Vulnerabilites related to qualcomm - eudora
Vulnerability from fkie_nvd
Published
2001-09-20 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the "Attachment Converted" MIME header, which sends the file when the email is forwarded to the attacker by the user.
Impacted products
Vendor Product Version
qualcomm eudora 5.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "80460E6D-6093-44C3-91C7-BD75B3AE4351",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the \"Attachment Converted\" MIME header, which sends the file when the email is forwarded to the attacker by the user."
    }
  ],
  "id": "CVE-2001-0677",
  "lastModified": "2024-11-20T23:35:53.770",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-09-20T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/3085"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/177369"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/2616"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/3085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/177369"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/2616"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-05-29 04:00
Modified
2024-11-20 23:37
Severity ?
Summary
Eudora 5.1 allows remote attackers to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments.
Impacted products
Vendor Product Version
qualcomm eudora 5.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora 5.1 allows remote attackers to execute arbitrary code when the \"Use Microsoft Viewer\" option is enabled and the \"allow executables in HTML content\" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments."
    }
  ],
  "id": "CVE-2001-1326",
  "lastModified": "2024-11-20T23:37:25.607",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-05-29T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/187128"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2796"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/187128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2796"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-08-12 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string.
Impacted products
Vendor Product Version
qualcomm eudora 5.0j
qualcomm eudora 5.1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.0j:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB3BE848-D923-41C1-9E33-014C59770F98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string."
    }
  ],
  "id": "CVE-2002-0833",
  "lastModified": "2024-11-20T23:39:58.493",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-08-12T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/9765.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/5397"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/9765.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/5397"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-06-16 04:00
Modified
2024-11-20 23:44
Severity ?
Summary
Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters.
Impacted products
Vendor Product Version
qualcomm eudora 5.2.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en Eudora 5.2.1 permite que atacantes remotos causen una denegaci\u00f3n de servicio (ca\u00edda y reinicio fallido) y que posiblemente ejecuten c\u00f3digo arbitrario mediante un argumento Attachment Converted con un elevado n\u00famero de caracteres \".\" (punto)."
    }
  ],
  "id": "CVE-2003-0376",
  "lastModified": "2024-11-20T23:44:35.500",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-06-16T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:43
Severity ?
Summary
Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing "." (dot).
Impacted products
Vendor Product Version
qualcomm eudora 5.1
qualcomm eudora 5.2
qualcomm eudora 5.2.1
qualcomm eudora 6.0
qualcomm eudora 6.0.1
qualcomm eudora 6.1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8953ECC-B326-4E41-A4CE-E5F1F8D905EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AD34A80-171B-4892-A427-633BB8F2085E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEF7CAC-0603-436B-B2AD-448AA17D82F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "04FEF66B-AED6-41A2-903B-65072980039D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing \".\" (dot)."
    }
  ],
  "id": "CVE-2002-2351",
  "lastModified": "2024-11-20T23:43:28.563",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/5432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/5432"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-21 21:30
Modified
2024-11-21 00:31
Severity ?
Summary
Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply. NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue.
Impacted products
Vendor Product Version
qualcomm eudora 7.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "053DE7D1-DDB1-4A1E-9748-18FBB31B6ADD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply.  NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en Eudora 7.1 permite a servidores remotos SMTP con la intervenci\u00f3n del usuario, ejcutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de respuesta SMTP largas. NOTA: el usuario deber\u00eda hacer click a trav\u00e9s de un aviso sobre un posible desbordamiento de b\u00fafer para disparar este asunto.\r\n"
    }
  ],
  "id": "CVE-2007-2770",
  "lastModified": "2024-11-21T00:31:37.130",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-05-21T21:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36198"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25282"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/3934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36198"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25282"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/3934"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:51
Severity ?
Summary
Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed "Converted" headers.
Impacted products
Vendor Product Version
qualcomm eudora 6.2.0.14



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B5FF797-B1E7-49AA-84AA-CB8A2EEE1A06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed \"Converted\" headers."
    }
  ],
  "id": "CVE-2004-1521",
  "lastModified": "2024-11-20T23:51:05.727",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-05-06 04:00
Modified
2024-11-20 23:52
Severity ?
Summary
Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name.
Impacted products
Vendor Product Version
qualcomm eudora 5.2.1
qualcomm eudora 6.0
qualcomm eudora 6.0.1
qualcomm eudora 6.0.3
qualcomm eudora 6.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AD34A80-171B-4892-A427-633BB8F2085E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEF7CAC-0603-436B-B2AD-448AA17D82F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01DA3EF-92F6-470E-AE4D-4CDD2776B445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A72C4B66-AFEC-4035-BD72-A1133E6CCD4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name."
    }
  ],
  "id": "CVE-2004-2005",
  "lastModified": "2024-11-20T23:52:16.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2004-05-06T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/11568"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10298"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/11568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10298"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-11-14 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Eudora mail client includes the absolute path of the sender's host within a virtual card (VCF).
Impacted products
Vendor Product Version
qualcomm eudora 4.2
qualcomm eudora 4.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora mail client includes the absolute path of the sender\u0027s host within a virtual card (VCF)."
    }
  ],
  "id": "CVE-2000-0874",
  "lastModified": "2024-11-20T23:33:28.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-11-14T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/1545"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/80888"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1653"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/1545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/80888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-05-01 04:00
Modified
2024-11-20 23:28
Severity ?
Summary
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
Impacted products
Vendor Product Version
qualcomm eudora 4.2
qualcomm eudora 4.3
qualcomm eudora_light 3.0
qualcomm eudora_pro 1.00



