Vulnerabilites related to qualcomm - eudora
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460E6D-6093-44C3-91C7-BD75B3AE4351", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the \"Attachment Converted\" MIME header, which sends the file when the email is forwarded to the attacker by the user." } ], "id": "CVE-2001-0677", "lastModified": "2024-11-20T23:35:53.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-09-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.osvdb.org/3085" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/177369" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/2616" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/3085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/177369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/2616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/archive/1/187128 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/2796 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/187128 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/2796 | Exploit, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora 5.1 allows remote attackers to execute arbitrary code when the \"Use Microsoft Viewer\" option is enabled and the \"allow executables in HTML content\" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments." } ], "id": "CVE-2001-1326", "lastModified": "2024-11-20T23:37:25.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-05-29T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/187128" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/187128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2796" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.0j:*:*:*:*:*:*:*", "matchCriteriaId": "AB3BE848-D923-41C1-9E33-014C59770F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string." } ], "id": "CVE-2002-0833", "lastModified": "2024-11-20T23:39:58.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-08-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/9765.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/9765.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5397" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Eudora 5.2.1 permite que atacantes remotos causen una denegaci\u00f3n de servicio (ca\u00edda y reinicio fallido) y que posiblemente ejecuten c\u00f3digo arbitrario mediante un argumento Attachment Converted con un elevado n\u00famero de caracteres \".\" (punto)." } ], "id": "CVE-2003-0376", "lastModified": "2024-11-20T23:44:35.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-06-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8953ECC-B326-4E41-A4CE-E5F1F8D905EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD34A80-171B-4892-A427-633BB8F2085E", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8EEF7CAC-0603-436B-B2AD-448AA17D82F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "04FEF66B-AED6-41A2-903B-65072980039D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing \".\" (dot)." } ], "id": "CVE-2002-2351", "lastModified": "2024-11-20T23:43:28.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html" }, { "source": "cve@mitre.org", "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/5432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/5432" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "053DE7D1-DDB1-4A1E-9748-18FBB31B6ADD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply. NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en Eudora 7.1 permite a servidores remotos SMTP con la intervenci\u00f3n del usuario, ejcutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de respuesta SMTP largas. NOTA: el usuario deber\u00eda hacer click a trav\u00e9s de un aviso sobre un posible desbordamiento de b\u00fafer para disparar este asunto.\r\n" } ], "id": "CVE-2007-2770", "lastModified": "2024-11-21T00:31:37.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-05-21T21:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36198" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25282" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/3934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/3934" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:6.2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "4B5FF797-B1E7-49AA-84AA-CB8A2EEE1A06", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed \"Converted\" headers." } ], "id": "CVE-2004-1521", "lastModified": "2024-11-20T23:51:05.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD34A80-171B-4892-A427-633BB8F2085E", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8EEF7CAC-0603-436B-B2AD-448AA17D82F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F01DA3EF-92F6-470E-AE4D-4CDD2776B445", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A72C4B66-AFEC-4035-BD72-A1133E6CCD4F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name." } ], "id": "CVE-2004-2005", "lastModified": "2024-11-20T23:52:16.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2004-05-06T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11568" }, { "source": "cve@mitre.org", "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10298" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora mail client includes the absolute path of the sender\u0027s host within a virtual card (VCF)." } ], "id": "CVE-2000-0874", "lastModified": "2024-11-20T23:33:28.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-11-14T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.osvdb.org/1545" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/80888" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1653" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/1545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/80888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
qualcomm | eudora | 4.2 | |
qualcomm | eudora | 4.3 | |
qualcomm | eudora_light | 3.0 | |
qualcomm | eudora_pro | 1.00 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7ACF3406-FA48-412E-A245-2FF225C74893", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "31CC9842-AAC0-47B7-B9D5-2411ADBFEB39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names." } ], "id": "CVE-1999-0427", "lastModified": "2024-11-20T23:28:42.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-05-01T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames." } ], "id": "CVE-2002-0456", "lastModified": "2024-11-20T23:39:08.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-08-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8487.php" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/262704" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8487.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/262704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4306" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | frontpage | * | |
microsoft | internet_explorer | 5.0 | |
microsoft | outlook_express | 5.0 | |
qualcomm | eudora | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:frontpage:*:*:express:*:*:*:*:*", "matchCriteriaId": "39EC4E10-AE31-4F20-B04E-35A14F326EB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6B8985B-B927-4928-B1DB-18E29F796992", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F71D6D7-6CB2-4BE9-839A-A5714144029C", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E9BCC03-1C5A-4674-BE84-235B9225C074", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell." } ], "id": "CVE-1999-1016", "lastModified": "2024-11-20T23:30:04.803", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-08-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/606" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F01DA3EF-92F6-470E-AE4D-4CDD2776B445", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A72C4B66-AFEC-4035-BD72-A1133E6CCD4F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message." } ], "id": "CVE-2004-1944", "lastModified": "2024-11-20T23:52:07.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-04-14T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/11360" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10137" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/11360" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:7.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F3D3B2E2-0D3E-4DAA-9EA5-9F73907B6A57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Qualcomm Eudora 7.1.0.9 permite a atacantes con la intervenci\u00f3n de usuarios en servidores remotos IMAP ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de respuestas largas FLAGS en un comando SELECT INBOX." } ], "id": "CVE-2007-3166", "lastModified": "2024-11-21T00:32:33.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-06-11T22:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36197" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24251" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/4014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/4014" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:*:*:*:*:*:*:*:*", "matchCriteriaId": "B81272A3-87BE-4053-A580-8F318B3A9EA2", "versionEndIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460E6D-6093-44C3-91C7-BD75B3AE4351", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the \u0027Use Microsoft Viewer\u0027 and \u0027allow executables in HTML content\u0027 options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags." } ], "id": "CVE-2001-0365", "lastModified": "2024-11-20T23:35:12.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-06-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2490" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/2490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8953ECC-B326-4E41-A4CE-E5F1F8D905EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context." }, { "lang": "es", "value": "Qualcomm Eudora 5.1.1, 5.2, y posiblemente otras versiones almacenan adjuntos de correo electr\u00f3nico en una localizaci\u00f3n predecible, lo que permite a atacantes remotos leer ficheros arbitrarios mediante un enlace que carga un adjunto con script malicioso en un marco, el cual ejecuta el script en el contexto del navegador local." } ], "id": "CVE-2002-1210", "lastModified": "2024-11-20T23:40:49.530", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-11-29T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/advisory/11.19.02b.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/advisory/11.19.02b.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer." } ], "id": "CVE-2002-1770", "lastModified": "2024-11-20T23:42:05.147", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://security.greymagic.com/adv/gm002-ie/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/4343" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://security.greymagic.com/adv/gm002-ie/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/4343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora email client 5.1.1, with \"use Microsoft viewer\" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer." } ], "id": "CVE-2002-2313", "lastModified": "2024-11-20T23:43:23.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 8.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/9654.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/9654.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
