Логотип exploitDog
bind:CVE-2017-13238
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-13238

Количество 2

Количество 2

nvd логотип

CVE-2017-13238

около 8 лет назад

In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940.

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-2ghg-9rgq-99xh

почти 4 года назад

In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940.

CVSS3: 4.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-13238

In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940.

CVSS3: 4.2
0%
Низкий
около 8 лет назад
github логотип
GHSA-2ghg-9rgq-99xh

In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940.

CVSS3: 4.2
0%
Низкий
почти 4 года назад

Уязвимостей на страницу