Search for vulnerabilities
Vulnerability details: VCID-rrrn-wtbr-g3hz
Vulnerability ID VCID-rrrn-wtbr-g3hz
Aliases CVE-2016-5202
Summary browser/extensions/api/dial/dial_registry.cc in Google Chrome before 54.0.2840.98 on macOS, before 54.0.2840.99 on Windows, and before 54.0.2840.100 on Linux neglects to copy a device ID before an erase() call, which causes the erase operation to access data that that erase operation will destroy.
Status Published
Exploitability 0.5
Weighted Severity 8.2
Risk 4.1
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00029.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5202.json
https://api.first.org/data/v1/epss?cve=CVE-2016-5202
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5202
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-5202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9652
https://security-tracker.debian.org/tracker/CVE-2016-5202
1393734 https://bugzilla.redhat.com/show_bug.cgi?id=1393734
CVE-2016-5202 https://nvd.nist.gov/vuln/detail/CVE-2016-5202
RHSA-2016:2718 https://access.redhat.com/errata/RHSA-2016:2718
USN-3133-1 https://usn.ubuntu.com/3133-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5202.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2016-5202
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-5202
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.35729
EPSS Score 0.00145
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:41:50.271402+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/3133-1/ 37.0.0