qualcomm | eudora | * | |
qualcomm | eudora_light | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB4BC854-4F0F-49E2-9835-CC60917B0F95", "versionEndIncluding": "3.05", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora_light:*:*:*:*:*:*:*:*", "matchCriteriaId": "89CC80BD-750C-4EB7-8FA5-669C0A3DF5F6", "versionEndIncluding": "3.05", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user\u0027s mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault." } ], "id": "CVE-1999-1448", "lastModified": "2024-11-20T23:31:08.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-07-29T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 | Not Applicable, Vendor Advisory | |
cve@mitre.org | http://www.peacefire.org/security/stealthattach/explanation.html | Exploit | |
cve@mitre.org | http://www.securityfocus.com/bid/1157 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 | Not Applicable, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.peacefire.org/security/stealthattach/explanation.html | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/1157 | Broken Link, Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "812A1AE1-56DE-4AA7-9AE8-FE36089189F5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka \"Stealth Attachment.\"" } ], "id": "CVE-2000-0342", "lastModified": "2024-11-20T23:32:17.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2000-04-28T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.peacefire.org/security/stealthattach/explanation.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/1157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.peacefire.org/security/stealthattach/explanation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/1157" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors." }, { "lang": "es", "value": "El cliente IMAP para Eudora 5.2.1 permite que servidores IMAP da\u00f1inos provoquen una denegaci\u00f3n de servicio y posiblemente ejecuten c\u00f3digo arbitrario mediante ciertos valores literales muy grandes que provocan errores de desbordamiento de enteros." } ], "id": "CVE-2003-0302", "lastModified": "2024-11-20T23:44:25.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-06-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
microsoft | outlook_express | 6.00.2800.1106 | |
mozilla | mozilla | 1.3 | |
mozilla | mozilla | 1.4 | |
mutt | mutt | 1.4.1 | |
qualcomm | eudora | 5.2.1 | |
stuart_parmenter | balsa | 2.0.10 | |
sylpheed | sylpheed_email_client | 0.8.11 | |
university_of_washington | pine | 4.53 | |
ximian | evolution | 1.2.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:outlook_express:6.00.2800.1106:*:*:*:*:*:*:*", "matchCriteriaId": "7B6C3153-39B0-4C14-B414-01BE10D8742E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C656A621-BE62-4BB8-9B25-A3916E60FA12", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "82A6419D-0E94-4D80-8B07-E5AB4DBA2F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:mutt:mutt:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "65DB0D49-CD49-4EF6-9013-1B03E0D644D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:stuart_parmenter:balsa:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "1A86E91A-CAEA-4580-913C-DF610DEABF27", "vulnerable": true }, { "criteria": "cpe:2.3:a:sylpheed:sylpheed_email_client:0.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "CED27A6B-FDDB-4729-8E98-86C062357E68", "vulnerable": true }, { "criteria": "cpe:2.3:a:university_of_washington:pine:4.53:*:*:*:*:*:*:*", "matchCriteriaId": "C8E05D27-10F6-43CF-B7E9-73A82DE02953", "vulnerable": true }, { "criteria": "cpe:2.3:a:ximian:evolution:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C9A844BF-30CC-4289-81C4-1161FDEBC345", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors." }, { "lang": "es", "value": "El cliente IMAP para Sylpheed 0.8.11 permite que servidores IMAP remotos da\u00f1inos originen una denegaci\u00f3n de servicio (ca\u00edda) mediante ciertos tama\u00f1os literales muy largos que causan desbordamientos de b\u00fafer de enteros." } ], "id": "CVE-2003-0300", "lastModified": "2024-11-20T23:44:25.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-06-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
qualcomm | eudora | 3.0 | |
qualcomm | eudora | 4.0 | |
qualcomm | eudora | 4.2 | |
qualcomm | eudora | 4.3 | |
qualcomm | eudora | 4.3.1 | |
qualcomm | eudora | 4.3.2 | |
qualcomm | eudora | 5.0.2 | |
qualcomm | eudora | 5.0.2j_r2 | |
qualcomm | eudora | 5.1 | |
qualcomm | eudora | 5.1.1 | |
qualcomm | eudora | 5.1j | |
qualcomm | eudora | 5.1j_r3 | |
qualcomm | eudora | 5.2 | |
qualcomm | eudora | 5.2.0.9 | |
qualcomm | eudora | 5.2.1 | |
qualcomm | eudora | 6.0 | |
qualcomm | eudora | 6.0.1 | |
qualcomm | eudora | 6.0.3 | |
qualcomm | eudora | 6.0.22 | |
qualcomm | eudora | 6.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "36428240-F799-43AC-9B1D-6B1E1F408E6E", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "812A1AE1-56DE-4AA7-9AE8-FE36089189F5", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2DA75D9-846D-4B0D-9982-DD852CEBECB5", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC95E6A2-8EDB-459B-9051-8372C3A7AEEB", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "80460E6D-6093-44C3-91C7-BD75B3AE4351", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.0.2j_r2:*:*:*:*:*:*:*", "matchCriteriaId": "8AEC74EC-3A6E-45F3-A2DD-1815638B4692", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E129DE88-C286-41CC-B82F-C80718E19701", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "32956E1B-E52C-4290-ABDA-B345CD0F682B", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1j:*:*:*:*:*:*:*", "matchCriteriaId": "B0903FE4-73CB-44D9-AC2C-DCE444ADB06C", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.1j_r3:*:*:*:*:*:*:*", "matchCriteriaId": "A34F7255-50CD-4C6F-8F4F-C0C267DD6646", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A8953ECC-B326-4E41-A4CE-E5F1F8D905EE", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "850E6ED5-4EBE-431A-BF7F-CF2F7B7DD440", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD34A80-171B-4892-A427-633BB8F2085E", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8EEF7CAC-0603-436B-B2AD-448AA17D82F5", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F01DA3EF-92F6-470E-AE4D-4CDD2776B445", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "C818A9AE-446B-496C-A47B-E201B075F310", "vulnerable": false }, { "criteria": "cpe:2.3:a:qualcomm:eudora:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A72C4B66-AFEC-4035-BD72-A1133E6CCD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long \"To:\" field, possibly due to a buffer overflow." } ], "id": "CVE-2004-2301", "lastModified": "2024-11-20T23:53:00.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/10398" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/10398" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:eudora:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64909E5-6E9A-4873-B23C-C825B5CDBAAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed \"Attachment Converted:\" string, which is not properly handled by Eudora." } ], "id": "CVE-2003-0336", "lastModified": "2024-11-20T23:44:30.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-05-22T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2000-0874
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/80888 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/1653 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5206 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/1545 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:37:30.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20000907 Eudora disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/80888" }, { "name": "1653", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1653" }, { "name": "eudora-path-disclosure(5206)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206" }, { "name": "1545", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/1545" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora mail client includes the absolute path of the sender\u0027s host within a virtual card (VCF)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20000907 Eudora disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/80888" }, { "name": "1653", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1653" }, { "name": "eudora-path-disclosure(5206)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206" }, { "name": "1545", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/1545" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0874", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora mail client includes the absolute path of the sender\u0027s host within a virtual card (VCF)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20000907 Eudora disclosure", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/80888" }, { "name": "1653", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1653" }, { "name": "eudora-path-disclosure(5206)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5206" }, { "name": "1545", "refsource": "OSVDB", "url": "http://www.osvdb.org/1545" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0874", "datePublished": "2001-05-07T04:00:00", "dateReserved": "2000-10-18T00:00:00", "dateUpdated": "2024-08-08T05:37:30.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2351
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/5432 | vdb-entry, x_refsource_BID | |
http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:59:11.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "5432", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5432" }, { "name": "20020807 Eudora attachment spoof", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing \".\" (dot)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-29T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "5432", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5432" }, { "name": "20020807 Eudora attachment spoof", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2351", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora 5.1 allows remote attackers to bypass security warnings and possibly execute arbitrary code via attachments with names containing a trailing \".\" (dot)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "5432", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5432" }, { "name": "20020807 Eudora attachment spoof", "refsource": "BUGTRAQ", "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00142.html" }, { "name": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt", "refsource": "CONFIRM", "url": "http://www.eudora.com/download/eudora/windows/5.2/RelNotes.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2351", "datePublished": "2007-10-29T19:00:00Z", "dateReserved": "2007-10-29T00:00:00Z", "dateUpdated": "2024-09-16T21:08:11.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0365
