqcf8001_firmwareqdx1010_firmwarewcn7861_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_429_mobile_platform_firmwareqcf8000sfp_firmwareqcs9100_firmwaresnapdragon_850_mobile_compute_platformsnapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8835vision_intelligence_300_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqcs2290_firmwareqru1052wcn3988wcd9390_firmwaresnapdragon_ar1_gen_1_platform_firmwaresm8650qqcn5152_firmwaresm8550p_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca6678aqsa8155wcd9375sm4635ipq9574sm8635qam8650p_firmware9205_lte_modemqcs4490_firmwaresnapdragon_xr2\+_gen_1_platform_firmwarerobotics_rb3_platform_firmwaresm8635psnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqcn6224sa8775p_firmwareqamsrv1m_firmwarewcd9360ipq9570_firmwaresm8650q_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)qdx1011sm7675_firmwaresnapdragon_690_5g_mobile_platform_firmwarevision_intelligence_400_platformsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwareqsm8250wcd9395_firmwarewcd9306sa8650psm6370_firmwareqca4004_firmwaressg2125psnapdragon_845_mobile_platformqca6310_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660b_firmwareqca8085_firmwaresnapdragon_x70_modem-rf_system_firmwarewcn6740qca6310qcm5430snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sdx57m_firmwareqcn6024_firmwareqep8111qca6420_firmwarewcn3999qca6696sa8540pqsm8350sa8770pqcn9013qca6595_firmwareqcm6490snapdragon_4_gen_2_mobile_platform_firmwarewsa8810_firmwarewcd9370sd662wsa8845_firmwaresnapdragon_855_mobile_platformqca6430_firmwareqcn5152qca9377qdx1010sa6155snapdragon_x70_modem-rf_systemsnapdragon_x75_5g_modem-rf_system_firmwareqcn6024csra6640snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqcn9074qru1062qdu1000qca6595ausdm429wsa8620psxr1230p_firmwareqcm4290_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_8c_compute_platform_\(sc8180xp-ad\)sa9000pqcs8300_firmwarewcn7750wcn3980_firmwaresm8735qcs4490qcn9022_firmwareqcn5122_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)qcf8001qca6391ipq9008qam8255pwcd9370_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qfw7124qcn9011_firmwareqcs8550wcd9341sd865_5gsa8150psnapdragon_xr2_5g_platformwcd9395qcn6224_firmwareqca6797aq_firmwaresm8635_firmwarewcd9375_firmwareipq5302qcn5124_firmwarewcn3680b_firmwarewcn3999_firmwaresm7675psg8275pqca8075_firmwaresdx65mwcd9385snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresa7775psm4125snapdragon_750g_5g_mobile_platform_firmwaresm8750ipq5300_firmwareqca6436_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarevideo_collaboration_vc3_platform_firmwareqca8337_firmwaresrv1mwsa8845h_firmwareSnapdragon
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-2499
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.96%
||
7 Day CHG~0.00%
Published-13 Jun, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AudioSource.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not initialize certain data, which allows attackers to obtain sensitive information via a crafted application, aka internal bug 27855172.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-2845
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-5.3||MEDIUM
EPSS-0.65% / 71.00%
||
7 Day CHG~0.00%
Published-06 Mar, 2016 | 02:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL's path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-2415
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.20%
||
7 Day CHG~0.00%
Published-18 Apr, 2016 | 00:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

exchange/eas/EasAutoDiscover.java in the Autodiscover implementation in Exchange ActiveSync in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows attackers to obtain sensitive information via a crafted application that triggers a spoofed response to a GET request, aka internal bug 26488455.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-2813
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.47% / 64.86%
||
7 Day CHG~0.00%
Published-30 Apr, 2016 | 17:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 46.0 on Android does not properly restrict JavaScript access to orientation and motion data, which allows remote attackers to obtain sensitive information about a device's physical environment, and possibly discover PIN values, via a crafted web site, a similar issue to CVE-2016-1780.

Action-Not Available
Vendor-n/aMozilla CorporationGoogle LLC
Product-androidfirefoxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-2425
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.28%
||
7 Day CHG~0.00%
Published-18 Apr, 2016 | 00:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

mail/compose/ComposeActivity.java in AOSP Mail in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 supports file:///data attachments, which allows attackers to obtain sensitive information via a crafted application, aka internal bugs 7154234 and 26989185.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-1618
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-0.91% / 76.09%
||
7 Day CHG~0.00%
Published-25 Jan, 2016 | 11:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • ...
  • 13
  • 14
  • Next
Details not found