var-201911-1617
Vulnerability from variot
Out-of-bounds memory access in Qurt kernel function when using the identifier to access Qurt kernel buffer to retrieve thread data. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX55, SM8150, SM8250, Snapdragon_High_Med_2016, SXR1130, SXR2130. plural Snapdragon The product contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and so on are the products of American Qualcomm. MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX55 is a modem.
Kernel in a number of Qualcomm products has a security vulnerability that stems from programs that do not properly validate array indexes. No detailed vulnerability details are provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1617", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "sxr2130", scope: "eq", trust: 2.2, vendor: "qualcomm", version: null, }, { model: "sm8250", scope: "eq", trust: 2.2, vendor: "qualcomm", version: null, }, { model: "sxr1130", scope: "eq", trust: 2.2, vendor: "qualcomm", version: null, }, { model: "snapdragon high med 2016", scope: "eq", trust: 2.2, vendor: "qualcomm", version: null, }, { model: "sm8150", scope: "eq", trust: 2.2, vendor: "qualcomm", version: null, }, { model: "msm8909", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8053", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8953", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sc8180x", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8917", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8998", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm429", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs405", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sda660", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9607", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm450", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm710", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9206", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm660", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "ipq8074", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9640", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9150", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9655", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8976", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm845", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qca8081", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8940", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs404", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcm2150", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdx55", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sda845", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm636", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8096au", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8996au", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8009", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8098", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8996", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcs605", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8096", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm632", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm670", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9650", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8017", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm630", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm850", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qm215", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdm439", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "qcn7605", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "nicobar", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8909w", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8905", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "mdm9635m", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8920", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "sdx20", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "msm8937", scope: "eq", trust: 1, vendor: "qualcomm", version: null, }, { model: "apq8009", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "apq8017", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "apq8053", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "apq8096", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "apq8096au", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "apq8098", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "ipq8074", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "mdm9150", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "mdm9206", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "mdm9607", scope: null, trust: 0.8, vendor: "qualcomm", version: null, }, { model: "mdm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "9150", }, { model: "mdm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "9607", }, { model: "mdm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "9650", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8909", }, { model: "msm 8996au", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "660", }, { model: "msm 8909w", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "mdm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "9206", }, { model: "ipq", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8074", }, { model: "mdm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "9640", }, { model: "snapdragon high med", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "2016", }, { model: "sxr", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "1130", }, { model: "qca", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8081", }, { model: "apq 8096au", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "apq", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8098", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8998", }, { model: "nicobar", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "845", }, { model: "sm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8150", }, { model: "sm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8250", }, { model: "sxr", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "2130", }, { model: "mdm 9635m", scope: null, trust: 0.6, vendor: "qualcomm", version: null, }, { model: "mdm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "9655", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8905", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8917", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8920", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8937", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8940", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8953", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8976", }, { model: "qcm", scope: "eq", trust: 0.6, vendor: "marwel", version: "2150", }, { model: "sdx", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "55", }, { model: "msm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8996", }, { model: "apq", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8009", }, { model: "apq", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8017", }, { model: "apq", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8053", }, { model: "apq", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8096", }, { model: "qcm", scope: "eq", trust: 0.6, vendor: "marwel", version: "7605", }, { model: "qcn", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "404", }, { model: "qcn", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "405", }, { model: "qcn", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "605", }, { model: "qcs", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "215", }, { model: "qm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "8180x", }, { model: "sc", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "660", }, { model: "sc", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "845", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "429", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "439", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "450", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "630", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "632", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "636", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "670", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "710", }, { model: "sda", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "850", }, { model: "sdm", scope: "eq", trust: 0.6, vendor: "qualcomm", version: "20", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-16060", }, { db: "JVNDB", id: "JVNDB-2018-016156", }, { db: "CNNVD", id: "CNNVD-201910-372", }, { db: "NVD", id: "CVE-2018-13916", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/o:qualcomm:apq8009_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:apq8017_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:apq8053_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:apq8096_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:apq8096au_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:apq8098_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:ipq8074_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:mdm9150_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:mdm9206_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/o:qualcomm:mdm9607_firmware", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2018-016156", }, ], }, cve: "CVE-2018-13916", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "CVE-2018-13916", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 1.8, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "CNVD-2020-16060", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, id: "CVE-2018-13916", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 7.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2018-13916", impactScore: null, integrityImpact: "High", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2018-13916", trust: 1, value: "HIGH", }, { author: "NVD", id: "CVE-2018-13916", trust: 0.8, value: "High", }, { author: "CNVD", id: "CNVD-2020-16060", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201910-372", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-16060", }, { db: "JVNDB", id: "JVNDB-2018-016156", }, { db: "CNNVD", id: "CNNVD-201910-372", }, { db: "NVD", id: "CVE-2018-13916", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Out-of-bounds memory access in Qurt kernel function when using the identifier to access Qurt kernel buffer to retrieve thread data. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8976, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX55, SM8150, SM8250, Snapdragon_High_Med_2016, SXR1130, SXR2130. plural Snapdragon The product contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 and so on are the products of American Qualcomm. MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX55 is a modem. \n\r\n\r\nKernel in a number of Qualcomm products has a security vulnerability that stems from programs that do not properly validate array indexes. No detailed vulnerability details are provided at this time", sources: [ { db: "NVD", id: "CVE-2018-13916", }, { db: "JVNDB", id: "JVNDB-2018-016156", }, { db: "CNVD", id: "CNVD-2020-16060", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2018-13916", trust: 3, }, { db: "JVNDB", id: "JVNDB-2018-016156", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-16060", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201910-372", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-16060", }, { db: "JVNDB", id: "JVNDB-2018-016156", }, { db: "CNNVD", id: "CNNVD-201910-372", }, { db: "NVD", id: "CVE-2018-13916", }, ], }, id: "VAR-201911-1617", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-16060", }, ], trust: 1.6, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-16060", }, ], }, last_update_date: "2024-11-23T22:51:33.203000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "October 2019 Security Bulletin", trust: 0.8, url: "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin", }, { title: "Patch for Unknown vulnerability in multiple Qualcomm products (CNVD-2020-16060)", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/207821", }, { title: "Multiple Qualcomm Product security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99057", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-16060", }, { db: "JVNDB", id: "JVNDB-2018-016156", }, { db: "CNNVD", id: "CNNVD-201910-372", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-120", trust: 1.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2018-016156", }, { db: "NVD", id: "CVE-2018-13916", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.2, url: "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2018-13916", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13916", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-october-2019-30549", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-16060", }, { db: "JVNDB", id: "JVNDB-2018-016156", }, { db: "CNNVD", id: "CNNVD-201910-372", }, { db: "NVD", id: "CVE-2018-13916", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-16060", }, { db: "JVNDB", id: "JVNDB-2018-016156", }, { db: "CNNVD", id: "CNNVD-201910-372", }, { db: "NVD", id: "CVE-2018-13916", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-03-09T00:00:00", db: "CNVD", id: "CNVD-2020-16060", }, { date: "2019-11-29T00:00:00", db: "JVNDB", id: "JVNDB-2018-016156", }, { date: "2019-10-08T00:00:00", db: "CNNVD", id: "CNNVD-201910-372", }, { date: "2019-11-21T15:15:12.370000", db: "NVD", id: "CVE-2018-13916", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-03-09T00:00:00", db: "CNVD", id: "CNVD-2020-16060", }, { date: "2019-11-29T00:00:00", db: "JVNDB", id: "JVNDB-2018-016156", }, { date: "2019-12-05T00:00:00", db: "CNNVD", id: "CNNVD-201910-372", }, { date: "2024-11-21T03:48:19.990000", db: "NVD", id: "CVE-2018-13916", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-201910-372", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Snapdragon Classic buffer overflow vulnerability in products", sources: [ { db: "JVNDB", id: "JVNDB-2018-016156", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-201910-372", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.