var-201907-0243
Vulnerability from variot
Firmware is getting into loop of overwriting memory when scan command is given from host because of improper validation. in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ8074, QCA8081, QCS404, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660. plural Snapdragon The product contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm SD 712 is a central processing unit (CPU) product of Qualcomm.
There are vulnerabilities in input verification errors in WLANs in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. There is currently no detailed vulnerability details provided. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-129766496, A-129766125, A-122473271, A-122474808, A-122472479, A-122473168, A-122473304, A-122473496, A-122473989, A-129766432, A-129766099 and A-129766299
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201907-0243", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "sd 8cx", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs405", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 427", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs605", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sda660", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 835", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 710", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 425", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 850", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm630", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm660", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 845", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 820", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 450", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "ipq8074", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 670", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qca8081", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 435", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 855", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs404", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 430", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 712", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 636", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sd 625", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "ipq8074", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "qca8081", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "qcs404", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "qcs405", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "qcs605", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "sd 425", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "sd 427", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "sd 430", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "sd 435", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "sd 450", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "qcs404 no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "qcs605 no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "425", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "427", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "430", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "435", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "450", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "625", }, { model: "sd", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "636", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "712", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "710", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "670", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "820", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "835", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "845", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "850", }, { model: "sd no", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "855", }, { model: "sd 8cx no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "sda660 no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "sdm630 no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "sdm660 no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "ipq8074 no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "qca8081 no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "qcs405 no", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "pixel xl", scope: "eq", trust: 0.3, vendor: "google", version: "0", }, { model: "pixel c", scope: "eq", trust: 0.3, vendor: "google", version: "0", }, { model: "pixel", scope: "eq", trust: 0.3, vendor: "google", version: "0", }, { model: "nexus player", scope: "eq", trust: 0.3, vendor: "google", version: "0", }, { model: "nexus", scope: "eq", trust: 0.3, vendor: "google", version: "9", }, { model: "nexus 6p", scope: null, trust: 0.3, vendor: "google", version: null, }, { model: "nexus", scope: "eq", trust: 0.3, vendor: "google", version: "6", }, { model: "nexus", scope: "eq", trust: 0.3, vendor: "google", version: "5x", }, { model: "android", scope: "eq", trust: 0.3, vendor: "google", version: "0", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-20156", }, { db: "BID", id: "108986", }, { db: "JVNDB", id: "JVNDB-2019-007035", }, { db: "NVD", id: "CVE-2019-2346", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/o:qualcomm:ipq8074_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:qca8081_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:qcs404_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:qcs405_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:qcs605_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:sd_425_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:sd_427_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:sd_430_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:sd_435_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:sd_450_firmware", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-007035", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The vendor reported these issues.", sources: [ { db: "BID", id: "108986", }, { db: "CNNVD", id: "CNNVD-201907-066", }, ], trust: 0.9, }, cve: "CVE-2019-2346", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "CVE-2019-2346", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 