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=98503741910995&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/2490 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6262 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:14:07.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010318 feeble.you!dora.exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2" }, { "name": "2490", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2490" }, { "name": "eudora-html-execute-code(6262)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the \u0027Use Microsoft Viewer\u0027 and \u0027allow executables in HTML content\u0027 options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010318 feeble.you!dora.exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2" }, { "name": "2490", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2490" }, { "name": "eudora-html-execute-code(6262)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0365", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the \u0027Use Microsoft Viewer\u0027 and \u0027allow executables in HTML content\u0027 options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010318 feeble.you!dora.exploit", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=98503741910995\u0026w=2" }, { "name": "2490", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2490" }, { "name": "eudora-html-execute-code(6262)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6262" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0365", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-05-24T00:00:00", "dateUpdated": "2024-08-08T04:14:07.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2770
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/3934 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34324 | vdb-entry, x_refsource_XF | |
http://osvdb.org/36198 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/25282 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3934", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/3934" }, { "name": "eudora-smtp-server-bo(34324)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324" }, { "name": "36198", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36198" }, { "name": "25282", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25282" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply. NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3934", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/3934" }, { "name": "eudora-smtp-server-bo(34324)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324" }, { "name": "36198", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36198" }, { "name": "25282", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25282" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2770", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Eudora 7.1 allows user-assisted, remote SMTP servers to execute arbitrary code via a long SMTP reply. NOTE: the user must click through a warning about a possible buffer overflow exploit to trigger this issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3934", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/3934" }, { "name": "eudora-smtp-server-bo(34324)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34324" }, { "name": "36198", "refsource": "OSVDB", "url": "http://osvdb.org/36198" }, { "name": "25282", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25282" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2770", "datePublished": "2007-05-21T21:00:00", "dateReserved": "2007-05-21T00:00:00", "dateUpdated": "2024-08-07T13:49:57.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0300
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=105294024124163&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:50:47.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030514 Buffer overflows in multiple IMAP clients", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030514 Buffer overflows in multiple IMAP clients", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0300", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030514 Buffer overflows in multiple IMAP clients", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0300", "datePublished": "2003-05-15T04:00:00", "dateReserved": "2003-05-14T00:00:00", "dateUpdated": "2024-08-08T01:50:47.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0427
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:41:44.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T07:32:47", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0427", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0427", "datePublished": "2000-02-04T05:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:41:44.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0302
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=105294024124163&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:50:47.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030514 Buffer overflows in multiple IMAP clients", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030514 Buffer overflows in multiple IMAP clients", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IMAP Client for Eudora 5.2.1 allows remote malicious IMAP servers to cause a denial of service and possibly execute arbitrary code via certain large literal size values that cause either integer signedness errors or integer overflow errors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030514 Buffer overflows in multiple IMAP clients", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=105294024124163\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0302", "datePublished": "2003-05-15T04:00:00", "dateReserved": "2003-05-14T00:00:00", "dateUpdated": "2024-08-08T01:50:47.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1016
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=ntbugtraq&m=93578772920970&w=2 | mailing-list, x_refsource_NTBUGTRAQ | |
http://www.securityfocus.com/bid/606 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:55:29.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19990827 HTML code to crash IE5 and Outlook Express 5", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2" }, { "name": "606", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/606" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-08-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19990827 HTML code to crash IE5 and Outlook Express 5", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ" ], "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2" }, { "name": "606", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/606" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19990827 HTML code to crash IE5 and Outlook Express 5", "refsource": "NTBUGTRAQ", "url": "http://marc.info/?l=ntbugtraq\u0026m=93578772920970\u0026w=2" }, { "name": "606", "refsource": "BID", "url": "http://www.securityfocus.com/bid/606" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1016", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T16:55:29.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3166
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/4014 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34625 | vdb-entry, x_refsource_XF | |
http://osvdb.org/36197 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/24251 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:05:29.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4014", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/4014" }, { "name": "eudora-imap-command-execution(34625)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625" }, { "name": "36197", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36197" }, { "name": "24251", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24251" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4014", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/4014" }, { "name": "eudora-imap-command-execution(34625)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625" }, { "name": "36197", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36197" }, { "name": "24251", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24251" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3166", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Qualcomm Eudora 7.1.0.9 allows user-assisted, remote IMAP servers to execute arbitrary code via a long FLAGS response to a SELECT INBOX command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4014", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/4014" }, { "name": "eudora-imap-command-execution(34625)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34625" }, { "name": "36197", "refsource": "OSVDB", "url": "http://osvdb.org/36197" }, { "name": "24251", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24251" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3166", "datePublished": "2007-06-11T22:00:00", "dateReserved": "2007-06-11T00:00:00", "dateUpdated": "2024-08-07T14:05:29.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-1326
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/187128 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/2796 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:51:08.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010528 feeble.hey!dora.exploit part.II", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/187128" }, { "name": "2796", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2796" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora 5.1 allows remote attackers to execute arbitrary code when the \"Use Microsoft Viewer\" option is enabled and the \"allow executables in HTML content\" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-05-09T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010528 feeble.hey!dora.exploit part.II", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/187128" }, { "name": "2796", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2796" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora 5.1 allows remote attackers to execute arbitrary code when the \"Use Microsoft Viewer\" option is enabled and the \"allow executables in HTML content\" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010528 feeble.hey!dora.exploit part.II", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/187128" }, { "name": "2796", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2796" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1326", "datePublished": "2002-05-03T04:00:00", "dateReserved": "2002-05-01T00:00:00", "dateUpdated": "2024-08-08T04:51:08.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0456
