{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T08:47:25.913","vulnerabilities":[{"cve":{"id":"CVE-2016-10285","sourceIdentifier":"security@android.com","published":"2017-05-12T15:29:00.517","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-33752702. References: QC-CR#1104899."},{"lang":"es","value":"Una vulnerabilidad de elevación de privilegios en el controlador de vídeo Qualcomm podría permitir que una aplicación maliciosa local ejecute código arbitrario dentro del contexto del kernel. Este problema se califica como Alto porque primero requiere comprometer un proceso privilegiado. Producto: Android. Versiones: Kernel-3.18. ID de Android: A-33752702. Referencias: QC-CR # 1104899."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:L\/AC:H\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:H\/Au:N\/C:C\/I:C\/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*","matchCriteriaId":"364CAD86-F652-4B84-932A-A8D9146C9010"}]}]}],"references":[{"url":"http:\/\/www.securityfocus.com\/bid\/98163","source":"security@android.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https:\/\/source.android.com\/security\/bulletin\/2017-05-01","source":"security@android.com","tags":["Patch","Vendor Advisory"]},{"url":"http:\/\/www.securityfocus.com\/bid\/98163","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https:\/\/source.android.com\/security\/bulletin\/2017-05-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}