{"vulnerability": "CVE-2019-1060", "sightings": [{"uuid": "35f457a1-dbd8-451a-b9f4-a54604cd799c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10609", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/115926387351405846", "content": "", "creation_timestamp": "2026-01-20T08:04:52.987405Z"}, {"uuid": "adb75ad0-be64-4011-875d-1dbf2fe6bea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10607", "type": "seen", "source": "Telegram/iQUZE2pIByE4vkwExY2sw7tjReCcmi36nOFNFwktNW4", "content": "", "creation_timestamp": "2019-12-13T11:21:12.000000Z"}, {"uuid": "b1a4f2a6-af54-41be-bc7e-a74e8dea761a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10605", "type": "seen", "source": "Telegram/hHnUO3JZazxaDFSlcvhpOKOiZt6eEIvuGQrcrKvPgHXG", "content": "", "creation_timestamp": "2019-12-14T01:31:35.000000Z"}, {"uuid": "b7bfae0f-473e-430f-9cc9-a48d1d914671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10607", "type": "seen", "source": "Telegram/hHnUO3JZazxaDFSlcvhpOKOiZt6eEIvuGQrcrKvPgHXG", "content": "", "creation_timestamp": "2019-12-14T01:31:35.000000Z"}, {"uuid": "57f3f3a8-6f04-439e-8f7b-e91617fd76bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10601", "type": "seen", "source": "Telegram/hHnUO3JZazxaDFSlcvhpOKOiZt6eEIvuGQrcrKvPgHXG", "content": "", "creation_timestamp": "2019-12-14T01:31:35.000000Z"}, {"uuid": "dbb358e1-b9a6-4f6b-82d0-de215585a815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10606", "type": "seen", "source": "https://t.me/cveNotify/360", "content": "\ud83d\udea8 CVE-2019-10606\nOut-of-bound access will occur in USB driver due to lack of check to validate the frame size passed by user in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9607, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, QCS605, SDX24\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2020-01-21T13:37:48.000000Z"}, {"uuid": "4e2ebbf8-8113-4fb9-be84-0a41f010a247", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10601", "type": "seen", "source": "Telegram/iQUZE2pIByE4vkwExY2sw7tjReCcmi36nOFNFwktNW4", "content": "", "creation_timestamp": "2019-12-13T11:21:12.000000Z"}, {"uuid": "93d611d8-4190-40d4-8ff6-deb4b5bf7568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10605", "type": "seen", "source": "Telegram/iQUZE2pIByE4vkwExY2sw7tjReCcmi36nOFNFwktNW4", "content": "", "creation_timestamp": "2019-12-13T11:21:12.000000Z"}, {"uuid": "af0b2666-cd43-4548-940f-0d70cf844e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10605", "type": "seen", "source": "https://t.me/indoghostsec/751", "content": "INDONESIAN GHOST SECURITY/INDOGHOSTSEC\n\n2019 ANDROID BUG\n\n\nLet's start\n\n1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.\n\n2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.\n    \n3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.\n\n4)  Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.\n\n_2019-12-01 security patch level vulnerability details:\n\n\nCVE-2019-2232   A-140632678   DoS   Critical   8.0, 8.1, 9, 10\nCVE-2019-9464   A-141028068 [2] [3] [4]   EoP   High   10\nCVE-2019-2217   A-141003796   EoP   High   10\nCVE-2019-2218   A-141169173   EoP   High   10\nCVE-2019-2220   A-138636979 [2]   ID   High   9, 10\nCVE-2019-2221   A-138583650 [2]   EoP   Moderate   10\n\n_In Kernel Also !!!!