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ACF3406-FA48-412E-A245-2FF225C74893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CC9842-AAC0-47B7-B9D5-2411ADBFEB39",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names."
    }
  ],
  "id": "CVE-1999-0427",
  "lastModified": "2024-11-20T23:28:42.790",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-05-01T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-08-12 04:00
Modified
2024-11-20 23:39
Severity ?
Summary
Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames.
Impacted products
Vendor Product Version
qualcomm eudora 5.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames."
    }
  ],
  "id": "CVE-2002-0456",
  "lastModified": "2024-11-20T23:39:08.197",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-08-12T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8487.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/262704"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8487.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/262704"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4306"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1999-08-27 04:00
Modified
2024-11-20 23:30
Severity ?
Summary
Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:frontpage:*:*:express:*:*:*:*:*",
              "matchCriteriaId": "39EC4E10-AE31-4F20-B04E-35A14F326EB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B8985B-B927-4928-B1DB-18E29F796992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F71D6D7-6CB2-4BE9-839A-A5714144029C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E9BCC03-1C5A-4674-BE84-235B9225C074",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell."
    }
  ],
  "id": "CVE-1999-1016",
  "lastModified": "2024-11-20T23:30:04.803",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-08-27T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/606"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-04-14 04:00
Modified
2024-11-20 23:52
Severity ?
Summary
Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message.
Impacted products
Vendor Product Version
qualcomm eudora 6.0.3
qualcomm eudora 6.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01DA3EF-92F6-470E-AE4D-4CDD2776B445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A72C4B66-AFEC-4035-BD72-A1133E6CCD4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message."
    }
  ],
  "id": "CVE-2004-1944",
  "lastModified": "2024-11-20T23:52:07.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-04-14T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/11360"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10137"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/11360"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10137"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-06-11 22:30
Modified
2024-11-21 00:32
Severity ?
Summary
Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command.
Impacted products
Vendor Product Version
qualcomm eudora 7.1.0.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:7.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D3B2E2-0D3E-4DAA-9EA5-9F73907B6A57",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en Qualcomm Eudora 7.1.0.9 permite a atacantes con la intervenci\u00f3n de usuarios en servidores remotos IMAP ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de respuestas largas FLAGS en un comando SELECT INBOX."
    }
  ],
  "id": "CVE-2007-3166",
  "lastModified": "2024-11-21T00:32:33.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-06-11T22:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36197"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24251"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/4014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36197"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/4014"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-06-27 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags.
Impacted products
Vendor Product Version
qualcomm eudora *
qualcomm eudora 5.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B81272A3-87BE-4053-A580-8F318B3A9EA2",
              "versionEndIncluding": "5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "80460E6D-6093-44C3-91C7-BD75B3AE4351",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the \u0027Use Microsoft Viewer\u0027 and \u0027allow executables in HTML content\u0027 options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags."
    }
  ],
  "id": "CVE-2001-0365",
  "lastModified": "2024-11-20T23:35:12.173",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-06-27T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2490"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-11-29 05:00
Modified
2024-11-20 23:40
Severity ?
Summary
Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.
Impacted products
Vendor Product Version
qualcomm eudora 5.1.1
qualcomm eudora 5.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8953ECC-B326-4E41-A4CE-E5F1F8D905EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context."
    },
    {
      "lang": "es",
      "value": "Qualcomm Eudora 5.1.1, 5.2, y posiblemente otras versiones almacenan adjuntos de correo electr\u00f3nico en una localizaci\u00f3n predecible, lo que permite a atacantes remotos leer ficheros arbitrarios mediante un enlace que carga un adjunto con script malicioso en un marco, el cual ejecuta el script en el contexto del navegador local."
    }
  ],
  "id": "CVE-2002-1210",
  "lastModified": "2024-11-20T23:40:49.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-11-29T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/advisory/11.19.02b.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/advisory/11.19.02b.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:42
Severity ?
Summary
Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer.
Impacted products
Vendor Product Version
qualcomm eudora 5.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer."
    }
  ],
  "id": "CVE-2002-1770",
  "lastModified": "2024-11-20T23:42:05.147",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://security.greymagic.com/adv/gm002-ie/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/4343"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://security.greymagic.com/adv/gm002-ie/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/4343"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:43
Severity ?
Summary
Eudora email client 5.1.1, with "use Microsoft viewer" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer.
Impacted products
Vendor Product Version
qualcomm eudora 5.1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora email client 5.1.1, with \"use Microsoft viewer\" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer."
    }
  ],
  "id": "CVE-2002-2313",
  "lastModified": "2024-11-20T23:43:23.000",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 8.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/9654.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/9654.php"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1998-07-29 04:00
Modified
2024-11-20 23:31
Severity ?
Summary
Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user's mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault.
Impacted products
Vendor Product Version
qualcomm eudora *
qualcomm eudora_light *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB4BC854-4F0F-49E2-9835-CC60917B0F95",
              "versionEndIncluding": "3.05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora_light:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89CC80BD-750C-4EB7-8FA5-669C0A3DF5F6",
              "versionEndIncluding": "3.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user\u0027s mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault."
    }
  ],
  "id": "CVE-1999-1448",
  "lastModified": "2024-11-20T23:31:08.507",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1998-07-29T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-04-28 04:00
Modified
2024-11-20 23:32
Summary
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
Impacted products
Vendor Product Version
qualcomm eudora 4.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "812A1AE1-56DE-4AA7-9AE8-FE36089189F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka \"Stealth Attachment.\""
    }
  ],
  "id": "CVE-2000-0342",
  "lastModified": "2024-11-20T23:32:17.033",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2000-04-28T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.peacefire.org/security/stealthattach/explanation.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/1157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.peacefire.org/security/stealthattach/explanation.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/1157"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-06-16 04:00
Modified
2024-11-20 23:44
Severity ?
Summary
The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors.
Impacted products
Vendor Product Version
qualcomm eudora 5.2.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors."
    },
    {
      "lang": "es",
      "value": "El cliente IMAP para Eudora 5.2.1 permite que servidores IMAP da\u00f1inos provoquen una denegaci\u00f3n de servicio y posiblemente ejecuten c\u00f3digo arbitrario mediante ciertos valores literales muy grandes que provocan errores de desbordamiento de enteros."
    }
  ],
  "id": "CVE-2003-0302",
  "lastModified": "2024-11-20T23:44:25.653",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-06-16T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-06-16 04:00
Modified
2024-11-20 23:44
Severity ?
Summary
The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:outlook_express:6.00.2800.1106:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B6C3153-39B0-4C14-B414-01BE10D8742E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C656A621-BE62-4BB8-9B25-A3916E60FA12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "82A6419D-0E94-4D80-8B07-E5AB4DBA2F28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "65DB0D49-CD49-4EF6-9013-1B03E0D644D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stuart_parmenter:balsa:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A86E91A-CAEA-4580-913C-DF610DEABF27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sylpheed:sylpheed_email_client:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED27A6B-FDDB-4729-8E98-86C062357E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:university_of_washington:pine:4.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E05D27-10F6-43CF-B7E9-73A82DE02953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ximian:evolution:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9A844BF-30CC-4289-81C4-1161FDEBC345",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors."
    },
    {
      "lang": "es",
      "value": "El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos da\u00f1inos originen una denegaci\u00f3n de servicio (ca\u00edda) mediante ciertos tama\u00f1os literales muy largos que causan desbordamientos de b\u00fafer de enteros."
    }
  ],
  "id": "CVE-2003-0300",
  "lastModified": "2024-11-20T23:44:25.410",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-06-16T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:53
Severity ?
Summary
Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long "To:" field, possibly due to a buffer overflow.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "36428240-F799-43AC-9B1D-6B1E1F408E6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "812A1AE1-56DE-4AA7-9AE8-FE36089189F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2DA75D9-846D-4B0D-9982-DD852CEBECB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC95E6A2-8EDB-459B-9051-8372C3A7AEEB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "80460E6D-6093-44C3-91C7-BD75B3AE4351",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2j_r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AEC74EC-3A6E-45F3-A2DD-1815638B4692",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1j:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0903FE4-73CB-44D9-AC2C-DCE444ADB06C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.1j_r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A34F7255-50CD-4C6F-8F4F-C0C267DD6646",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8953ECC-B326-4E41-A4CE-E5F1F8D905EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "850E6ED5-4EBE-431A-BF7F-CF2F7B7DD440",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AD34A80-171B-4892-A427-633BB8F2085E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEF7CAC-0603-436B-B2AD-448AA17D82F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01DA3EF-92F6-470E-AE4D-4CDD2776B445",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C818A9AE-446B-496C-A47B-E201B075F310",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A72C4B66-AFEC-4035-BD72-A1133E6CCD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long \"To:\" field, possibly due to a buffer overflow."
    }
  ],
  "id": "CVE-2004-2301",
  "lastModified": "2024-11-20T23:53:00.120",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/10398"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/10398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-05-22 04:00
Modified
2024-11-20 23:44
Severity ?
Summary
Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed "Attachment Converted:" string, which is not properly handled by Eudora.
Impacted products
Vendor Product Version
qualcomm eudora 5.2.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed \"Attachment Converted:\" string, which is not properly handled by Eudora."
    }
  ],
  "id": "CVE-2003-0336",
  "lastModified": "2024-11-20T23:44:30.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-05-22T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2000-0874
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 05:37
Severity ?
Summary
Eudora mail client includes the absolute path of the sender's host within a virtual card (VCF).
References
http://www.securityfocus.com/archive/1/80888mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/1653vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/5206vdb-entry, x_refsource_XF
http://www.osvdb.org/1545vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:37:30.631Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20000907 Eudora disclosure",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/80888"
          },
          {
            "name": "1653",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1653"
          },
          {
            "name": "eudora-path-disclosure(5206)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206"
