var-201911-1430
Vulnerability from variot
While deserializing any key blob during key operations, buffer overflow could occur exposing partial key information if any key operations are invoked(Depends on CVE-2018-13907) in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an input validation vulnerability.Information may be obtained. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm.
Many Qualcomm products have input validation error vulnerabilities, which can be exploited by attackers to cause buffer overflows or heap overflows
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1430", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sd 427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs404", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 712", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 8cx", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 410", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med 2016", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 412", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9150", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs404", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "215", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm 8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "605" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "210" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "212" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "205" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "425" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "427" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "430" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "435" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "429" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "625" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "632" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "712" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "820" }, { "model": "sd 820a", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "835" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "850" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "855" }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "439" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "630" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "msm 8909w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9206" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9607" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9150" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9650" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9205" }, { "model": "sd 8cx", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "2016" }, { "model": "sxr", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "1130" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "650/52" }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "404" }, { "model": "sd", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "410/12" }, { "model": "eudora", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "215" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs404_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qualcomm_215_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011674" } ] }, "cve": "CVE-2019-2275", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-2275", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2020-20151", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-2275", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-2275", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-2275", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-2275", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-20151", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201909-122", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "While deserializing any key blob during key operations, buffer overflow could occur exposing partial key information if any key operations are invoked(Depends on CVE-2018-13907) in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an input validation vulnerability.Information may be obtained. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm. \n\r\n\r\nMany Qualcomm products have input validation error vulnerabilities, which can be exploited by attackers to cause buffer overflows or heap overflows", "sources": [ { "db": "NVD", "id": "CVE-2019-2275" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNVD", "id": "CNVD-2020-20151" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-2275", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-011674", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-20151", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201909-122", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "id": "VAR-201911-1430", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" } ] }, "last_update_date": "2024-11-23T22:16:46.300000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831", "trust": 0.8, "url": "https://source.android.com/security/bulletin/" }, { "title": "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20151)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/211525" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97884" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2275" }, { "trust": 1.2, "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2019-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2275" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-os-multiple-vulnerabilities-30243" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-20151" }, { "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "db": "CNNVD", "id": "CNNVD-201909-122" }, { "db": "NVD", "id": "CVE-2019-2275" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20151" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "date": "2019-09-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-122" }, { "date": "2019-11-06T17:15:13.410000", "db": "NVD", "id": "CVE-2019-2275" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-30T00:00:00", "db": "CNVD", "id": "CNVD-2020-20151" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011674" }, { "date": "2020-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-122" }, { "date": "2024-11-21T04:40:35.850000", "db": "NVD", "id": "CVE-2019-2275" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011674" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-122" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.