\n\nCVE-2018-20961   A-139522588\nUpstream kernel   EoP   High   USB MIDI class function driver\nCVE-2019-15220   A-140329469\nUpstream kernel   EoP   High   Prism54 WiFi USB Driver\nCVE-2019-15239   A-140328996\nUpstream kernel   EoP   High   TCP Stack\n\n_In Qualcomm components\n\nCVE-2019-10557   A-78657016\nQC-CR#2255369\nQC-CR#2259707   N/A   High   WLAN host\nCVE-2018-11980   A-140423440\nQC-CR#2270117   N/A   High   WLAN host\nCVE-2019-10480   A-140423811\nQC-CR#2309399   N/A   High   WLAN host\nCVE-2019-10481   A-140423794\nQC-CR#2304610\nQC-CR#2318632   N/A   High   WLAN host\nCVE-2019-10536   A-140423334\nQC-CR#2433802   N/A   High   WLAN host\nCVE-2019-10537   A-140423693\nQC-CR#2436502   N/A   High   WLAN host\nCVE-2019-10595   A-140423810\nQC-CR#2148184   N/A   High   WLAN host\nCVE-2019-10598   A-140423155\nQC-CR#2324139   N/A   High   WLAN host\nCVE-2019-10601   A-140423156\nQC-CR#2428798   N/A   High   WLAN host\nCVE-2019-10605   A-140424124\nQC-CR#2187441   N/A   High   WLAN host\nCVE-2019-10607   A-140423690\nQC-CR#2211711   N/A   High   Security\nCVE-2019-2304   A-123238115\nQC-CR#2331868\nQC-CR#2335530\nQC-CR#2348299\nQC-CR#2203904*   N/A   High   WLAN host \n\n\nBy indoghostsec 4x3ll999gh05t", "creation_timestamp": "2019-12-11T16:24:35.000000Z"}, {"uuid": "0bdcab3c-15df-4faa-8c9f-e40268ab831f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10601", "type": "seen", "source": "https://t.me/indoghostsec/731", "content": "INDONESIAN GHOST SECURITY\n\nBY Gh05t999include\n\n2019 ANDROID BUG\n\n\nYook gas:v\n\n1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.\n\n2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.\n    \n3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.\n\n4)  Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.\n\n2019-12-01 security patch level vulnerability details:\n\n\nCVE-2019-2232   A-140632678   DoS   Critical   8.0, 8.1, 9, 10\nCVE-2019-9464   A-141028068 [2] [3] [4]   EoP   High   10\nCVE-2019-2217   A-141003796   EoP   High   10\nCVE-2019-2218   A-141169173   EoP   High   10\nCVE-2019-2220   A-138636979 [2]   ID   High   9, 10\nCVE-2019-2221   A-138583650 [2]   EoP   Moderate   10\n\nIn Kernel Also !!!!\n\nCVE-2018-20961   A-139522588\nUpstream kernel   EoP   High   USB MIDI class function driver\nCVE-2019-15220   A-140329469\nUpstream kernel   EoP   High   Prism54 WiFi USB Driver\nCVE-2019-15239   A-140328996\nUpstream kernel   EoP   High   TCP Stack\n\nIn Qualcomm components\n\nCVE-2019-10557   A-78657016\nQC-CR#2255369\nQC-CR#2259707   N/A   High   WLAN host\nCVE-2018-11980   A-140423440\nQC-CR#2270117   N/A   High   WLAN host\nCVE-2019-10480   A-140423811\nQC-CR#2309399   N/A   High   WLAN host\nCVE-2019-10481   A-140423794\nQC-CR#2304610\nQC-CR#2318632   N/A   High   WLAN host\nCVE-2019-10536   A-140423334\nQC-CR#2433802   N/A   High   WLAN host\nCVE-2019-10537   A-140423693\nQC-CR#2436502   N/A   High   WLAN host\nCVE-2019-10595   A-140423810\nQC-CR#2148184   N/A   High   WLAN host\nCVE-2019-10598   A-140423155\nQC-CR#2324139   N/A   High   WLAN host\nCVE-2019-10601   A-140423156\nQC-CR#2428798   N/A   High   WLAN host\nCVE-2019-10605   A-140424124\nQC-CR#2187441   N/A   High   WLAN host\nCVE-2019-10607   A-140423690\nQC-CR#2211711   N/A   High   Security\nCVE-2019-2304   A-123238115\nQC-CR#2331868\nQC-CR#2335530\nQC-CR#2348299\nQC-CR#2203904*   N/A   High   WLAN host", "creation_timestamp": "2019-12-11T03:00:17.000000Z"}, {"uuid": "e9dda98d-d5cd-46d5-9772-89175e399a72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10601", "type": "seen", "source": "https://t.me/indoghostsec/751", "content": "INDONESIAN GHOST SECURITY/INDOGHOSTSEC\n\n2019 ANDROID BUG\n\n\nLet's start\n\n1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.