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/262704 | mailing-list, x_refsource_BUGTRAQ | |
http://www.iss.net/security_center/static/8487.php | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=101622857703677&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/4306 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:49:28.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020316 MSIE vulnerability exploitable with Eudora (was: IncrediMail)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/262704" }, { "name": "eudora-insecure-attachment-directory(8487)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8487.php" }, { "name": "20020315 RE: MSIE vulnerability exploitable with IncrediMail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2" }, { "name": "4306", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4306" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020316 MSIE vulnerability exploitable with Eudora (was: IncrediMail)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/262704" }, { "name": "eudora-insecure-attachment-directory(8487)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8487.php" }, { "name": "20020315 RE: MSIE vulnerability exploitable with IncrediMail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2" }, { "name": "4306", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4306" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020316 MSIE vulnerability exploitable with Eudora (was: IncrediMail)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/262704" }, { "name": "eudora-insecure-attachment-directory(8487)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8487.php" }, { "name": "20020315 RE: MSIE vulnerability exploitable with IncrediMail", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101622857703677\u0026w=2" }, { "name": "4306", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4306" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0456", "datePublished": "2002-06-11T04:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:49:28.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0342
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.peacefire.org/security/stealthattach/explanation.html | x_refsource_MISC | |
http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/1157 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:21.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.peacefire.org/security/stealthattach/explanation.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077" }, { "name": "1157", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1157" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka \"Stealth Attachment.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.peacefire.org/security/stealthattach/explanation.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077" }, { "name": "1157", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1157" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka \"Stealth Attachment.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.peacefire.org/security/stealthattach/explanation.html", "refsource": "MISC", "url": "http://www.peacefire.org/security/stealthattach/explanation.html" }, { "name": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077", "refsource": "CONFIRM", "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077" }, { "name": "1157", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1157" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0342", "datePublished": "2000-07-12T04:00:00", "dateReserved": "2000-05-11T00:00:00", "dateUpdated": "2024-08-08T05:14:21.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0833
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=102858453720304&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/5397 | vdb-entry, x_refsource_BID | |
http://www.iss.net/security_center/static/9765.php | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=102883538924494&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:03:48.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020805 [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2" }, { "name": "5397", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5397" }, { "name": "eudora-boundary-bo(9765)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9765.php" }, { "name": "20020808 [SNS Advisory No.55 rev.2] Eudora 5.x for Windows Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020805 [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2" }, { "name": "5397", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5397" }, { "name": "eudora-boundary-bo(9765)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9765.php" }, { "name": "20020808 [SNS Advisory No.55 rev.2] Eudora 5.x for Windows Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0833", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Eudora 5.1.1 and 5.0-J for Windows, and possibly other versions, allows remote attackers to execute arbitrary code via a multi-part message with a long boundary string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020805 [SNS Advisory No.55] Eudora 5.x for Windows Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=102858453720304\u0026w=2" }, { "name": "5397", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5397" }, { "name": "eudora-boundary-bo(9765)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9765.php" }, { "name": "20020808 [SNS Advisory No.55 rev.2] Eudora 5.x for Windows Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=102883538924494\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0833", "datePublished": "2002-08-07T04:00:00", "dateReserved": "2002-08-06T00:00:00", "dateUpdated": "2024-08-08T03:03:48.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1210
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.idefense.com/advisory/11.19.02b.txt | x_refsource_MISC | |
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html | mailing-list, x_refsource_VULNWATCH |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.idefense.com/advisory/11.19.02b.txt" }, { "name": "20021119 iDEFENSE Security Advisory 11.19.02b: Eudora Script Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-11-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-18T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.idefense.com/advisory/11.19.02b.txt" }, { "name": "20021119 iDEFENSE Security Advisory 11.19.02b: Eudora Script Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1210", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Qualcomm Eudora 5.1.1, 5.2, and possibly other versions stores email attachments in a predictable location, which allows remote attackers to read arbitrary files via a link that loads an attachment with malicious script into a frame, which then executes the script in the local browser context." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.idefense.com/advisory/11.19.02b.txt", "refsource": "MISC", "url": "http://www.idefense.com/advisory/11.19.02b.txt" }, { "name": "20021119 iDEFENSE Security Advisory 11.19.02b: Eudora Script Execution Vulnerability", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0079.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1210", "datePublished": "2002-11-21T05:00:00", "dateReserved": "2002-10-14T00:00:00", "dateUpdated": "2024-08-08T03:19:28.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1944
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/10137 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15857 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/11360 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=108241694627321&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:07:49.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "10137", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10137" }, { "name": "eudora-mime-message-dos(15857)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857" }, { "name": "11360", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11360" }, { "name": "20040419 Eudora 6.1 is evil", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2" }, { "name": "20040414 Eudora 6.0.3 nested MIME DoS", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "10137", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10137" }, { "name": "eudora-mime-message-dos(15857)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857" }, { "name": "11360", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11360" }, { "name": "20040419 Eudora 6.1 is evil", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2" }, { "name": "20040414 Eudora 6.0.3 nested MIME DoS", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1944", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora 6.1 and 6.0.3 for Windows allows remote attackers to cause a denial of service (crash) via a deeply nested multipart MIME message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "10137", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10137" }, { "name": "eudora-mime-message-dos(15857)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15857" }, { "name": "11360", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11360" }, { "name": "20040419 Eudora 6.1 is evil", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108241694627321\u0026w=2" }, { "name": "20040414 Eudora 6.0.3 nested MIME DoS", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020075.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1944", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T01:07:49.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2313
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html | mailing-list, x_refsource_FULLDISC | |
http://www.iss.net/security_center/static/9654.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:59:12.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020724 REFRESH: EUDORA MAIL 5.1.1", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html" }, { "name": "eudora-mhtml-execute-files(9654)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9654.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Eudora email client 5.1.1, with \"use Microsoft viewer\" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-26T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020724 REFRESH: EUDORA MAIL 5.1.1", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html" }, { "name": "eudora-mhtml-execute-files(9654)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9654.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2313", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora email client 5.1.1, with \"use Microsoft viewer\" enabled, allows remote attackers to execute arbitrary programs via an HTML email message containing a META refresh tag that references an embedded .mhtml file with ActiveX controls that execute a second embedded program, which is processed by Internet Explorer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020724 REFRESH: EUDORA MAIL 5.1.1", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-July/000644.html" }, { "name": "eudora-mhtml-execute-files(9654)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9654.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2313", "datePublished": "2007-10-26T19:00:00Z", "dateReserved": "2007-10-26T00:00:00Z", "dateUpdated": "2024-09-16T22:56:28.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0376
