var-201907-0883
Vulnerability from variot
Buffer over-read can occur while parsing an ogg file with a corrupted comment block. in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20. plural Snapdragon The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX20 is a modem.
Input validation error vulnerabilities exist in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. There is currently no detailed vulnerability details provided. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-129766496, A-129766125, A-122473271, A-122474808, A-122472479, A-122473168, A-122473304, A-122473496, A-122473989, A-129766432, A-129766099 and A-129766299
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0883", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "qcs405", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 675", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 730", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 665", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 712", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 600", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs405", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs605 no", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "425" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "427" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "430" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "435" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "712" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "850" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sdm630 no", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660 no", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8909w no", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs405 no", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "675" }, { "model": "sd no", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "730" }, { "model": "sdx24 no", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20158" }, { "db": "BID", "id": "108986" }, { "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "db": "NVD", "id": "CVE-2019-2253" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs405_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qualcomm_215_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006965" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "108986" }, { "db": "CNNVD", "id": "CNNVD-201907-079" } ], "trust": 0.9 }, "cve": "CVE-2019-2253", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-2253", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-20158", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-153688", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-2253", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-2253", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-2253", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-20158", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201907-079", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-153688", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-2253", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20158" }, { "db": "VULHUB", "id": "VHN-153688" }, { "db": "VULMON", "id": "CVE-2019-2253" }, { "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "db": "CNNVD", "id": "CNNVD-201907-079" }, { "db": "NVD", "id": "CVE-2019-2253" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer over-read can occur while parsing an ogg file with a corrupted comment block. in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20. plural Snapdragon The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nInput validation error vulnerabilities exist in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. There is currently no detailed vulnerability details provided. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-129766496, A-129766125, A-122473271, A-122474808, A-122472479, A-122473168, A-122473304, A-122473496, A-122473989, A-129766432, A-129766099 and A-129766299", "sources": [ { "db": "NVD", "id": "CVE-2019-2253" }, { "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "db": "CNVD", "id": "CNVD-2020-20158" }, { "db": "BID", "id": "108986" }, { "db": "VULHUB", "id": "VHN-153688" }, { "db": "VULMON", "id": "CVE-2019-2253" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-2253", "trust": 3.5 }, { "db": "BID", "id": "108986", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2019-006965", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-20158", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201907-079", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-153688", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-2253", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20158" }, { "db": "VULHUB", "id": "VHN-153688" }, { "db": "VULMON", "id": "CVE-2019-2253" }, { "db": "BID", "id": "108986" }, { "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "db": "CNNVD", "id": "CNNVD-201907-079" }, { "db": "NVD", "id": "CVE-2019-2253" } ] }, "id": "VAR-201907-0883", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20158" }, { "db": "VULHUB", "id": "VHN-153688" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20158" } ] }, "last_update_date": "2024-11-23T21:37:05.814000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "July 2019 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20158)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211555" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94313" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20158" }, { "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "db": "CNNVD", "id": "CNNVD-201907-079" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-153688" }, { "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "db": "NVD", "id": "CVE-2019-2253" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2253" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/108986" }, { "trust": 0.9, "url": "http://code.google.com/android/" }, { "trust": 0.9, "url": "http://www.qualcomm.com/" }, { "trust": 0.9, "url": "https://source.android.com/security/bulletin/2019-07-01.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2253" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-july-2019-29673" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20158" }, { "db": "VULHUB", "id": "VHN-153688" }, { "db": "VULMON", "id": "CVE-2019-2253" }, { "db": "BID", "id": "108986" }, { "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "db": "CNNVD", "id": "CNNVD-201907-079" }, { "db": "NVD", "id": "CVE-2019-2253" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20158" }, { "db": "VULHUB", "id": "VHN-153688" }, { "db": "VULMON", "id": "CVE-2019-2253" }, { "db": "BID", "id": "108986" }, { "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "db": "CNNVD", "id": "CNNVD-201907-079" }, { "db": "NVD", "id": "CVE-2019-2253" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20158" }, { "date": "2019-07-25T00:00:00", "db": "VULHUB", "id": "VHN-153688" }, { "date": "2019-07-25T00:00:00", "db": "VULMON", "id": "CVE-2019-2253" }, { "date": "2019-07-01T00:00:00", "db": "BID", "id": "108986" }, { "date": "2019-07-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "date": "2019-07-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-079" }, { "date": "2019-07-25T17:15:12.410000", "db": "NVD", "id": "CVE-2019-2253" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20158" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-153688" }, { "date": "2020-08-24T00:00:00", "db": "VULMON", "id": "CVE-2019-2253" }, { "date": "2019-07-01T00:00:00", "db": "BID", "id": "108986" }, { "date": "2019-07-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-006965" }, { "date": "2020-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201907-079" }, { "date": "2024-11-21T04:40:32.740000", "db": "NVD", "id": "CVE-2019-2253" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-079" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-006965" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201907-079" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.