{"vulnerability": "CVE-2020-1129", "sightings": [{"uuid": "d90a623f-5f24-47dc-ab81-53d5959cdc4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11293", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/115926387351405846", "content": "", "creation_timestamp": "2026-01-20T08:05:02.377561Z"}, {"uuid": "0c994841-8502-4ad7-a3d5-626dceae44e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11292", "type": "seen", "source": "https://t.me/cyberbannews_ir/3134", "content": "\u200d \ud83d\uded1\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062a\u0631\u0627\u0634\u0647\u200c\u0647\u0627\u06cc \u0634\u0631\u06a9\u062a Qualcomm \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062d\u0645\u0644\u0627\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc\n\n\u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u062a\u0644\u0641\u0646 \u0647\u0645\u0631\u0627\u0647 \u062f\u0631 \u0633\u0631\u0627\u0633\u0631 \u062c\u0647\u0627\u0646 \u062f\u0631 \u0645\u0639\u0631\u0636 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062a\u0631\u0627\u0634\u0647\u200c\u0647\u0627\u06cc Mobile Station Modem \u0634\u0631\u06a9\u062a \u06a9\u0648\u0627\u0644\u06a9\u0627\u0645 \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f. \n\n\u0627\u06cc\u0646 \u062a\u0631\u0627\u0634\u0647\u200c\u0647\u0627 \u0633\u06cc\u0633\u062a\u0645 \u0631\u0648\u06cc \u0686\u06cc\u067e \u06cc\u0627 SoC \u0647\u0633\u062a\u0646\u062f \u06a9\u0647 \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u0627\u0645\u06a9\u0627\u0646 \u0627\u062a\u0635\u0627\u0644 \u0628\u0647 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u062a\u0644\u0641\u0646 \u0647\u0645\u0631\u0627\u0647 \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u0646\u062f. \u0627\u06cc\u0646 \u0686\u06cc\u067e\u200c\u0647\u0627 \u062f\u0631\u06af\u0648\u0634\u06cc\u200c\u0647\u0627\u06cc \u0647\u0648\u0634\u0645\u0646\u062f Samsung \u060cGoogle \u060cLG \u060cXiaomi \u0648 One Plus \u0645\u0648\u0631\u062f\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631\u06af\u0631\u0641\u062a\u0647\u200c\u0627\u0646\u062f. \n\n\u0628\u0631 \u0637\u0628\u0642 \u06af\u0641\u062a\u0647 \u0645\u062d\u0642\u0642\u0627\u0646 \u0686\u06a9 \u067e\u0648\u06cc\u0646\u062a\u060c \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0630\u06a9\u0648\u0631 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 CVE-2020-11292 \u062f\u0631 Qualcomm MSM Interface \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u200c\u0634\u062f\u0647 \u06a9\u0647 \u0628\u0647 \u0686\u06cc\u067e\u200c\u0647\u0627\u06cc SoC \u0627\u0645\u06a9\u0627\u0646 \u062a\u0628\u0627\u062f\u0644 \u062f\u0627\u062f\u0647 \u0628\u0627 \u0633\u06cc\u0633\u062a\u0645\u200c\u0639\u0627\u0645\u0644 \u062a\u0644\u0641\u0646 \u0647\u0645\u0631\u0627\u0647 \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f. \n\n\u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0628\u0627 \u0628\u0647\u0631\u0647\u200c\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u062f\u0631 \u0645\u0648\u062f\u0645 \u062a\u0632\u0631\u06cc\u0642 \u06a9\u0631\u062f\u0647 \u0648 \u0628\u0647 \u067e\u06cc\u0627\u0645\u06a9\u200c\u0647\u0627 \u0648 \u062a\u0645\u0627\u0633\u200c\u0647\u0627\u06cc \u0645\u062e\u0627\u0637\u0628\u06cc\u0646 \u062f\u0633\u062a\u06af\u0627\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f\u0647 \u0648 \u0645\u06a9\u0627\u0644\u0645\u0647 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0631\u0627 \u0634\u0646\u0648\u062f \u06a9\u0646\u0646\u062f. \n\n\u062f\u0631 \u062d\u0627\u0644 \u062d\u0627\u0636\u0631 40 \u062f\u0631\u0635\u062f \u0627\u0632 \u062a\u0644\u0641\u0646\u200c\u0647\u0627\u06cc \u0647\u0648\u0634\u0645\u0646\u062f \u0627\u0632 \u0686\u06cc\u067e\u200c\u0647\u0627\u06cc Qualcomm MSM \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f \u0648 \u062a\u0646\u0647\u0627 30 \u062f\u0631\u0635\u062f \u0627\u0632 \u0622\u0646\u200c\u0647\u0627 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0647\u0633\u062a\u0646\u062f. \n\n\u0634\u0631\u06a9\u062a \u06a9\u0648\u0627\u0644\u06a9\u0627\u0645 \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f\u0647\u200c \u0633\u0627\u0644 \u06af\u0630\u0634\u062a\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u0648\u0635\u0644\u0647 \u06a9\u0631\u062f\u0647 \u0648 \u0628\u0647 \u0633\u0627\u0632\u0646\u062f\u06af\u0627\u0646 \u062a\u0644\u0641\u0646 \u0647\u0645\u0631\u0627\u0647 \u0646\u06cc\u0632 \u0627\u0637\u0644\u0627\u0639\u200c\u0631\u0633\u0627\u0646\u06cc \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a. \n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc \n\n@cyberbannews_ir", "creation_timestamp": "2021-05-08T10:27:43.000000Z"}, {"uuid": "49683b5c-7be0-4cdb-8309-f6a3104971a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11292", "type": "seen", "source": "https://t.me/cKure/5186", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2020-11292 | Qualcomm | Android bug. \n\nA vulnerability in a 5G modem data service could allow mobile hackers to remotely target Android users by injecting malicious code into a phone\u2019s modem \u2013 gaining the ability to execute code, access mobile users\u2019 call histories and text messages, and eavesdrop on phone calls.\n\nA malicious app can exploit the issue, which could affect up to 30 percent of Android phones.\n\nhttps://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/", "creation_timestamp": "2021-05-06T20:56:36.000000Z"}, {"uuid": "718b5a04-f8bb-4718-bf29-83ad6a3f20d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11292", "type": "seen", "source": "https://t.me/CyberSecurityIL/3536", "content": "\u05d7\u05d5\u05dc\u05e9\u05d4 \u05e9\u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 \u05d1\u05e9\u05d1\u05d1\u05d9\u05dd \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Qualcomm \u05de\u05e9\u05e4\u05d9\u05e2\u05d4 \u05e2\u05dc \u05db-40% \u05de\u05d4\u05de\u05db\u05e9\u05d9\u05e8\u05d9\u05dd \u05d4\u05e1\u05dc\u05d5\u05dc\u05e8\u05d9\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4, \u05e9\u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 \u05e2\"\u05d9 \u05d7\u05d5\u05e7\u05e8\u05d9 \u05d0\u05d1\u05d8\"\u05de \u05de\u05d7\u05d1\u05e8\u05ea \u05e6'\u05e7\u05e4\u05d5\u05d9\u05d9\u05e0\u05d8 - CVE-2020-11292 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e3 \u05d2\u05d9\u05e9\u05d4 \u05dc\u05d4\u05d5\u05d3\u05e2\u05d5\u05ea \u05d8\u05e7\u05e1\u05d8, \u05d4\u05d0\u05d6\u05e0\u05d4 \u05dc\u05e9\u05d9\u05d7\u05d5\u05ea \u05d5\u05d2\u05d9\u05e9\u05d4 \u05dc\u05db\u05e8\u05d8\u05d9\u05e1 \u05d4\u05e1\u05d9\u05dd \u05d1\u05de\u05db\u05e9\u05d9\u05e8.\n\n\u05d7\u05d1\u05e8\u05ea Qualcomm \u05d4\u05d5\u05e6\u05d9\u05d0\u05d4 \u05e2\u05d3\u05db\u05d5\u05df \u05db\u05d1\u05e8 \u05d1\u05d7\u05d5\u05d3\u05e9 \u05d3\u05e6\u05de\u05d1\u05e8 2020 \u05d0\u05da \u05e8\u05e7 \u05de\u05db\u05e9\u05d9\u05e8\u05d9\u05dd \u05d7\u05d3\u05e9\u05d9\u05dd \u05de\u05de\u05e9\u05d9\u05db\u05d9\u05dd \u05dc\u05e7\u05d1\u05dc \u05e2\u05d3\u05db\u05d5\u05e0\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05d1\u05e2\u05d5\u05d3 \u05de\u05db\u05e9\u05d9\u05e8\u05d9\u05dd \u05d9\u05e9\u05e0\u05d9\u05dd \u05e9\u05e2\u05d3\u05d9\u05d9\u05df \u05d1\u05e9\u05d9\u05de\u05d5\u05e9 \u05d0\u05e6\u05dc \u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05dc\u05d0 \u05e7\u05d9\u05d1\u05dc\u05d5 \u05d0\u05ea \u05d4\u05e2\u05d3\u05db\u05d5\u05df.\n\nhttps://t.me/CyberSecurityIL/990\n\nhttps://www.bleepingcomputer.com/news/security/qualcomm-vulnerability-impacts-nearly-40-percent-of-all-mobile-phones/", "creation_timestamp": "2021-05-06T19:24:30.000000Z"}, {"uuid": "ed1f5e75-4479-48c9-8d68-0534bdf36455", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11290", "type": "seen", "source": "https://t.me/cibsecurity/24996", "content": "\u203c CVE-2020-11290 \u203c\n\nUse after free condition in msm ioctl events due to race between the ioctl register and deregister events in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-17T11:30:57.000000Z"}, {"uuid": "b6ca58fa-9718-48e5-996a-34fa0b7052df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11292", "type": "seen", "source": "https://t.me/true_secator/1686", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0439 Check Point \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438, \u0447\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-11292 \u0432 \u0447\u0438\u043f\u0441\u0435\u0442\u0435 Mobile Station Modem (MSM) \u043e\u0442 Qualcomm.