          },
          {
            "name": "1545",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/1545"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-09-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora mail client includes the absolute path of the sender\u0027s host within a virtual card (VCF)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2004-09-02T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20000907 Eudora disclosure",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/80888"
        },
        {
          "name": "1653",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1653"
        },
        {
          "name": "eudora-path-disclosure(5206)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206"
        },
        {
          "name": "1545",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/1545"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0874",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora mail client includes the absolute path of the sender\u0027s host within a virtual card (VCF)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20000907 Eudora disclosure",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/80888"
            },
            {
              "name": "1653",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1653"
            },
            {
              "name": "eudora-path-disclosure(5206)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206"
            },
            {
              "name": "1545",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/1545"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0874",
    "datePublished": "2001-05-07T04:00:00",
    "dateReserved": "2000-10-18T00:00:00",
    "dateUpdated": "2024-08-08T05:37:30.631Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-2351
Vulnerability from cvelistv5
Published
2007-10-29 19:00
Modified
2024-09-16 21:08
Severity ?
Summary
Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing "." (dot).
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:59:11.886Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "5432",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5432"
          },
          {
            "name": "20020807 Eudora attachment spoof",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing \".\" (dot)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-10-29T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "5432",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5432"
        },
        {
          "name": "20020807 Eudora attachment spoof",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-2351",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing \".\" (dot)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "5432",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5432"
            },
            {
              "name": "20020807 Eudora attachment spoof",
              "refsource": "BUGTRAQ",
              "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html"
            },
            {
              "name": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt",
              "refsource": "CONFIRM",
              "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-2351",
    "datePublished": "2007-10-29T19:00:00Z",
    "dateReserved": "2007-10-29T00:00:00Z",
    "dateUpdated": "2024-09-16T21:08:11.092Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0365
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:14
Severity ?
Summary
Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags.
References
http://marc.info/?l=bugtraq&m=98503741910995&w=2mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/2490vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/6262vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:14:07.481Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20010318 feeble.you!dora.exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2"
          },
          {
            "name": "2490",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2490"
          },
          {
            "name": "eudora-html-execute-code(6262)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the \u0027Use Microsoft Viewer\u0027 and \u0027allow executables in HTML content\u0027 options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20010318 feeble.you!dora.exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2"
        },
        {
          "name": "2490",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2490"
        },
        {
          "name": "eudora-html-execute-code(6262)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0365",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the \u0027Use Microsoft Viewer\u0027 and \u0027allow executables in HTML content\u0027 options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20010318 feeble.you!dora.exploit",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2"
            },
            {
              "name": "2490",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2490"
            },
            {
              "name": "eudora-html-execute-code(6262)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0365",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-05-24T00:00:00",
    "dateUpdated": "2024-08-08T04:14:07.481Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2770
Vulnerability from cvelistv5
Published
2007-05-21 21:00
Modified
2024-08-07 13:49
Severity ?
Summary
Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply. NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue.
References
https://www.exploit-db.com/exploits/3934exploit, x_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilities/34324vdb-entry, x_refsource_XF
http://osvdb.org/36198vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/25282third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:49:57.411Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3934",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/3934"
          },
          {
            "name": "eudora-smtp-server-bo(34324)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324"
          },
          {
            "name": "36198",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36198"
          },
          {
            "name": "25282",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25282"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply.  NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3934",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/3934"
        },
        {
          "name": "eudora-smtp-server-bo(34324)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324"
        },
        {
          "name": "36198",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36198"
        },
        {
          "name": "25282",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25282"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2770",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply.  NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3934",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/3934"
            },
            {
              "name": "eudora-smtp-server-bo(34324)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324"
            },
            {
              "name": "36198",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36198"
            },
            {
              "name": "25282",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25282"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2770",
    "datePublished": "2007-05-21T21:00:00",
    "dateReserved": "2007-05-21T00:00:00",
    "dateUpdated": "2024-08-07T13:49:57.411Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2003-0300
Vulnerability from cvelistv5
Published
2003-05-15 04:00
Modified
2024-08-08 01:50
Severity ?
Summary
The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors.
References
http://marc.info/?l=bugtraq&m=105294024124163&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:50:47.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20030514 Buffer overflows in multiple IMAP clients",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-05-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20030514 Buffer overflows in multiple IMAP clients",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0300",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20030514 Buffer overflows in multiple IMAP clients",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0300",
    "datePublished": "2003-05-15T04:00:00",
    "dateReserved": "2003-05-14T00:00:00",
    "dateUpdated": "2024-08-08T01:50:47.085Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-0427
Vulnerability from cvelistv5
Published
2000-02-04 05:00
Modified
2024-08-01 16:41
Severity ?
Summary
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:41:44.894Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-17T07:32:47",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0427",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427",
              "refsource": "MISC",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0427",
    "datePublished": "2000-02-04T05:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T16:41:44.894Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2003-0302
Vulnerability from cvelistv5
Published
2003-05-15 04:00
Modified
2024-08-08 01:50
Severity ?
Summary
The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors.
References
http://marc.info/?l=bugtraq&m=105294024124163&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:50:47.730Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20030514 Buffer overflows in multiple IMAP clients",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-05-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20030514 Buffer overflows in multiple IMAP clients",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0302",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20030514 Buffer overflows in multiple IMAP clients",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0302",
    "datePublished": "2003-05-15T04:00:00",
    "dateReserved": "2003-05-14T00:00:00",
    "dateUpdated": "2024-08-08T01:50:47.730Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-1016
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 16:55
Severity ?
Summary
Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
References
http://marc.info/?l=ntbugtraq&m=93578772920970&w=2mailing-list, x_refsource_NTBUGTRAQ
http://www.securityfocus.com/bid/606vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:55:29.417Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19990827 HTML code to crash IE5 and Outlook Express 5",
            "tags": [
              "mailing-list",
              "x_refsource_NTBUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2"
          },
          {
            "name": "606",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/606"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1999-08-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19990827 HTML code to crash IE5 and Outlook Express 5",
          "tags": [
            "mailing-list",
            "x_refsource_NTBUGTRAQ"
          ],
          "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2"
        },
        {
          "name": "606",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/606"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1016",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19990827 HTML code to crash IE5 and Outlook Express 5",
              "refsource": "NTBUGTRAQ",
              "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2"
            },
            {
              "name": "606",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/606"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1016",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T16:55:29.417Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-3166
Vulnerability from cvelistv5
Published
2007-06-11 22:00
Modified
2024-08-07 14:05
Severity ?
Summary
Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command.
References
https://www.exploit-db.com/exploits/4014exploit, x_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilities/34625vdb-entry, x_refsource_XF
http://osvdb.org/36197vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/24251vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:05:29.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "4014",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/4014"
          },
          {
            "name": "eudora-imap-command-execution(34625)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625"
          },
          {
            "name": "36197",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36197"
          },
          {
            "name": "24251",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24251"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "4014",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/4014"
        },
        {
          "name": "eudora-imap-command-execution(34625)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625"
        },
        {
          "name": "36197",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36197"
        },
        {
          "name": "24251",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24251"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3166",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "4014",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/4014"
            },
            {
              "name": "eudora-imap-command-execution(34625)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625"
            },
            {
              "name": "36197",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36197"
            },
            {
              "name": "24251",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24251"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3166",
    "datePublished": "2007-06-11T22:00:00",
    "dateReserved": "2007-06-11T00:00:00",
    "dateUpdated": "2024-08-07T14:05:29.266Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1326
Vulnerability from cvelistv5
Published
2002-05-03 04:00
Modified
2024-08-08 04:51
Severity ?
Summary
Eudora 5.1 allows remote attackers to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments.
References
http://www.securityfocus.com/archive/1/187128mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/2796vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.192Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20010528 feeble.hey!dora.exploit part.II",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/187128"