\n\n2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.\n    \n3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.\n\n4)  Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.\n\n_2019-12-01 security patch level vulnerability details:\n\n\nCVE-2019-2232   A-140632678   DoS   Critical   8.0, 8.1, 9, 10\nCVE-2019-9464   A-141028068 [2] [3] [4]   EoP   High   10\nCVE-2019-2217   A-141003796   EoP   High   10\nCVE-2019-2218   A-141169173   EoP   High   10\nCVE-2019-2220   A-138636979 [2]   ID   High   9, 10\nCVE-2019-2221   A-138583650 [2]   EoP   Moderate   10\n\n_In Kernel Also !!!!\n\nCVE-2018-20961   A-139522588\nUpstream kernel   EoP   High   USB MIDI class function driver\nCVE-2019-15220   A-140329469\nUpstream kernel   EoP   High   Prism54 WiFi USB Driver\nCVE-2019-15239   A-140328996\nUpstream kernel   EoP   High   TCP Stack\n\n_In Qualcomm components\n\nCVE-2019-10557   A-78657016\nQC-CR#2255369\nQC-CR#2259707   N/A   High   WLAN host\nCVE-2018-11980   A-140423440\nQC-CR#2270117   N/A   High   WLAN host\nCVE-2019-10480   A-140423811\nQC-CR#2309399   N/A   High   WLAN host\nCVE-2019-10481   A-140423794\nQC-CR#2304610\nQC-CR#2318632   N/A   High   WLAN host\nCVE-2019-10536   A-140423334\nQC-CR#2433802   N/A   High   WLAN host\nCVE-2019-10537   A-140423693\nQC-CR#2436502   N/A   High   WLAN host\nCVE-2019-10595   A-140423810\nQC-CR#2148184   N/A   High   WLAN host\nCVE-2019-10598   A-140423155\nQC-CR#2324139   N/A   High   WLAN host\nCVE-2019-10601   A-140423156\nQC-CR#2428798   N/A   High   WLAN host\nCVE-2019-10605   A-140424124\nQC-CR#2187441   N/A   High   WLAN host\nCVE-2019-10607   A-140423690\nQC-CR#2211711   N/A   High   Security\nCVE-2019-2304   A-123238115\nQC-CR#2331868\nQC-CR#2335530\nQC-CR#2348299\nQC-CR#2203904*   N/A   High   WLAN host \n\n\nBy indoghostsec 4x3ll999gh05t", "creation_timestamp": "2019-12-11T16:24:35.000000Z"}, {"uuid": "bb00c7d4-5ac3-466f-91f6-a28ad6e204d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10605", "type": "seen", "source": "https://t.me/indoghostsec/731", "content": "INDONESIAN GHOST SECURITY\n\nBY Gh05t999include\n\n2019 ANDROID BUG\n\n\nYook gas:v\n\n1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.\n\n2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.\n    \n3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.\n\n4)  Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.\n\n2019-12-01 security patch level vulnerability details:\n\n\nCVE-2019-2232   A-140632678   DoS   Critical   8.0, 8.1, 9, 10\nCVE-2019-9464   A-141028068 [2] [3] [4]   EoP   High   10\nCVE-2019-2217   A-141003796   EoP   High   10\nCVE-2019-2218   A-141169173   EoP   High   10\nCVE-2019-2220   A-138636979 [2]   ID   High   9, 10\nCVE-2019-2221   A-138583650 [2]   EoP   Moderate   10\n\nIn Kernel Also !!!!