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=105370625529452&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:50:47.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030523 Eudora 5.2.1 buffer overflow DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030523 Eudora 5.2.1 buffer overflow DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0376", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Eudora 5.2.1 allows remote attackers to cause a denial of service (crash and failed restart) and possibly execute arbitrary code via an Attachment Converted argument with a large number of . (dot) characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030523 Eudora 5.2.1 buffer overflow DoS", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=105370625529452\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0376", "datePublished": "2003-06-06T04:00:00", "dateReserved": "2003-06-04T00:00:00", "dateUpdated": "2024-08-08T01:50:47.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-1770
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/8609 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=ntbugtraq&m=101680201823534&w=2 | mailing-list, x_refsource_NTBUGTRAQ | |
http://marc.info/?l=bugtraq&m=101680576827641&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://security.greymagic.com/adv/gm002-ie/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/4343 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:34:56.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "msviewer-tvideo-execute-attachment(8609)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609" }, { "name": "2002032 Automatically opening IE + Executing attachments", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2" }, { "name": "2002032 Automatically opening IE + Executing attachments", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://security.greymagic.com/adv/gm002-ie/" }, { "name": "4343", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4343" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "msviewer-tvideo-execute-attachment(8609)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609" }, { "name": "2002032 Automatically opening IE + Executing attachments", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ" ], "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2" }, { "name": "2002032 Automatically opening IE + Executing attachments", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://security.greymagic.com/adv/gm002-ie/" }, { "name": "4343", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4343" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1770", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Qualcomm Eudora 5.1 allows remote attackers to execute arbitrary code via an HTML e-mail message that uses a file:// URL in a t:video tag to reference an attached Windows Media Player file containing JavaScript code, which is launched and executed in the My Computer zone by Internet Explorer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "msviewer-tvideo-execute-attachment(8609)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609" }, { "name": "2002032 Automatically opening IE + Executing attachments", "refsource": "NTBUGTRAQ", "url": "http://marc.info/?l=ntbugtraq\u0026m=101680201823534\u0026w=2" }, { "name": "2002032 Automatically opening IE + Executing attachments", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101680576827641\u0026w=2" }, { "name": "http://security.greymagic.com/adv/gm002-ie/", "refsource": "MISC", "url": "http://security.greymagic.com/adv/gm002-ie/" }, { "name": "4343", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4343" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1770", "datePublished": "2005-06-21T04:00:00", "dateReserved": "2005-06-21T00:00:00", "dateUpdated": "2024-08-08T03:34:56.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1521
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=ntbugtraq&m=110053102601655&w=2 | mailing-list, x_refsource_NTBUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18064 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=110037078519691&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.nl/0411-exploits/eudora62014.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:24.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20041113 Eudora 6.2 attachment spoof", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2" }, { "name": "eudora-base64-attach-spoof-variant(18064)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064" }, { "name": "20041113 Eudora 6.2 attachment spoof", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed \"Converted\" headers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20041113 Eudora 6.2 attachment spoof", "tags": [ "mailing-list", "x_refsource_NTBUGTRAQ" ], "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2" }, { "name": "eudora-base64-attach-spoof-variant(18064)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064" }, { "name": "20041113 Eudora 6.2 attachment spoof", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1521", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora 6.2.0.14 does not issue a warning when a user forwards an e-mail message that contains base64 or quoted-printable encoded attachments, which makes it easier for remote attackers to read arbitrary files via spoofed \"Converted\" headers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20041113 Eudora 6.2 attachment spoof", "refsource": "NTBUGTRAQ", "url": "http://marc.info/?l=ntbugtraq\u0026m=110053102601655\u0026w=2" }, { "name": "eudora-base64-attach-spoof-variant(18064)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18064" }, { "name": "20041113 Eudora 6.2 attachment spoof", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110037078519691\u0026w=2" }, { "name": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt", "refsource": "MISC", "url": "http://packetstormsecurity.nl/0411-exploits/eudora62014.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1521", "datePublished": "2005-02-19T05:00:00", "dateReserved": "2005-02-18T00:00:00", "dateUpdated": "2024-08-08T00:53:24.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/10298 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=108395487628044&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/11568 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16086 | vdb-entry, x_refsource_XF | |
http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.049Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "name": "10298", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10298" }, { "name": "20040507 Eudora file URL buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2" }, { "name": "11568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11568" }, { "name": "eudora-long-url-bo(16086)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086" }, { "name": "20040507 Eudora file URL buffer overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "name": "10298", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10298" }, { "name": "20040507 Eudora file URL buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2" }, { "name": "11568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11568" }, { "name": "eudora-long-url-bo(16086)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086" }, { "name": "20040507 Eudora file URL buffer overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Eudora for Windows 5.2.1, 6.0.3, and 6.1 allows remote attackers to execute arbitrary code via an e-mail with (1) a link to a long URL to the C drive or (2) a long attachment name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt", "refsource": "CONFIRM", "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "name": "10298", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10298" }, { "name": "20040507 Eudora file URL buffer overflow", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108395487628044\u0026w=2" }, { "name": "11568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11568" }, { "name": "eudora-long-url-bo(16086)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16086" }, { "name": "20040507 Eudora file URL buffer overflow", "refsource": "FULLDISC", "url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021059.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2005", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T01:15:01.049Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0336
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=105362278914731&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:50:47.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030522 Eudora 5.2.1 attachment spoof", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-05-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed \"Attachment Converted:\" string, which is not properly handled by Eudora." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030522 Eudora 5.2.1 attachment spoof", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Qualcomm Eudora 5.2.1 allows remote attackers to read arbitrary files via an email message with a carriage return (CR) character in a spoofed \"Attachment Converted:\" string, which is not properly handled by Eudora." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030522 Eudora 5.2.1 attachment spoof", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=105362278914731\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0336", "datePublished": "2003-05-23T04:00:00", "dateReserved": "2003-05-22T00:00:00", "dateUpdated": "2024-08-08T01:50:47.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2301
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/10398 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16246 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:22:13.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "name": "10398", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10398" }, { "name": "eudora-to-field-dos(16246)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long \"To:\" field, possibly due to a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "name": "10398", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10398" }, { "name": "eudora-to-field-dos(16246)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora before 6.1.1 allows remote attackers to cause a denial of service (crash) via an e-mail with a long \"To:\" field, possibly due to a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt", "refsource": "CONFIRM", "url": "http://www.eudora.com/download/eudora/windows/6.1.1/RelNotes.txt" }, { "name": "10398", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10398" }, { "name": "eudora-to-field-dos(16246)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16246" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2301", "datePublished": "2005-08-05T04:00:00", "dateReserved": "2005-08-05T00:00:00", "dateUpdated": "2024-08-08T01:22:13.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1448
