var-201906-0812
Vulnerability from variot

Possible out of bounds write due to improper input validation while processing DO_ACS vendor command in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and other products are products of Qualcomm. The MDM9206 is a central processing unit (CPU) product. The MDM9607 is a central processing unit (CPU) product. The MDM9640 is a central processing unit (CPU) product. WLAN is one of the wireless LAN components. A buffer overflow vulnerability exists in WLANs in several Qualcomm products. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. The following products and versions are affected: Qualcomm MDM9150; MDM9206; MDM9607; MDM9640; MDM9650; MSM8996AU; QCA6174A; QCA6574AU; QCA9377; QCA9379; SD 450; SD 625; SD 636; SD 712; SD 710; SD 670; SD 820A; SD 845; SD 850; SD 855; SDA660;

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0812",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mdm9607",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca6174a",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca6574au",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca9377",
        "scope": null,
        "trust": 1.4,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca9379",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdx24",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 205",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 427",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 212",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sda660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 425",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9607",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca9377",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9650",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9206",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca6574au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 845",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca6174a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9640",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "mdm9150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdx20",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 210",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 712",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca9379",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-11934"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9150_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qca6174a_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qca6574au_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qca9377_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qca9379_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      }
    ]
  },
  "cve": "CVE-2018-11934",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-11934",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2019-18598",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-121843",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-11934",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-11934",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-11934",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-18598",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201906-608",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-121843",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-121843"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-11934"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Possible out of bounds write due to improper input validation while processing DO_ACS vendor command in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24. plural Snapdragon The product contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and other products are products of Qualcomm. The MDM9206 is a central processing unit (CPU) product. The MDM9607 is a central processing unit (CPU) product. The MDM9640 is a central processing unit (CPU) product. WLAN is one of the wireless LAN components. A buffer overflow vulnerability exists in WLANs in several Qualcomm products. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. The following products and versions are affected: Qualcomm MDM9150; MDM9206; MDM9607; MDM9640; MDM9650; MSM8996AU; QCA6174A; QCA6574AU; QCA9377; QCA9379; SD 450; SD 625; SD 636; SD 712; SD 710; SD 670; SD 820A; SD 845; SD 850; SD 855; SDA660;",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-11934"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-121843"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-11934",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-608",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-121843",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-121843"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-11934"
      }
    ]
  },
  "id": "VAR-201906-0812",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-121843"
      }
    ],
    "trust": 0.06999999999999999
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:55:31.771000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "May 2019 Code Aurora Security Bulletin",
        "trust": 0.8,
        "url": "https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin"
      },
      {
        "title": "Patch for multiple Qualcomm products WLAN buffer overflow vulnerability (CNVD-2019-18598)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/163919"
      },
      {
        "title": "Multiple Qualcomm product WLAN Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93825"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-121843"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-11934"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11934"
      },
      {
        "trust": 1.7,
        "url": "https://www.codeaurora.org/security-bulletin/2019/05/06/may-2019-code-aurora-security-bulletin"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11934"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-121843"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-11934"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-121843"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-11934"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-06-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "date": "2019-06-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-121843"
      },
      {
        "date": "2019-06-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "date": "2019-06-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      },
      {
        "date": "2019-06-14T17:29:00.363000",
        "db": "NVD",
        "id": "CVE-2018-11934"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-06-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-18598"
      },
      {
        "date": "2019-06-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-121843"
      },
      {
        "date": "2019-06-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      },
      {
        "date": "2019-06-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      },
      {
        "date": "2024-11-21T03:44:16.850000",
        "db": "NVD",
        "id": "CVE-2018-11934"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Snapdragon Vulnerability related to out-of-bounds writing in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-015635"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201906-608"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…