6.5
CVSSv3

CVE-2020-0006

Published: 08/01/2020 Updated: 01/01/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

In rw_i93_send_cmd_write_single_block of rw_i93.cc, there is a possible information disclosure of heap memory due to uninitialized data. This could lead to remote information disclosure in the NFC server with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-139738828

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 8.0

google android 8.1

google android 9.0

google android 10.0

Github Repositories

Version 2.0 of the "Vulnerable-and-Exposed-Software-Package-Analyzer"

VESPA Vulnerable or Exposed Software-Package Analyzer Latest version: 20 Major changes from v10 Added support for database storage Added ETL methods for transforming data storage formats (CSV->database, database->CSV) Added new GET /data/timestamp to get the timestamp of last CVE data update Summary VESPA is a simple Python3/Flask API for assessing whethe

Version 2.0 of the "Vulnerable-and-Exposed-Software-Package-Analyzer"

VESPA Vulnerable or Exposed Software-Package Analyzer Latest version: 20 Major changes from v10 Added support for database storage Added ETL methods for transforming data storage formats (CSV->database, database->CSV) Added new GET /data/timestamp to get the timestamp of last CVE data update Summary VESPA is a simple Python3/Flask API for assessing whethe