1.9, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "CNVD-2020-20156", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "VHN-153781", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:L/AC:L/AU:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2019-2346", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1.8, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2019-2346", trust: 1, value: "HIGH", }, { author: "NVD", id: "CVE-2019-2346", trust: 0.8, value: "High", }, { author: "CNVD", id: "CNVD-2020-20156", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201907-066", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-153781", trust: 0.1, value: "HIGH", }, { author: "VULMON", id: "CVE-2019-2346", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-20156", }, { db: "VULHUB", id: "VHN-153781", }, { db: "VULMON", id: "CVE-2019-2346", }, { db: "JVNDB", id: "JVNDB-2019-007035", }, { db: "CNNVD", id: "CNNVD-201907-066", }, { db: "NVD", id: "CVE-2019-2346", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Firmware is getting into loop of overwriting memory when scan command is given from host because of improper validation. in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ8074, QCA8081, QCS404, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660. plural Snapdragon The product contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm SD 712 is a central processing unit (CPU) product of Qualcomm. \n\r\n\r\nThere are vulnerabilities in input verification errors in WLANs in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. There is currently no detailed vulnerability details provided. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-129766496, A-129766125, A-122473271, A-122474808, A-122472479, A-122473168, A-122473304, A-122473496, A-122473989, A-129766432, A-129766099 and A-129766299", sources: [ { db: "NVD", id: "CVE-2019-2346", }, { db: "JVNDB", id: "JVNDB-2019-007035", }, { db: "CNVD", id: "CNVD-2020-20156", }, { db: "BID", id: "108986", }, { db: "VULHUB", id: "VHN-153781", }, { db: "VULMON", id: "CVE-2019-2346", }, ], trust: 2.61, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-2346", trust: 3.5, }, { db: "BID", id: "108986", trust: 1.6, }, { db: "JVNDB", id: "JVNDB-2019-007035", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-20156", trust: 0.7, }, { db: "CNNVD", id: "CNNVD-201907-066", trust: 0.7, }, { db: "VULHUB", id: "VHN-153781", trust: 0.1, }, { db: "VULMON", id: "CVE-2019-2346", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-20156", }, { db: "VULHUB", id: "VHN-153781", }, { db: "VULMON", id: "CVE-2019-2346", }, { db: "BID", id: "108986", }, { db: "JVNDB", id: "JVNDB-2019-007035", }, { db: "CNNVD", id: "CNNVD-201907-066", }, { db: "NVD", id: "CVE-2019-2346", }, ], }, id: "VAR-201907-0243", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-20156", }, { db: "VULHUB", id: "VHN-153781", }, ], trust: 1.7, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-20156", }, ], }, last_update_date: "2024-11-23T21:37:05.708000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "July 2019 Qualcomm Technologies, Inc. Security Bulletin", trust: 0.8, url: "https://www.qualcomm.com/company/product-security/bulletins", }, { title: "Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20156)", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/211553", }, { title: "Multiple Qualcomm Product security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94300", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-20156", }, { db: "JVNDB", id: "JVNDB-2019-007035", }, { db: "CNNVD", id: "CNNVD-201907-066", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-129", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-153781", }, { db: "JVNDB", id: "JVNDB-2019-007035", }, { db: "NVD", id: "CVE-2019-2346", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://www.qualcomm.com/company/product-security/bulletins", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-2346", }, { trust: 1.3, url: "http://www.securityfocus.com/bid/108986", }, { trust: 0.9, url: "http://code.google.com/android/", }, { trust: 0.9, url: "http://www.qualcomm.com/", }, { trust: 0.9, url: "https://source.android.com/security/bulletin/2019-07-01.html", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2346", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-july-2019-29673", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/129.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-20156", }, { db: "VULHUB", id: "VHN-153781", }, { db: "VULMON", id: "CVE-2019-2346", }, { db: "BID", id: "108986", }, { db: "JVNDB", id: "JVNDB-2019-007035", }, { db: "CNNVD", id: "CNNVD-201907-066", }, { db: "NVD", id: "CVE-2019-2346", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-20156", }, { db: "VULHUB", id: "VHN-153781", }, { db: "VULMON", id: "CVE-2019-2346", }, { db: "BID", id: "108986", }, { db: "JVNDB", id: "JVNDB-2019-007035", }, { db: "CNNVD", id: "CNNVD-201907-066", }, { db: "NVD", id: "CVE-2019-2346", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-03-30T00:00:00", db: "CNVD", id: "CNVD-2020-20156", }, { date: "2019-07-25T00:00:00", db: "VULHUB", id: "VHN-153781", }, { date: "2019-07-25T00:00:00", db: "VULMON", id: "CVE-2019-2346", }, { date: "2019-07-01T00:00:00", db: "BID", id: "108986", }, { date: "2019-07-31T00:00:00", db: "JVNDB", id: "JVNDB-2019-007035", }, { date: "2019-07-02T00:00:00", db: "CNNVD", id: "CNNVD-201907-066", }, { date: "2019-07-25T17:15:14.237000", db: "NVD", id: "CVE-2019-2346", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-03-30T00:00:00", db: "CNVD", id: "CNVD-2020-20156", }, { date: "2019-07-30T00:00:00", db: "VULHUB", id: "VHN-153781", }, { date: "2019-07-30T00:00:00", db: "VULMON", id: "CVE-2019-2346", }, { date: "2019-07-01T00:00:00", db: "BID", id: "108986", }, { date: "2019-07-31T00:00:00", db: "JVNDB", id: "JVNDB-2019-007035", }, { date: "2019-07-31T00:00:00", db: "CNNVD", id: "CNNVD-201907-066", }, { date: "2024-11-21T04:40:45.683000", db: "NVD", id: "CVE-2019-2346", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-201907-066", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Snapdragon Vulnerability related to array index verification in products", sources: [ { db: "JVNDB", id: "JVNDB-2019-007035", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-201907-066", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.