** DISPUTED ** The DuckDuckGo application through 5.58.0 for Android, and through 7.47.1.0 for iOS, sends hostnames of visited web sites within HTTPS .ico requests to servers in the duckduckgo.com domain, which might make visit data available temporarily at a Potentially Unwanted Endpoint. NOTE: the vendor has stated "the favicon service adheres to our strict privacy policy."
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 05:05
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/duckduckgo/Android/blob/e2f2d54a6b4452277467db403a3546512401b493/app/src/main/java/com/duckduckgo/app/global/UriExtension.kt#L83-L88 - Patch, Third Party Advisory | |
| References | () https://github.com/duckduckgo/Android/issues/527 - Third Party Advisory | |
| References | () https://github.com/duckduckgo/iOS/blob/1ae03d7221180bd6791cf6f7f06922a96335cf75/Core/AppUrls.swift#L98-L100 - Third Party Advisory | |
| References | () https://news.ycombinator.com/item?id=23708166 - Patch, Third Party Advisory | |
| References | () https://news.ycombinator.com/item?id=23711597 - Third Party Advisory | 
Information
                Published : 2020-07-02 11:15
Updated : 2024-11-21 05:05
NVD link : CVE-2020-15502
Mitre link : CVE-2020-15502
CVE.ORG link : CVE-2020-15502
JSON object : View
Products Affected
                duckduckgo
- duckduckgo
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