\n\nQualcomm MSM \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 40% \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u043e\u0432, \u043d\u043e \u043e\u0448\u0438\u0431\u043a\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e 3/4 \u0438\u0437 \u043d\u0438\u0445, \u0438\u043c\u0435\u044e\u0449\u0438\u0435 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 Qualcomm MSM Interface (QMI), \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u0439 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043c\u0435\u0436\u0434\u0443 \u0447\u0438\u043f\u0441\u0435\u0442\u043e\u043c \u0438 Android. \u041e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0435 TLV \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u0443\u0447\u0438 \u0438, \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e, \u043a \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2020-11292 \u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u043c \u0441\u0447\u0435\u0442\u0435 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0445\u0430\u043a\u0435\u0440\u0443 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432 MSM, \u0447\u0442\u043e \u0441\u0434\u0435\u043b\u0430\u0435\u0442 \u0435\u0433\u043e \u043d\u0435\u0432\u0438\u0434\u0438\u043c\u044b\u043c \u0434\u043b\u044f \u043b\u044e\u0431\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u041e\u0421. \u0412 \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u0441\u0442\u043e\u0440\u0438\u0438 \u0432\u044b\u0437\u043e\u0432\u043e\u0432 \u0438 SMS-\u043f\u0435\u0440\u0435\u043f\u0438\u0441\u043a\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0433\u043e\u043b\u043e\u0441\u043e\u0432\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a.\n\nCheck Point \u043d\u0430\u0448\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430, \u0430 \u0432 \u0434\u0435\u043a\u0430\u0431\u0440\u0435 Qualcomm \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0441\u0440\u0435\u0434\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u043e\u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u0432\u0441\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u044e\u0449\u0438\u0435 \u043c\u043e\u0434\u0435\u043b\u0438 \u043d\u0438\u0436\u043d\u0435\u0433\u043e \u0446\u0435\u043d\u043e\u0432\u043e\u0433\u043e \u0434\u0438\u0430\u043f\u0430\u0437\u043e\u043d\u0430, \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u044e\u0442 \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u0430\u043f\u0434\u0435\u0439\u0442\u044b \u0434\u043b\u044f \u0441\u0432\u043e\u0435\u0439 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438. \u0418 \u044d\u0442\u043e \u0443\u0436\u0435 \u043d\u0435 \u0433\u043e\u0432\u043e\u0440\u044f \u043e \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0430\u0445, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0445 \u043f\u0430\u0440\u0443-\u0442\u0440\u043e\u0439\u043a\u0443 \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434, \u0443 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0437\u0430\u043a\u043e\u043d\u0447\u0438\u043b\u0441\u044f \u043f\u0435\u0440\u0438\u043e\u0434 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438.", "creation_timestamp": "2021-05-06T16:37:07.000000Z"}, {"uuid": "67300b7b-cd8e-43dd-964b-7d2bd8b4c857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11299", "type": "seen", "source": "https://t.me/cibsecurity/24987", "content": "\u203c CVE-2020-11299 \u203c\n\nBuffer overflow can occur in video while playing the non-standard clip in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-17T11:30:44.000000Z"}, {"uuid": "b10a6fbd-84d5-4b49-802a-efc8f2d0e31a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11296", "type": "seen", "source": "https://t.me/cibsecurity/23916", "content": "\u203c CVE-2020-11296 \u203c\n\nArithmetic overflow can happen while processing NOA IE due to improper error handling in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wired Infrastructure and Networking\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-22T12:28:23.000000Z"}, {"uuid": "fc3f42c8-2e98-46ec-8352-283c42c8c07e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11292", "type": "seen", "source": "https://t.me/thehackernews/1196", "content": "A new Qualcomm MSM vulnerability (CVE-2020-11292) could allow hackers to spy on Android devices by hiding malicious activity in modem chips.\n\nRead details: https://thehackernews.com/2021/05/new-qualcomm-chip-bug-could-let-hackers.html", "creation_timestamp": "2021-05-06T12:58:40.000000Z"}, {"uuid": "e1e75e6a-ecfc-4ef9-bb86-e08a10f36d36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11292", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3302", "content": "#5G_Network_Security\nSecurity probe of Qualcomm MSM data services\nhttps://research.checkpoint.com/2021/security-probe-of-qualcomm-msm\n]-&gt; CVE-2020-11292:\nhttps://cpr-zero.checkpoint.com/vulns/cprid-2179", "creation_timestamp": "2021-05-22T11:04:55.000000Z"}]}