          },
          {
            "name": "2796",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2796"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-05-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora 5.1 allows remote attackers to execute arbitrary code when the \"Use Microsoft Viewer\" option is enabled and the \"allow executables in HTML content\" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-05-09T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20010528 feeble.hey!dora.exploit part.II",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/187128"
        },
        {
          "name": "2796",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2796"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1326",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora 5.1 allows remote attackers to execute arbitrary code when the \"Use Microsoft Viewer\" option is enabled and the \"allow executables in HTML content\" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20010528 feeble.hey!dora.exploit part.II",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/187128"
            },
            {
              "name": "2796",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2796"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1326",
    "datePublished": "2002-05-03T04:00:00",
    "dateReserved": "2002-05-01T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.192Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-0456
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:49
Severity ?
Summary
Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames.
References
http://www.securityfocus.com/archive/1/262704mailing-list, x_refsource_BUGTRAQ
http://www.iss.net/security_center/static/8487.phpvdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=101622857703677&w=2mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/4306vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:49:28.432Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020316 MSIE vulnerability exploitable with Eudora (was: IncrediMail)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/262704"
          },
          {
            "name": "eudora-insecure-attachment-directory(8487)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/8487.php"
          },
          {
            "name": "20020315 RE: MSIE vulnerability exploitable with IncrediMail",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2"
          },
          {
            "name": "4306",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4306"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020316 MSIE vulnerability exploitable with Eudora (was: IncrediMail)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/262704"
        },
        {
          "name": "eudora-insecure-attachment-directory(8487)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/8487.php"
        },
        {
          "name": "20020315 RE: MSIE vulnerability exploitable with IncrediMail",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2"
        },
        {
          "name": "4306",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4306"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0456",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020316 MSIE vulnerability exploitable with Eudora (was: IncrediMail)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/262704"
            },
            {
              "name": "eudora-insecure-attachment-directory(8487)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/8487.php"
            },
            {
              "name": "20020315 RE: MSIE vulnerability exploitable with IncrediMail",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2"
            },
            {
              "name": "4306",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4306"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0456",
    "datePublished": "2002-06-11T04:00:00",
    "dateReserved": "2002-06-07T00:00:00",
    "dateUpdated": "2024-08-08T02:49:28.432Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2000-0342
Vulnerability from cvelistv5
Published
2000-07-12 04:00
Modified
2024-08-08 05:14
Severity ?
Summary
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:14:21.354Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.peacefire.org/security/stealthattach/explanation.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077"
          },
          {
            "name": "1157",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1157"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka \"Stealth Attachment.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.peacefire.org/security/stealthattach/explanation.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077"
        },
        {
          "name": "1157",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1157"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0342",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka \"Stealth Attachment.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.peacefire.org/security/stealthattach/explanation.html",
              "refsource": "MISC",
              "url": "http://www.peacefire.org/security/stealthattach/explanation.html"
            },
            {
              "name": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077",
              "refsource": "CONFIRM",
              "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077"
            },
            {
              "name": "1157",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1157"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0342",
    "datePublished": "2000-07-12T04:00:00",
    "dateReserved": "2000-05-11T00:00:00",
    "dateUpdated": "2024-08-08T05:14:21.354Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-0833
Vulnerability from cvelistv5
Published
2002-08-07 04:00
Modified
2024-08-08 03:03
Severity ?
Summary
Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string.
References
http://marc.info/?l=bugtraq&m=102858453720304&w=2mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/5397vdb-entry, x_refsource_BID
http://www.iss.net/security_center/static/9765.phpvdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=102883538924494&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:03:48.913Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020805 [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2"
          },
          {
            "name": "5397",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5397"
          },
          {
            "name": "eudora-boundary-bo(9765)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9765.php"
          },
          {
            "name": "20020808 [SNS Advisory No.55 rev.2] Eudora 5.x for Windows Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-08-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020805 [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2"
        },
        {
          "name": "5397",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5397"
        },
        {
          "name": "eudora-boundary-bo(9765)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9765.php"
        },
        {
          "name": "20020808 [SNS Advisory No.55 rev.2] Eudora 5.x for Windows Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0833",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020805 [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2"
            },
            {
              "name": "5397",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5397"
            },
            {
              "name": "eudora-boundary-bo(9765)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9765.php"
            },
            {
              "name": "20020808 [SNS Advisory No.55 rev.2] Eudora 5.x for Windows Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0833",
    "datePublished": "2002-08-07T04:00:00",
    "dateReserved": "2002-08-06T00:00:00",
    "dateUpdated": "2024-08-08T03:03:48.913Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-1210
Vulnerability from cvelistv5
Published
2002-11-21 05:00
Modified
2024-08-08 03:19
Severity ?
Summary
Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:19:28.115Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/advisory/11.19.02b.txt"
          },
          {
            "name": "20021119 iDEFENSE Security Advisory 11.19.02b: Eudora Script Execution Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_VULNWATCH",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-11-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-18T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.idefense.com/advisory/11.19.02b.txt"
        },
        {
          "name": "20021119 iDEFENSE Security Advisory 11.19.02b: Eudora Script Execution Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_VULNWATCH"
          ],
          "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1210",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.idefense.com/advisory/11.19.02b.txt",
              "refsource": "MISC",
              "url": "http://www.idefense.com/advisory/11.19.02b.txt"
            },
            {
              "name": "20021119 iDEFENSE Security Advisory 11.19.02b: Eudora Script Execution Vulnerability",
              "refsource": "VULNWATCH",
              "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1210",
    "datePublished": "2002-11-21T05:00:00",
    "dateReserved": "2002-10-14T00:00:00",
    "dateUpdated": "2024-08-08T03:19:28.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-1944
Vulnerability from cvelistv5
Published
2005-05-10 04:00
Modified
2024-08-08 01:07
Severity ?
Summary
Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message.
References
http://www.securityfocus.com/bid/10137vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/15857vdb-entry, x_refsource_XF
http://secunia.com/advisories/11360third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=108241694627321&w=2mailing-list, x_refsource_BUGTRAQ
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.htmlmailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:07:49.165Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "10137",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10137"
          },
          {
            "name": "eudora-mime-message-dos(15857)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857"
          },
          {
            "name": "11360",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11360"
          },
          {
            "name": "20040419 Eudora 6.1 is evil",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2"
          },
          {
            "name": "20040414 Eudora 6.0.3 nested MIME DoS",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "10137",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10137"
        },
        {
          "name": "eudora-mime-message-dos(15857)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857"
        },
        {
          "name": "11360",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11360"
        },
        {
          "name": "20040419 Eudora 6.1 is evil",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2"
        },
        {
          "name": "20040414 Eudora 6.0.3 nested MIME DoS",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1944",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "10137",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10137"
            },
            {
              "name": "eudora-mime-message-dos(15857)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857"
            },
            {
              "name": "11360",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11360"
            },
            {
              "name": "20040419 Eudora 6.1 is evil",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2"
            },
            {
              "name": "20040414 Eudora 6.0.3 nested MIME DoS",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1944",
    "datePublished": "2005-05-10T04:00:00",
    "dateReserved": "2005-05-04T00:00:00",
    "dateUpdated": "2024-08-08T01:07:49.165Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-2313
Vulnerability from cvelistv5
Published
2007-10-26 19:00
Modified
2024-09-16 22:56
Severity ?
Summary
Eudora email client 5.1.1, with "use Microsoft viewer" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:59:12.048Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020724 REFRESH: EUDORA MAIL 5.1.1",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html"
          },
          {
            "name": "eudora-mhtml-execute-files(9654)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9654.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora email client 5.1.1, with \"use Microsoft viewer\" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-10-26T19:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020724 REFRESH: EUDORA MAIL 5.1.1",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html"
        },
        {
          "name": "eudora-mhtml-execute-files(9654)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9654.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-2313",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora email client 5.1.1, with \"use Microsoft viewer\" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020724 REFRESH: EUDORA MAIL 5.1.1",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html"
            },
            {
              "name": "eudora-mhtml-execute-files(9654)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9654.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-2313",
    "datePublished": "2007-10-26T19:00:00Z",
    "dateReserved": "2007-10-26T00:00:00Z",
    "dateUpdated": "2024-09-16T22:56:28.032Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2003-0376
Vulnerability from cvelistv5
Published
2003-06-06 04:00
Modified
2024-08-08 01:50
Severity ?
Summary
Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters.
References
http://marc.info/?l=bugtraq&m=105370625529452&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:50:47.721Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20030523 Eudora 5.2.1 buffer overflow DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-05-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20030523 Eudora 5.2.1 buffer overflow DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0376",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20030523 Eudora 5.2.1 buffer overflow DoS",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0376",