\n\nCVE-2018-20961   A-139522588\nUpstream kernel   EoP   High   USB MIDI class function driver\nCVE-2019-15220   A-140329469\nUpstream kernel   EoP   High   Prism54 WiFi USB Driver\nCVE-2019-15239   A-140328996\nUpstream kernel   EoP   High   TCP Stack\n\nIn Qualcomm components\n\nCVE-2019-10557   A-78657016\nQC-CR#2255369\nQC-CR#2259707   N/A   High   WLAN host\nCVE-2018-11980   A-140423440\nQC-CR#2270117   N/A   High   WLAN host\nCVE-2019-10480   A-140423811\nQC-CR#2309399   N/A   High   WLAN host\nCVE-2019-10481   A-140423794\nQC-CR#2304610\nQC-CR#2318632   N/A   High   WLAN host\nCVE-2019-10536   A-140423334\nQC-CR#2433802   N/A   High   WLAN host\nCVE-2019-10537   A-140423693\nQC-CR#2436502   N/A   High   WLAN host\nCVE-2019-10595   A-140423810\nQC-CR#2148184   N/A   High   WLAN host\nCVE-2019-10598   A-140423155\nQC-CR#2324139   N/A   High   WLAN host\nCVE-2019-10601   A-140423156\nQC-CR#2428798   N/A   High   WLAN host\nCVE-2019-10605   A-140424124\nQC-CR#2187441   N/A   High   WLAN host\nCVE-2019-10607   A-140423690\nQC-CR#2211711   N/A   High   Security\nCVE-2019-2304   A-123238115\nQC-CR#2331868\nQC-CR#2335530\nQC-CR#2348299\nQC-CR#2203904*   N/A   High   WLAN host", "creation_timestamp": "2019-12-11T03:00:17.000000Z"}, {"uuid": "899d190e-8317-4509-beb9-ed90ccc47313", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10607", "type": "seen", "source": "https://t.me/indoghostsec/731", "content": "INDONESIAN GHOST SECURITY\n\nBY Gh05t999include\n\n2019 ANDROID BUG\n\n\nYook gas:v\n\n1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.\n\n2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.\n    \n3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.\n\n4)  Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.\n\n2019-12-01 security patch level vulnerability details:\n\n\nCVE-2019-2232   A-140632678   DoS   Critical   8.0, 8.1, 9, 10\nCVE-2019-9464   A-141028068 [2] [3] [4]   EoP   High   10\nCVE-2019-2217   A-141003796   EoP   High   10\nCVE-2019-2218   A-141169173   EoP   High   10\nCVE-2019-2220   A-138636979 [2]   ID   High   9, 10\nCVE-2019-2221   A-138583650 [2]   EoP   Moderate   10\n\nIn Kernel Also !!!!\n\nCVE-2018-20961   A-139522588\nUpstream kernel   EoP   High   USB MIDI class function driver\nCVE-2019-15220   A-140329469\nUpstream kernel   EoP   High   Prism54 WiFi USB Driver\nCVE-2019-15239   A-140328996\nUpstream kernel   EoP   High   TCP Stack\n\nIn Qualcomm components\n\nCVE-2019-10557   A-78657016\nQC-CR#2255369\nQC-CR#2259707   N/A   High   WLAN host\nCVE-2018-11980   A-140423440\nQC-CR#2270117   N/A   High   WLAN host\nCVE-2019-10480   A-140423811\nQC-CR#2309399   N/A   High   WLAN host\nCVE-2019-10481   A-140423794\nQC-CR#2304610\nQC-CR#2318632   N/A   High   WLAN host\nCVE-2019-10536   A-140423334\nQC-CR#2433802   N/A   High   WLAN host\nCVE-2019-10537   A-140423693\nQC-CR#2436502   N/A   High   WLAN host\nCVE-2019-10595   A-140423810\nQC-CR#2148184   N/A   High   WLAN host\nCVE-2019-10598   A-140423155\nQC-CR#2324139   N/A   High   WLAN host\nCVE-2019-10601   A-140423156\nQC-CR#2428798   N/A   High   WLAN host\nCVE-2019-10605   A-140424124\nQC-CR#2187441   N/A   High   WLAN host\nCVE-2019-10607   A-140423690\nQC-CR#2211711   N/A   High   Security\nCVE-2019-2304   A-123238115\nQC-CR#2331868\nQC-CR#2335530\nQC-CR#2348299\nQC-CR#2203904*   N/A   High   WLAN host", "creation_timestamp": "2019-12-11T03:00:17.000000Z"}, {"uuid": "fe4181b0-2659-44bb-9e64-a71f5463480b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10607", "type": "seen", "source": "https://t.me/indoghostsec/751", "content": "INDONESIAN GHOST SECURITY/INDOGHOSTSEC\n\n2019 ANDROID BUG\n\n\nLet's start\n\n1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.