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=90221104526168&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:03.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19980729 Eudora exploit (was Microsoft Security Bulletin (MS98-008))", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1998-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user\u0027s mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19980729 Eudora exploit (was Microsoft Security Bulletin (MS98-008))", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1448", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user\u0027s mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19980729 Eudora exploit (was Microsoft Security Bulletin (MS98-008))", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=90221104526168\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1448", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:03.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0677
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/2616 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6431 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/3085 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/archive/1/177369 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:30:06.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2616", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2616" }, { "name": "eudora-plain-text-attachment(6431)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431" }, { "name": "3085", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3085" }, { "name": "20010418 Eudora file leakage problem (still)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/177369" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-04-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the \"Attachment Converted\" MIME header, which sends the file when the email is forwarded to the attacker by the user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2616", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2616" }, { "name": "eudora-plain-text-attachment(6431)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431" }, { "name": "3085", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3085" }, { "name": "20010418 Eudora file leakage problem (still)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/177369" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eudora 5.0.2 allows a remote attacker to read arbitrary files via an email with the path of the target file in the \"Attachment Converted\" MIME header, which sends the file when the email is forwarded to the attacker by the user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2616", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2616" }, { "name": "eudora-plain-text-attachment(6431)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6431" }, { "name": "3085", "refsource": "OSVDB", "url": "http://www.osvdb.org/3085" }, { "name": "20010418 Eudora file leakage problem (still)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/177369" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0677", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-29T00:00:00", "dateUpdated": "2024-08-08T04:30:06.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201911-1434
Vulnerability from variot
Improper validation of read and write index of tx and rx fifo`s before calculating pointer can lead to out-of-bound access in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem.
Many Qualcomm products have input validation error vulnerabilities, and no detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1434", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sdx24", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 675", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 730", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 712", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm 8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "605" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "210" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "212" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "205" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "425" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "427" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "430" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "435" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "429" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "632" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "675" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "712" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "730" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "820" }, { "model": "sd 820a", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "835" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "850" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "630" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "24" }, { "model": "msm 8909w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "20" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9206" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9607" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9150" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9640" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9650" }, { "model": "eudora", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "215" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20152" }, { "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "db": "NVD", "id": "CVE-2019-2283" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qualcomm_215_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011673" } ] }, "cve": "CVE-2019-2283", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2019-2283", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-20152", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-2283", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-2283", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-2283", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-2283", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-20152", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-120", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2019-2283", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20152" }, { "db": "VULMON", "id": "CVE-2019-2283" }, { "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "db": "CNNVD", "id": "CNNVD-201909-120" }, { "db": "NVD", "id": "CVE-2019-2283" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper validation of read and write index of tx and rx fifo`s before calculating pointer can lead to out-of-bound access in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nMany Qualcomm products have input validation error vulnerabilities, and no detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2019-2283" }, { "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "db": "CNVD", "id": "CNVD-2020-20152" }, { "db": "VULMON", "id": "CVE-2019-2283" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-2283", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-011673", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-20152", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-120", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-2283", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20152" }, { "db": "VULMON", "id": "CVE-2019-2283" }, { "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "db": "CNNVD", "id": "CNNVD-201909-120" }, { "db": "NVD", "id": "CVE-2019-2283" } ] }, "id": "VAR-201911-1434", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20152" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20152" } ] }, "last_update_date": "2024-11-23T22:55:20.582000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831", "trust": 0.8, "url": "https://source.android.com/security/bulletin/" }, { "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20152)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211523" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97882" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20152" }, { "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "db": "CNNVD", "id": "CNNVD-201909-120" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "db": "NVD", "id": "CVE-2019-2283" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://source.android.com/security/bulletin/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2283" }, { "trust": 1.2, "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2283" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20152" }, { "db": "VULMON", "id": "CVE-2019-2283" }, { "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "db": "CNNVD", "id": "CNNVD-201909-120" }, { "db": "NVD", "id": "CVE-2019-2283" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20152" }, { "db": "VULMON", "id": "CVE-2019-2283" }, { "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "db": "CNNVD", "id": "CNNVD-201909-120" }, { "db": "NVD", "id": "CVE-2019-2283" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20152" }, { "date": "2019-11-06T00:00:00", "db": "VULMON", "id": "CVE-2019-2283" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "date": "2019-09-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-120" }, { "date": "2019-11-06T17:15:13.487000", "db": "NVD", "id": "CVE-2019-2283" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20152" }, { "date": "2020-08-24T00:00:00", "db": "VULMON", "id": "CVE-2019-2283" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011673" }, { "date": "2019-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-120" }, { "date": "2024-11-21T04:40:36.840000", "db": "NVD", "id": "CVE-2019-2283" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-120" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Product buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011673" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-120" } ], "trust": 0.6 } }
var-201911-1433
Vulnerability from variot
Improper validation of array index causes OOB write and then leads to memory corruption in MMCP in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9607, etc. are all products of Qualcomm. MDM9607 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem.