    "datePublished": "2003-06-06T04:00:00",
    "dateReserved": "2003-06-04T00:00:00",
    "dateUpdated": "2024-08-08T01:50:47.721Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-1770
Vulnerability from cvelistv5
Published
2005-06-21 04:00
Modified
2024-08-08 03:34
Severity ?
Summary
Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:56.202Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "msviewer-tvideo-execute-attachment(8609)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609"
          },
          {
            "name": "2002032 Automatically opening IE + Executing attachments",
            "tags": [
              "mailing-list",
              "x_refsource_NTBUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2"
          },
          {
            "name": "2002032 Automatically opening IE + Executing attachments",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://security.greymagic.com/adv/gm002-ie/"
          },
          {
            "name": "4343",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4343"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-03-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "msviewer-tvideo-execute-attachment(8609)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609"
        },
        {
          "name": "2002032 Automatically opening IE + Executing attachments",
          "tags": [
            "mailing-list",
            "x_refsource_NTBUGTRAQ"
          ],
          "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2"
        },
        {
          "name": "2002032 Automatically opening IE + Executing attachments",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://security.greymagic.com/adv/gm002-ie/"
        },
        {
          "name": "4343",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4343"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1770",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "msviewer-tvideo-execute-attachment(8609)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609"
            },
            {
              "name": "2002032 Automatically opening IE + Executing attachments",
              "refsource": "NTBUGTRAQ",
              "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2"
            },
            {
              "name": "2002032 Automatically opening IE + Executing attachments",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2"
            },
            {
              "name": "http://security.greymagic.com/adv/gm002-ie/",
              "refsource": "MISC",
              "url": "http://security.greymagic.com/adv/gm002-ie/"
            },
            {
              "name": "4343",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4343"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1770",
    "datePublished": "2005-06-21T04:00:00",
    "dateReserved": "2005-06-21T00:00:00",
    "dateUpdated": "2024-08-08T03:34:56.202Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-1521
Vulnerability from cvelistv5
Published
2005-02-19 05:00
Modified
2024-08-08 00:53
Severity ?
Summary
Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed "Converted" headers.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:53:24.118Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20041113 Eudora 6.2 attachment spoof",
            "tags": [
              "mailing-list",
              "x_refsource_NTBUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2"
          },
          {
            "name": "eudora-base64-attach-spoof-variant(18064)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064"
          },
          {
            "name": "20041113 Eudora 6.2 attachment spoof",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-11-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed \"Converted\" headers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20041113 Eudora 6.2 attachment spoof",
          "tags": [
            "mailing-list",
            "x_refsource_NTBUGTRAQ"
          ],
          "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2"
        },
        {
          "name": "eudora-base64-attach-spoof-variant(18064)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064"
        },
        {
          "name": "20041113 Eudora 6.2 attachment spoof",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1521",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed \"Converted\" headers."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20041113 Eudora 6.2 attachment spoof",
              "refsource": "NTBUGTRAQ",
              "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2"
            },
            {
              "name": "eudora-base64-attach-spoof-variant(18064)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064"
            },
            {
              "name": "20041113 Eudora 6.2 attachment spoof",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2"
            },
            {
              "name": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1521",
    "datePublished": "2005-02-19T05:00:00",
    "dateReserved": "2005-02-18T00:00:00",
    "dateUpdated": "2024-08-08T00:53:24.118Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-2005
Vulnerability from cvelistv5
Published
2005-05-10 04:00
Modified
2024-08-08 01:15
Severity ?
Summary
Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:15:01.049Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
          },
          {
            "name": "10298",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10298"
          },
          {
            "name": "20040507 Eudora file URL buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2"
          },
          {
            "name": "11568",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11568"
          },
          {
            "name": "eudora-long-url-bo(16086)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086"
          },
          {
            "name": "20040507 Eudora file URL buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-05-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
        },
        {
          "name": "10298",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10298"
        },
        {
          "name": "20040507 Eudora file URL buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2"
        },
        {
          "name": "11568",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11568"
        },
        {
          "name": "eudora-long-url-bo(16086)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086"
        },
        {
          "name": "20040507 Eudora file URL buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2005",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt",
              "refsource": "CONFIRM",
              "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
            },
            {
              "name": "10298",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10298"
            },
            {
              "name": "20040507 Eudora file URL buffer overflow",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2"
            },
            {
              "name": "11568",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11568"
            },
            {
              "name": "eudora-long-url-bo(16086)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086"
            },
            {
              "name": "20040507 Eudora file URL buffer overflow",
              "refsource": "FULLDISC",
              "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2005",
    "datePublished": "2005-05-10T04:00:00",
    "dateReserved": "2005-05-04T00:00:00",
    "dateUpdated": "2024-08-08T01:15:01.049Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2003-0336
Vulnerability from cvelistv5
Published
2003-05-23 04:00
Modified
2024-08-08 01:50
Severity ?
Summary
Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed "Attachment Converted:" string, which is not properly handled by Eudora.
References
http://marc.info/?l=bugtraq&m=105362278914731&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:50:47.334Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20030522 Eudora 5.2.1 attachment spoof",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-05-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed \"Attachment Converted:\" string, which is not properly handled by Eudora."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20030522 Eudora 5.2.1 attachment spoof",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0336",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed \"Attachment Converted:\" string, which is not properly handled by Eudora."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20030522 Eudora 5.2.1 attachment spoof",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0336",
    "datePublished": "2003-05-23T04:00:00",
    "dateReserved": "2003-05-22T00:00:00",
    "dateUpdated": "2024-08-08T01:50:47.334Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-2301
Vulnerability from cvelistv5
Published
2005-08-05 04:00
Modified
2024-08-08 01:22
Severity ?
Summary
Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long "To:" field, possibly due to a buffer overflow.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:22:13.433Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
          },
          {
            "name": "10398",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10398"
          },
          {
            "name": "eudora-to-field-dos(16246)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long \"To:\" field, possibly due to a buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
        },
        {
          "name": "10398",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10398"
        },
        {
          "name": "eudora-to-field-dos(16246)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2301",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long \"To:\" field, possibly due to a buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt",
              "refsource": "CONFIRM",
              "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt"
            },
            {
              "name": "10398",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10398"
            },
            {
              "name": "eudora-to-field-dos(16246)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2301",
    "datePublished": "2005-08-05T04:00:00",
    "dateReserved": "2005-08-05T00:00:00",
    "dateUpdated": "2024-08-08T01:22:13.433Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-1999-1448
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:11
Severity ?
Summary
Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user's mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault.
References
http://marc.info/?l=bugtraq&m=90221104526168&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:11:03.281Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19980729 Eudora exploit (was Microsoft Security Bulletin (MS98-008))",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "1998-07-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user\u0027s mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19980729 Eudora exploit (was Microsoft Security Bulletin (MS98-008))",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1448",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user\u0027s mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19980729 Eudora exploit (was Microsoft Security Bulletin (MS98-008))",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1448",
    "datePublished": "2001-09-12T04:00:00",
    "dateReserved": "2001-08-31T00:00:00",
    "dateUpdated": "2024-08-01T17:11:03.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-0677
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:30
Severity ?
Summary
Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the "Attachment Converted" MIME header, which sends the file when the email is forwarded to the attacker by the user.
References
http://www.securityfocus.com/bid/2616vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/6431vdb-entry, x_refsource_XF
http://www.osvdb.org/3085vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/177369mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:30:06.104Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "2616",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/2616"
          },
          {
            "name": "eudora-plain-text-attachment(6431)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431"
          },
          {
            "name": "3085",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/3085"
          },
          {
            "name": "20010418 Eudora file leakage problem (still)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/177369"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the \"Attachment Converted\" MIME header, which sends the file when the email is forwarded to the attacker by the user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-03-01T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "2616",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/2616"
        },
        {
          "name": "eudora-plain-text-attachment(6431)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431"
        },
        {
          "name": "3085",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/3085"
        },
        {
          "name": "20010418 Eudora file leakage problem (still)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/177369"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0677",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the \"Attachment Converted\" MIME header, which sends the file when the email is forwarded to the attacker by the user."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "2616",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/2616"
            },
            {
              "name": "eudora-plain-text-attachment(6431)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431"
            },
            {
              "name": "3085",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/3085"
            },
            {
              "name": "20010418 Eudora file leakage problem (still)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/177369"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0677",
    "datePublished": "2002-03-09T05:00:00",
    "dateReserved": "2001-08-29T00:00:00",
    "dateUpdated": "2024-08-08T04:30:06.104Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201911-1434
Vulnerability from variot

