CVE-2020-16010

ENISA EUVD: EUVD-2020-7979 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 5, 2026 5 articles Published: 2020-11-03

EPSS Score

Source: FIRST.org · 2026-05-23
19.62%
probability
This CVE has a 19.62% probability of being exploited in the next 30 days.
0% Top 95.5th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
9.6
CRITICAL
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

CVSS v2 (legacy)

6.8
MEDIUM
Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

VulnerabilityLookup (CNA)
Heap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

Affected Products

Google
Chrome
unspecified

Attack Intelligence

Google Project Zero

Discovered
Oct. 31, 2020
Patched
Nov. 2, 2020
Reported by
Google Project Zero
Root Cause Analysis
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2020/CVE-2020-16010.html

Signal Intelligence

Confidence
95%
EPSS 19.62%
CVSS v3.1 9.6
Mentions 5
Last Seen Mar 20, 2021

CNA Information

CNA Assigner
Chrome

Analyst Note

Auto-imported from Google Project Zero — confirmed zero-day by definition.

Triage Info

Decided atMar 05, 2026
Published DateNov 03, 2020