MMCP in many Qualcomm products has an input validation error vulnerability. The vulnerability stems from the fact that the network system or product did not correctly verify the input data, and there is currently no detailed vulnerability details provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sd 427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 675", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 730", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 665", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 712", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 8cx", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med 2016", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm 8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "605" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "210" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "212" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "205" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "425" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "427" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "430" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "435" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "429" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "615/16" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "415" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "632" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "665" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "675" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "712" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "730" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "820" }, { "model": "sd 820a", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "835" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "850" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "630" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "msm 8909w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "20" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9607" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9150" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9640" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9650" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9615" }, { "model": "sd 8cx", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "2016" }, { "model": "sxr", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "1130" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9625" }, { "model": "mdm 9635m", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9655" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "650/52" }, { "model": "eudora", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "215" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20150" }, { "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "db": "NVD", "id": "CVE-2019-2258" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9635m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9655_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011676" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "heidada", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-123" } ], "trust": 0.6 }, "cve": "CVE-2019-2258", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2019-2258", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-20150", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-2258", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-2258", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-2258", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-2258", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-20150", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-123", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20150" }, { "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "db": "CNNVD", "id": "CNNVD-201909-123" }, { "db": "NVD", "id": "CVE-2019-2258" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper validation of array index causes OOB write and then leads to memory corruption in MMCP in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9607, etc. are all products of Qualcomm. MDM9607 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nMMCP in many Qualcomm products has an input validation error vulnerability. The vulnerability stems from the fact that the network system or product did not correctly verify the input data, and there is currently no detailed vulnerability details provided", "sources": [ { "db": "NVD", "id": "CVE-2019-2258" }, { "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "db": "CNVD", "id": "CNVD-2020-20150" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-2258", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-011676", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-20150", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-123", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20150" }, { "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "db": "CNNVD", "id": "CNNVD-201909-123" }, { "db": "NVD", "id": "CVE-2019-2258" } ] }, "id": "VAR-201911-1433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20150" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20150" } ] }, "last_update_date": "2024-11-23T22:44:47.136000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831", "trust": 0.8, "url": "https://source.android.com/security/bulletin/" }, { "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20150)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211527" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97885" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20150" }, { "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "db": "CNNVD", "id": "CNNVD-201909-123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.0 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "db": "NVD", "id": "CVE-2019-2258" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://source.android.com/security/bulletin/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2258" }, { "trust": 1.2, "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2258" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20150" }, { "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "db": "CNNVD", "id": "CNNVD-201909-123" }, { "db": "NVD", "id": "CVE-2019-2258" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20150" }, { "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "db": "CNNVD", "id": "CNNVD-201909-123" }, { "db": "NVD", "id": "CVE-2019-2258" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20150" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "date": "2019-09-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-123" }, { "date": "2019-11-06T17:15:13.330000", "db": "NVD", "id": "CVE-2019-2258" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20150" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011676" }, { "date": "2019-11-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-123" }, { "date": "2024-11-21T04:40:33.563000", "db": "NVD", "id": "CVE-2019-2258" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerability related to array index verification in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011676" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-123" } ], "trust": 0.6 } }
var-201911-1425
Vulnerability from variot
Kernel can do a memory read from arbitrary address passed by user during execution of a syscall in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9205, MDM9650, QCA8081, QCS605, SD 427, SD 435, SD 450, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9650 is a central processing unit (CPU) product of Qualcomm.
The Kernel in many Qualcomm products has an input validation error vulnerability. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1425", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sd 8cx", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 675", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med 2016", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 730", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq8074", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca8081", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 665", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 712", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq8074", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qca8081", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9650" }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "605" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "427" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "435" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "665" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "675" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "712" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "730" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "835" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "850" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "630" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "20" }, { "model": "sd 8cx", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "2016" }, { "model": "sxr", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "1130" }, { "model": "ipq", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8074" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9205" }, { "model": "qca", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8081" }, { "model": "eudora", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "215" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20149" }, { "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "db": "NVD", "id": "CVE-2019-2249" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:ipq8074_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca8081_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_636_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011677" } ] }, "cve": "CVE-2019-2249", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2019-2249", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-20149", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-2249", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-2249", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-2249", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-2249", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-20149", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-124", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20149" }, { "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "db": "CNNVD", "id": "CNNVD-201909-124" }, { "db": "NVD", "id": "CVE-2019-2249" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kernel can do a memory read from arbitrary address passed by user during execution of a syscall in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9205, MDM9650, QCA8081, QCS605, SD 427, SD 435, SD 450, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9650 is a central processing unit (CPU) product of Qualcomm. \n\r\n\r\nThe Kernel in many Qualcomm products has an input validation error vulnerability. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2019-2249" }, { "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "db": "CNVD", "id": "CNVD-2020-20149" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-2249", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-011677", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-20149", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-124", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20149" }, { "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "db": "CNNVD", "id": "CNNVD-201909-124" }, { "db": "NVD", "id": "CVE-2019-2249" } ] }, "id": "VAR-201911-1425", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20149" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20149" } ] }, "last_update_date": "2024-11-23T22:21:24.025000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831", "trust": 0.8, "url": "https://source.android.com/security/bulletin/" }, { "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20149)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211529" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97886" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20149" }, { "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "db": "CNNVD", "id": "CNNVD-201909-124" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "db": "NVD", "id": "CVE-2019-2249" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://source.android.com/security/bulletin/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2249" }, { "trust": 1.2, "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2249" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20149" }, { "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "db": "CNNVD", "id": "CNNVD-201909-124" }, { "db": "NVD", "id": "CVE-2019-2249" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20149" }, { "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "db": "CNNVD", "id": "CNNVD-201909-124" }, { "db": "NVD", "id": "CVE-2019-2249" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20149" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "date": "2019-09-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-124" }, { "date": "2019-11-06T17:15:13.267000", "db": "NVD", "id": "CVE-2019-2249" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20149" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011677" }, { "date": "2019-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-124" }, { "date": "2024-11-21T04:40:32.140000", "db": "NVD", "id": "CVE-2019-2249" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-124" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Product out-of-bounds vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011677" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-124" } ], "trust": 0.6 } }
var-201911-1430
Vulnerability from variot
While deserializing any key blob during key operations, buffer overflow could occur exposing partial key information if any key operations are invoked(Depends on CVE-2018-13907) in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an input validation vulnerability.Information may be obtained. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm.