Improper validation of read and write index of tx and rx fifo`s before calculating pointer can lead to out-of-bound access in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem.

Many Qualcomm products have input validation error vulnerabilities, and no detailed vulnerability details are currently available

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1434",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sdx24",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 427",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sda660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 425",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 675",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 429",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "215",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 730",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 712",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 632",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 205",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 212",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 835",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 845",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdx20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 210",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "215",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 210",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm 8996au",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "605"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "210"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "212"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "205"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "425"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "427"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "430"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "435"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "429"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "450"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "625"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "632"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "675"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "712"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "710"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "670"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "730"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "820"
      },
      {
        "model": "sd 820a",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "835"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "845"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "850"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "855"
      },
      {
        "model": "sda",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "630"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "24"
      },
      {
        "model": "msm 8909w",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "636"
      },
      {
        "model": "sdx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "20"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9206"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9607"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9150"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9640"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9650"
      },
      {
        "model": "eudora",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "215"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2283"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qualcomm_215_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      }
    ]
  },
  "cve": "CVE-2019-2283",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-2283",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-20152",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-2283",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-2283",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-2283",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-2283",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-20152",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201909-120",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-2283",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-2283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2283"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Improper validation of read and write index of tx and rx fifo`s before calculating pointer can lead to out-of-bound access in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nMany Qualcomm products have input validation error vulnerabilities, and no detailed vulnerability details are currently available",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-2283"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-2283",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-120",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-2283",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-2283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2283"
      }
    ]
  },
  "id": "VAR-201911-1434",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:55:20.582000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831",
        "trust": 0.8,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20152)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/211523"
      },
      {
        "title": "Multiple Qualcomm Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97882"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-125",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2283"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2283"
      },
      {
        "trust": 1.2,
        "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2283"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2019-09-01"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/125.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-2283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2283"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-2283"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2283"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "date": "2019-11-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-2283"
      },
      {
        "date": "2019-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "date": "2019-09-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      },
      {
        "date": "2019-11-06T17:15:13.487000",
        "db": "NVD",
        "id": "CVE-2019-2283"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20152"
      },
      {
        "date": "2020-08-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-2283"
      },
      {
        "date": "2019-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      },
      {
        "date": "2019-11-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      },
      {
        "date": "2024-11-21T04:40:36.840000",
        "db": "NVD",
        "id": "CVE-2019-2283"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Snapdragon Product buffer error vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011673"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-120"
      }
    ],
    "trust": 0.6
  }
}

var-201911-1433
Vulnerability from variot

Improper validation of array index causes OOB write and then leads to memory corruption in MMCP in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9607, etc. are all products of Qualcomm. MDM9607 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem.

MMCP in many Qualcomm products has an input validation error vulnerability. The vulnerability stems from the fact that the network system or product did not correctly verify the input data, and there is currently no detailed vulnerability details provided

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1433",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sd 427",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sda660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 425",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 675",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 429",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9615",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "215",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 730",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 615",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9655",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 616",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sxr1130",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 665",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 712",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 632",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 8cx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 415",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 205",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 212",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 835",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 652",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "snapdragon high med 2016",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 845",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdx20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9635m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 210",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9615",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9625",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9635m",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9655",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm 8996au",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "605"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "210"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "212"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "205"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "425"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "427"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "430"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "435"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "429"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "450"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "615/16"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "415"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "625"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "632"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "665"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "675"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "712"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "710"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "670"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "730"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "820"
      },
      {
        "model": "sd 820a",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "835"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "845"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "850"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "855"
      },
      {
        "model": "sda",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "630"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "msm 8909w",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "636"
      },
      {
        "model": "sdx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "20"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9607"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9150"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9640"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9650"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9615"
      },
      {
        "model": "sd 8cx",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "snapdragon high med",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "2016"
      },
      {
        "model": "sxr",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "1130"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9625"
      },
      {
        "model": "mdm 9635m",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9655"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "650/52"
      },
      {
        "model": "eudora",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "215"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2258"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9615_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9625_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9635m_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9655_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "heidada",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-2258",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-2258",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-20150",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-2258",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-2258",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-2258",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-2258",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-20150",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201909-123",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2258"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Improper validation of array index causes OOB write and then leads to memory corruption in MMCP in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9607, etc. are all products of Qualcomm. MDM9607 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nMMCP in many Qualcomm products has an input validation error vulnerability. The vulnerability stems from the fact that the network system or product did not correctly verify the input data, and there is currently no detailed vulnerability details provided",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-2258",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2258"
      }
    ]
  },
  "id": "VAR-201911-1433",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:44:47.136000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831",
        "trust": 0.8,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20150)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/211527"
      },
      {
        "title": "Multiple Qualcomm Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97885"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-129",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2258"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2258"
      },
      {
        "trust": 1.2,
        "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2258"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2019-09-01"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2258"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2258"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      },
      {
        "date": "2019-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "date": "2019-09-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      },
      {
        "date": "2019-11-06T17:15:13.330000",
        "db": "NVD",
        "id": "CVE-2019-2258"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20150"
      },
      {
        "date": "2019-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      },
      {
        "date": "2019-11-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      },
      {
        "date": "2024-11-21T04:40:33.563000",
        "db": "NVD",
        "id": "CVE-2019-2258"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Snapdragon Vulnerability related to array index verification in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011676"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-123"
      }
    ],
    "trust": 0.6
  }
}

var-201911-1425
Vulnerability from variot

Kernel can do a memory read from arbitrary address passed by user during execution of a syscall in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9205, MDM9650, QCA8081, QCS605, SD 427, SD 435, SD 450, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9650 is a central processing unit (CPU) product of Qualcomm.

The Kernel in many Qualcomm products has an input validation error vulnerability. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1425",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sd 8cx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 427",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sda660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 835",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 675",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "snapdragon high med 2016",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 730",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9205",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 845",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "ipq8074",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca8081",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdx20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sxr1130",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 665",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 712",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "ipq8074",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9205",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca8081",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 427",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9650"
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "605"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "427"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "435"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "450"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "625"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "665"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "675"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "712"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "710"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "670"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "730"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "835"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "845"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "850"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "855"
      },
      {
        "model": "sda",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "630"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "636"
      },
      {
        "model": "sdx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "20"
      },
      {
        "model": "sd 8cx",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "snapdragon high med",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "2016"
      },
      {
        "model": "sxr",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "1130"
      },
      {
        "model": "ipq",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "8074"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9205"
      },
      {
        "model": "qca",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "8081"
      },
      {
        "model": "eudora",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "215"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2249"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:qualcomm:ipq8074_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9205_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qca8081_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_636_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      }
    ]
  },
  "cve": "CVE-2019-2249",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-2249",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-20149",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-2249",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-2249",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-2249",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-2249",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-20149",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201909-124",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2249"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kernel can do a memory read from arbitrary address passed by user during execution of a syscall in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9205, MDM9650, QCA8081, QCS605, SD 427, SD 435, SD 450, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9650 is a central processing unit (CPU) product of Qualcomm. \n\r\n\r\nThe Kernel in many Qualcomm products has an input validation error vulnerability. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2249"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-2249",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-124",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2249"
      }
    ]
  },
  "id": "VAR-201911-1425",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:21:24.025000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831",
        "trust": 0.8,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20149)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/211529"
      },
      {
        "title": "Multiple Qualcomm Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97886"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-125",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2249"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2249"
      },
      {
        "trust": 1.2,
        "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2249"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2019-09-01"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2249"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2249"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      },
      {
        "date": "2019-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "date": "2019-09-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      },
      {
        "date": "2019-11-06T17:15:13.267000",
        "db": "NVD",
        "id": "CVE-2019-2249"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20149"
      },
      {
        "date": "2019-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      },
      {
        "date": "2019-11-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      },
      {
        "date": "2024-11-21T04:40:32.140000",
        "db": "NVD",
        "id": "CVE-2019-2249"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Snapdragon Product out-of-bounds vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011677"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-124"
      }
    ],
    "trust": 0.6
  }
}

var-201911-1430
Vulnerability from variot

While deserializing any key blob during key operations, buffer overflow could occur exposing partial key information if any key operations are invoked(Depends on CVE-2018-13907) in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an input validation vulnerability.Information may be obtained. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm.