\n\n2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.\n    \n3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.\n\n4)  Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.\n\n_2019-12-01 security patch level vulnerability details:\n\n\nCVE-2019-2232   A-140632678   DoS   Critical   8.0, 8.1, 9, 10\nCVE-2019-9464   A-141028068 [2] [3] [4]   EoP   High   10\nCVE-2019-2217   A-141003796   EoP   High   10\nCVE-2019-2218   A-141169173   EoP   High   10\nCVE-2019-2220   A-138636979 [2]   ID   High   9, 10\nCVE-2019-2221   A-138583650 [2]   EoP   Moderate   10\n\n_In Kernel Also !!!!\n\nCVE-2018-20961   A-139522588\nUpstream kernel   EoP   High   USB MIDI class function driver\nCVE-2019-15220   A-140329469\nUpstream kernel   EoP   High   Prism54 WiFi USB Driver\nCVE-2019-15239   A-140328996\nUpstream kernel   EoP   High   TCP Stack\n\n_In Qualcomm components\n\nCVE-2019-10557   A-78657016\nQC-CR#2255369\nQC-CR#2259707   N/A   High   WLAN host\nCVE-2018-11980   A-140423440\nQC-CR#2270117   N/A   High   WLAN host\nCVE-2019-10480   A-140423811\nQC-CR#2309399   N/A   High   WLAN host\nCVE-2019-10481   A-140423794\nQC-CR#2304610\nQC-CR#2318632   N/A   High   WLAN host\nCVE-2019-10536   A-140423334\nQC-CR#2433802   N/A   High   WLAN host\nCVE-2019-10537   A-140423693\nQC-CR#2436502   N/A   High   WLAN host\nCVE-2019-10595   A-140423810\nQC-CR#2148184   N/A   High   WLAN host\nCVE-2019-10598   A-140423155\nQC-CR#2324139   N/A   High   WLAN host\nCVE-2019-10601   A-140423156\nQC-CR#2428798   N/A   High   WLAN host\nCVE-2019-10605   A-140424124\nQC-CR#2187441   N/A   High   WLAN host\nCVE-2019-10607   A-140423690\nQC-CR#2211711   N/A   High   Security\nCVE-2019-2304   A-123238115\nQC-CR#2331868\nQC-CR#2335530\nQC-CR#2348299\nQC-CR#2203904*   N/A   High   WLAN host \n\n\nBy indoghostsec 4x3ll999gh05t", "creation_timestamp": "2019-12-11T16:24:35.000000Z"}, {"uuid": "9faa9b4f-f240-4bd4-9154-7898eb78ad28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10609", "type": "seen", "source": "https://t.me/cibsecurity/11335", "content": "ATENTION\u203c New - CVE-2019-10609\n\nOut of bound write can happen due to lack of check of array index value while calculating it. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8076, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-16T17:02:25.000000Z"}, {"uuid": "2ba89ab5-d7aa-43e5-9c08-652e67dcab11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10608", "type": "seen", "source": "https://t.me/cibsecurity/11336", "content": "ATENTION\u203c New - CVE-2019-10608\n\nInformation disclosure issue occurs as there is no binding between the secure keypad session and the secure display session that allows user to take control of the REE to stop the secure keypad session and read the keypad input. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wired Infrastructure and Networking in APQ8009, MSM8905, MSM8909\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-16T17:02:26.000000Z"}]}