Many Qualcomm products have input validation error vulnerabilities, which can be exploited by attackers to cause buffer overflows or heap overflows
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1430", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sd 427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs404", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 712", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 8cx", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 410", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med 2016", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 412", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs404", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm 8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "605" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "210" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "212" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "205" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "425" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "427" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "430" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "435" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "429" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "632" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "712" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "820" }, { "model": "sd 820a", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "835" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "850" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "630" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "msm 8909w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9206" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9607" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9150" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9650" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9205" }, { "model": "sd 8cx", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "2016" }, { "model": "sxr", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "1130" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "650/52" }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "404" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "410/12" }, { "model": "eudora", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "215" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs404_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qualcomm_215_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011674" } ] }, "cve": "CVE-2019-2275", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-2275", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2020-20151", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-2275", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-2275", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-2275", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-2275", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-20151", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201909-122", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "While deserializing any key blob during key operations, buffer overflow could occur exposing partial key information if any key operations are invoked(Depends on CVE-2018-13907) in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an input validation vulnerability.Information may be obtained. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm. \n\r\n\r\nMany Qualcomm products have input validation error vulnerabilities, which can be exploited by attackers to cause buffer overflows or heap overflows", "sources": [ { "db": "NVD", "id": "CVE-2019-2275" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNVD", "id": "CNVD-2020-20151" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-2275", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-011674", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-20151", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-122", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "id": "VAR-201911-1430", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" } ] }, "last_update_date": "2024-11-23T22:16:46.300000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831", "trust": 0.8, "url": "https://source.android.com/security/bulletin/" }, { "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20151)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211525" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97884" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2275" }, { "trust": 1.2, "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2275" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20151" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "date": "2019-09-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-122" }, { "date": "2019-11-06T17:15:13.410000", "db": "NVD", "id": "CVE-2019-2275" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20151" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "date": "2020-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-122" }, { "date": "2024-11-21T04:40:35.850000", "db": "NVD", "id": "CVE-2019-2275" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011674" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-122" } ], "trust": 0.6 } }
var-201911-1177
Vulnerability from variot
Lack of check to ensure crypto engine data passed by user is initialized can result in bus error in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a vulnerability related to the use of uninitialized resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem.
Input validation error vulnerability exists in HLOS in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1177", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sdx24", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs405", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 675", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 730", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 665", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 712", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs405", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm 8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "605" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "210" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "212" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "205" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "425" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "427" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "430" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "435" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "429" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "632" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "665" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "675" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "712" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "730" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "820" }, { "model": "sd 820a", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "835" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "850" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "24" }, { "model": "msm 8909w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "405" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "20" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9206" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9607" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9150" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9640" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9650" }, { "model": "sdm4", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "630" }, { "model": "sdm4", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdm4", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "43" }, { "model": "eudora", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "215" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20161" }, { "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "db": "NVD", "id": "CVE-2019-2323" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs405_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qualcomm_215_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011670" } ] }, "cve": "CVE-2019-2323", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2019-2323", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-20161", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-2323", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-2323", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-2323", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-2323", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-20161", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-155", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20161" }, { "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "db": "CNNVD", "id": "CNNVD-201909-155" }, { "db": "NVD", "id": "CVE-2019-2323" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Lack of check to ensure crypto engine data passed by user is initialized can result in bus error in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains a vulnerability related to the use of uninitialized resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nInput validation error vulnerability exists in HLOS in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2019-2323" }, { "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "db": "CNVD", "id": "CNVD-2020-20161" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-2323", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-011670", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-20161", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-155", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20161" }, { "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "db": "CNNVD", "id": "CNNVD-201909-155" }, { "db": "NVD", "id": "CVE-2019-2323" } ] }, "id": "VAR-201911-1177", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20161" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20161" } ] }, "last_update_date": "2024-11-23T22:48:11.930000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831", "trust": 0.8, "url": "https://source.android.com/security/bulletin/" }, { "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20161)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211537" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97917" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20161" }, { "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "db": "CNNVD", "id": "CNNVD-201909-155" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1187", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "db": "NVD", "id": "CVE-2019-2323" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://source.android.com/security/bulletin/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2323" }, { "trust": 1.2, "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2323" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20161" }, { "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "db": "CNNVD", "id": "CNNVD-201909-155" }, { "db": "NVD", "id": "CVE-2019-2323" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20161" }, { "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "db": "CNNVD", "id": "CNNVD-201909-155" }, { "db": "NVD", "id": "CVE-2019-2323" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20161" }, { "date": "2019-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "date": "2019-09-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-155" }, { "date": "2019-11-06T17:15:13.690000", "db": "NVD", "id": "CVE-2019-2323" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20161" }, { "date": "2019-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011670" }, { "date": "2019-11-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-155" }, { "date": "2024-11-21T04:40:42.527000", "db": "NVD", "id": "CVE-2019-2323" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-155" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerabilities related to the use of uninitialized resources in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011670" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-155" } ], "trust": 0.6 } }
var-201911-1185
Vulnerability from variot
Possible Integer overflow because of subtracting two integers without checking if the result would overflow or not in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem.
There are input validation error vulnerabilities in Audio in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1185", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sdx24", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs405", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 675", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 730", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 665", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 712", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 600", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs405", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm 8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "605" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "210" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "212" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "205" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "425" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "427" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "430" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "435" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "429" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "615/16" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "415" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "632" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "665" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "675" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "712" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "730" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "820" }, { "model": "sd 820a", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "835" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "850" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "630" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "24" }, { "model": "msm 8909w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "405" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "20" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "600" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9206" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9607" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9150" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9640" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9650" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9615" }, { "model": "eudora", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "215" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20154" }, { "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "db": "NVD", "id": "CVE-2019-2331" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs405_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011587" } ] }, "cve": "CVE-2019-2331", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2019-2331", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-20154", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-2331", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-2331", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-2331", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-2331", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-20154", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-127", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20154" }, { "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "db": "CNNVD", "id": "CNNVD-201909-127" }, { "db": "NVD", "id": "CVE-2019-2331" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Possible Integer overflow because of subtracting two integers without checking if the result would overflow or not in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. Qualcomm MDM9150 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nThere are input validation error vulnerabilities in Audio in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2019-2331" }, { "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "db": "CNVD", "id": "CNVD-2020-20154" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-2331", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-011587", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-20154", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-127", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20154" }, { "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "db": "CNNVD", "id": "CNNVD-201909-127" }, { "db": "NVD", "id": "CVE-2019-2331" } ] }, "id": "VAR-201911-1185", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20154" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20154" } ] }, "last_update_date": "2024-11-23T23:01:34.897000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831", "trust": 0.8, "url": "https://source.android.com/security/bulletin/" }, { "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20154)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211533" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97889" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20154" }, { "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "db": "CNNVD", "id": "CNNVD-201909-127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "db": "NVD", "id": "CVE-2019-2331" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://source.android.com/security/bulletin/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2331" }, { "trust": 1.2, "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2331" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20154" }, { "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "db": "CNNVD", "id": "CNNVD-201909-127" }, { "db": "NVD", "id": "CVE-2019-2331" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20154" }, { "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "db": "CNNVD", "id": "CNNVD-201909-127" }, { "db": "NVD", "id": "CVE-2019-2331" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20154" }, { "date": "2019-11-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "date": "2019-09-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-127" }, { "date": "2019-11-06T17:15:13.877000", "db": "NVD", "id": "CVE-2019-2331" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20154" }, { "date": "2019-11-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011587" }, { "date": "2019-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-127" }, { "date": "2024-11-21T04:40:43.777000", "db": "NVD", "id": "CVE-2019-2331" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Product integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-127" } ], "trust": 0.6 } }