Many Qualcomm products have input validation error vulnerabilities, which can be exploited by attackers to cause buffer overflows or heap overflows

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1430",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sd 427",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sda660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 425",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 429",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "215",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sxr1130",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs404",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 712",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 632",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 8cx",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 410",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 205",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 212",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 835",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 652",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "snapdragon high med 2016",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9205",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 845",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 412",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 210",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9205",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs404",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "215",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm 8996au",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "605"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "210"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "212"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "205"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "425"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "427"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "430"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "435"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "429"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "450"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "625"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "632"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "712"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "710"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "670"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "820"
      },
      {
        "model": "sd 820a",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "835"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "845"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "850"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "855"
      },
      {
        "model": "sda",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "630"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "msm 8909w",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "636"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9206"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9607"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9150"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9650"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9205"
      },
      {
        "model": "sd 8cx",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "snapdragon high med",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "2016"
      },
      {
        "model": "sxr",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "1130"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "650/52"
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "404"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "410/12"
      },
      {
        "model": "eudora",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "215"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2275"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9205_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs404_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qualcomm_215_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      }
    ]
  },
  "cve": "CVE-2019-2275",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-2275",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2020-20151",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2019-2275",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-2275",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-2275",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-2275",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-20151",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201909-122",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2275"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "While deserializing any key blob during key operations, buffer overflow could occur exposing partial key information if any key operations are invoked(Depends on CVE-2018-13907) in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an input validation vulnerability.Information may be obtained. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm. \n\r\n\r\nMany Qualcomm products have input validation error vulnerabilities, which can be exploited by attackers to cause buffer overflows or heap overflows",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2275"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-2275",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-122",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2275"
      }
    ]
  },
  "id": "VAR-201911-1430",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:16:46.300000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831",
        "trust": 0.8,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20151)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/211525"
      },
      {
        "title": "Multiple Qualcomm Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97884"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-20",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2275"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://www.qualcomm.com/company/product-security/bulletins"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2275"
      },
      {
        "trust": 1.2,
        "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2275"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2019-09-01"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2275"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2275"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      },
      {
        "date": "2019-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "date": "2019-09-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      },
      {
        "date": "2019-11-06T17:15:13.410000",
        "db": "NVD",
        "id": "CVE-2019-2275"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20151"
      },
      {
        "date": "2019-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      },
      {
        "date": "2020-10-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      },
      {
        "date": "2024-11-21T04:40:35.850000",
        "db": "NVD",
        "id": "CVE-2019-2275"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Snapdragon Vulnerability related to input validation in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011674"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-122"
      }
    ],
    "trust": 0.6
  }
}

var-201911-1177
Vulnerability from variot

Lack of check to ensure crypto engine data passed by user is initialized can result in bus error in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a vulnerability related to the use of uninitialized resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem.

Input validation error vulnerability exists in HLOS in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1177",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sdx24",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs405",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 427",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sda660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 425",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 675",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 429",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "215",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 730",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 665",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 712",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 632",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 205",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 212",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 835",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 845",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdx20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 210",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs405",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "215",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm 8996au",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "605"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "210"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "212"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "205"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "425"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "427"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "430"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "435"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "429"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "450"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "625"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "632"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "665"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "675"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "712"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "710"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "670"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "730"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "820"
      },
      {
        "model": "sd 820a",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "835"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "845"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "850"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "855"
      },
      {
        "model": "sda",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "24"
      },
      {
        "model": "msm 8909w",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "405"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "636"
      },
      {
        "model": "sdx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "20"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9206"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9607"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9150"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9640"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9650"
      },
      {
        "model": "sdm4",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "630"
      },
      {
        "model": "sdm4",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdm4",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "43"
      },
      {
        "model": "eudora",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "215"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2323"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs405_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qualcomm_215_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      }
    ]
  },
  "cve": "CVE-2019-2323",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-2323",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-20161",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-2323",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-2323",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-2323",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-2323",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-20161",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201909-155",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2323"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Lack of check to ensure crypto engine data passed by user is initialized can result in bus error in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a vulnerability related to the use of uninitialized resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nInput validation error vulnerability exists in HLOS in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2323"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-2323",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-155",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2323"
      }
    ]
  },
  "id": "VAR-201911-1177",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:48:11.930000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831",
        "trust": 0.8,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20161)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/211537"
      },
      {
        "title": "Multiple Qualcomm Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97917"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-1187",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2323"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2323"
      },
      {
        "trust": 1.2,
        "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2323"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2019-09-01"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2323"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2323"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      },
      {
        "date": "2019-11-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "date": "2019-09-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      },
      {
        "date": "2019-11-06T17:15:13.690000",
        "db": "NVD",
        "id": "CVE-2019-2323"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20161"
      },
      {
        "date": "2019-11-14T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      },
      {
        "date": "2019-11-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      },
      {
        "date": "2024-11-21T04:40:42.527000",
        "db": "NVD",
        "id": "CVE-2019-2323"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Snapdragon Vulnerabilities related to the use of uninitialized resources in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011670"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-155"
      }
    ],
    "trust": 0.6
  }
}

var-201911-1185
Vulnerability from variot

Possible Integer overflow because of subtracting two integers without checking if the result would overflow or not in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem.

There are input validation error vulnerabilities in Audio in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1185",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sdx24",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs405",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 427",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sda660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 425",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 675",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 429",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9615",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "215",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 730",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 615",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 616",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 665",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 712",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 632",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 415",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 205",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 212",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 835",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 845",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 600",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdx20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 210",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9615",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs405",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm 8996au",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "605"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "210"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "212"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "205"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "425"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "427"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "430"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "435"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "429"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "450"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "615/16"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "415"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "625"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "632"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "665"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "675"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "712"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "710"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "670"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "730"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "820"
      },
      {
        "model": "sd 820a",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "835"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "845"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "850"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "855"
      },
      {
        "model": "sda",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "439"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "630"
      },
      {
        "model": "sdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "660"
      },
      {
        "model": "sdx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "24"
      },
      {
        "model": "msm 8909w",
        "scope": null,
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "405"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "636"
      },
      {
        "model": "sdx",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "20"
      },
      {
        "model": "sd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "600"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9206"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9607"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9150"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9640"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9650"
      },
      {
        "model": "mdm",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "9615"
      },
      {
        "model": "eudora",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "qualcomm",
        "version": "215"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2331"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9615_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs405_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      }
    ]
  },
  "cve": "CVE-2019-2331",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-2331",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2020-20154",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-2331",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-2331",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-2331",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-2331",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-20154",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201909-127",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2331"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Possible Integer overflow because of subtracting two integers without checking if the result would overflow or not in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nThere are input validation error vulnerabilities in Audio in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-2331"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-2331",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-127",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2331"
      }
    ]
  },
  "id": "VAR-201911-1185",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      }
    ]
  },
  "last_update_date": "2024-11-23T23:01:34.897000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831",
        "trust": 0.8,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20154)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/211533"
      },
      {
        "title": "Multiple Qualcomm Product input verification error vulnerability fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97889"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-190",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2331"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://source.android.com/security/bulletin/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2331"
      },
      {
        "trust": 1.2,
        "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2331"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2019-09-01"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2331"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-2331"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      },
      {
        "date": "2019-11-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "date": "2019-09-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      },
      {
        "date": "2019-11-06T17:15:13.877000",
        "db": "NVD",
        "id": "CVE-2019-2331"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-03-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-20154"
      },
      {
        "date": "2019-11-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      },
      {
        "date": "2019-11-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      },
      {
        "date": "2024-11-21T04:40:43.777000",
        "db": "NVD",
        "id": "CVE-2019-2331"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Snapdragon Product integer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-011587"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201909-127"
      }
    ],
    "trust": 0.6
  }
}