Логотип exploitDog
bind:CVE-2017-13238
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-13238

Количество 2

Количество 2

nvd логотип

CVE-2017-13238

почти 8 лет назад

In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940.

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-2ghg-9rgq-99xh

больше 3 лет назад

In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940.

CVSS3: 4.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-13238

In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940.

CVSS3: 4.2
0%
Низкий
почти 8 лет назад
github логотип
GHSA-2ghg-9rgq-99xh

In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940.

CVSS3: 4.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу