var-202001-1473
Vulnerability from variot
Null pointer dereference can occur while parsing the clip which is nonstandard in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, Rennell, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130. plural Snapdragon Products include NULL A vulnerability exists in pointer dereferencing.Denial of service (DoS) May be in a state. Qualcomm MDM9206, etc. are all products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX20 is a modem.
Video in many Qualcomm products has an input verification error vulnerability. A remote attacker can use a specially crafted clip file to exploit the vulnerability to cause a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-1473", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mdm9206", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8009", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "mdm9207c", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8017", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8053", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8096au", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8098", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8909", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8064", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8909", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8053", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8953", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8917", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8998", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm8250", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr2130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8940", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm8150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8096au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm7150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8009", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8098", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm6150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm429w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8064", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8017", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qm215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "nicobar", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9207c", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8920", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "rennell", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8937", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8939", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sm7150", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "nicobar", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sdm670", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sm8150", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8917", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8920", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8937", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8940", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8953", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm450", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8998", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qm215", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "rennell", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm845", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sm6150", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sm8250", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sxr2130", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8939", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41777" }, { "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "db": "NVD", "id": "CVE-2019-10578" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:apq8009_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8017_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8053_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8064_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8096au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8098_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9207c_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014201" } ] }, "cve": "CVE-2019-10578", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-10578", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2020-41777", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-10578", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-10578", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-10578", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-10578", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-41777", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202001-203", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41777" }, { "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "db": "CNNVD", "id": "CNNVD-202001-203" }, { "db": "NVD", "id": "CVE-2019-10578" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Null pointer dereference can occur while parsing the clip which is nonstandard in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, Rennell, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130. plural Snapdragon Products include NULL A vulnerability exists in pointer dereferencing.Denial of service (DoS) May be in a state. Qualcomm MDM9206, etc. are all products of Qualcomm (Qualcomm). MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX20 is a modem. \n\r\n\r\nVideo in many Qualcomm products has an input verification error vulnerability. A remote attacker can use a specially crafted clip file to exploit the vulnerability to cause a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2019-10578" }, { "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "db": "CNVD", "id": "CNVD-2020-41777" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-10578", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-014201", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-41777", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-203", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41777" }, { "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "db": "CNNVD", "id": "CNNVD-202001-203" }, { "db": "NVD", "id": "CVE-2019-10578" } ] }, "id": "VAR-202001-1473", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-41777" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41777" } ] }, "last_update_date": "2024-11-23T22:29:47.477000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "January 2020 Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin" }, { "title": "Patch for Multiple Qualcomm products input verification error vulnerability (CNVD-2020-41777)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/226751" }, { "title": "Multiple Qualcomm Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108332" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41777" }, { "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "db": "CNNVD", "id": "CNNVD-202001-203" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "db": "NVD", "id": "CVE-2019-10578" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10578" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10578" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-january-2020-31267" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41777" }, { "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "db": "CNNVD", "id": "CNNVD-202001-203" }, { "db": "NVD", "id": "CVE-2019-10578" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-41777" }, { "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "db": "CNNVD", "id": "CNNVD-202001-203" }, { "db": "NVD", "id": "CVE-2019-10578" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-41777" }, { "date": "2020-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "date": "2020-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-203" }, { "date": "2020-01-21T07:15:11.540000", "db": "NVD", "id": "CVE-2019-10578" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-41777" }, { "date": "2020-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014201" }, { "date": "2020-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-203" }, { "date": "2024-11-21T04:19:29.520000", "db": "NVD", "id": "CVE-2019-10578" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon In products NULL Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014201" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-203" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.