var-201912-1779
Vulnerability from variot
Potential double free scenario if driver receives another DIAG_EVENT_LOG_SUPPORTED event from firmware as the pointer is not set to NULL on first call in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ8064, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6174A, QCA6574AU, QCA8081, QCA9377, QCA9379, QCN7605, QCS405, QCS605, SDA660, SDA845, SDM450, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130. plural Snapdragon The product contains a double release vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 is a central processing unit (CPU) product from Qualcomm.
The WLAN Host in multiple Qualcomm products has a resource management error vulnerability. No detailed vulnerability details are provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-1779", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "msm8953", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8053", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca9379", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8917", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8998", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx24", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs405", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm8250", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca9377", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq4019", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr2130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq8074", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca8081", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8940", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm8150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx55", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8096au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm7150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8009", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8098", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm6150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq8064", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8017", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6174a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcn7605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "nicobar", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9207c", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8920", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8937", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8009", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "apq8017", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "apq8053", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "apq8096au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "apq8098", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "ipq4019", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "ipq8064", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "ipq8074", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9207c", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9607" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9650" }, { "model": "msm 8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "605" }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "630" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "660" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "24" }, { "model": "qcs", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "405" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "20" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9206" }, { "model": "qca 6574au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "ipq", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "4019" }, { "model": "ipq", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8064" }, { "model": "ipq", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8074" }, { "model": "mdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9640" }, { "model": "qca 6174a", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qca", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9377" }, { "model": "qca", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "9379" }, { "model": "sxr", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "1130" }, { "model": "qca", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8081" }, { "model": "msm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8998" }, { "model": "nicobar", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sda", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "636" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "670" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "710" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "845" }, { "model": "sm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "6150" }, { "model": "sm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "7150" }, { "model": "sm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8150" }, { "model": "sm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8250" }, { "model": "sxr", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "2130" }, { "model": "apq", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8017" }, { "model": "apq", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8053" }, { "model": "apq", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8009" }, { "model": "apq 8096au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "apq", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8098" }, { "model": "msm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8917" }, { "model": "msm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8920" }, { "model": "msm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8937" }, { "model": "msm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8940" }, { "model": "msm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "8953" }, { "model": "sdm", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "450" }, { "model": "sdx", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "55" }, { "model": "mdm 9207c", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcn", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": "7605" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03573" }, { "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "db": "NVD", "id": "CVE-2019-10536" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:apq8009_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8017_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8053_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8096au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8098_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:ipq4019_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:ipq8064_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:ipq8074_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9207c_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013385" } ] }, "cve": "CVE-2019-10536", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2019-10536", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2020-03573", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-10536", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-10536", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-10536", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-10536", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-03573", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-094", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-10536", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03573" }, { "db": "VULMON", "id": "CVE-2019-10536" }, { "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "db": "CNNVD", "id": "CNNVD-201912-094" }, { "db": "NVD", "id": "CVE-2019-10536" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Potential double free scenario if driver receives another DIAG_EVENT_LOG_SUPPORTED event from firmware as the pointer is not set to NULL on first call in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ8064, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6174A, QCA6574AU, QCA8081, QCA9377, QCA9379, QCN7605, QCS405, QCS605, SDA660, SDA845, SDM450, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130. plural Snapdragon The product contains a double release vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206 is a central processing unit (CPU) product from Qualcomm. \n\r\n\r\nThe WLAN Host in multiple Qualcomm products has a resource management error vulnerability. No detailed vulnerability details are provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2019-10536" }, { "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "db": "CNVD", "id": "CNVD-2020-03573" }, { "db": "VULMON", "id": "CVE-2019-10536" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-10536", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-013385", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-03573", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201912-094", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-10536", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03573" }, { "db": "VULMON", "id": "CVE-2019-10536" }, { "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "db": "CNNVD", "id": "CNNVD-201912-094" }, { "db": "NVD", "id": "CVE-2019-10536" } ] }, "id": "VAR-201912-1779", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-03573" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03573" } ] }, "last_update_date": "2024-11-23T22:58:27.393000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "December 2019 Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin" }, { "title": "Patch for Multiple Qualcomm Product Resource Management Error Vulnerabilities (CNVD-2020-03573)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/198865" }, { "title": "Multiple Qualcomm Product resource management error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=105629" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03573" }, { "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "db": "CNNVD", "id": "CNNVD-201912-094" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "db": "NVD", "id": "CVE-2019-10536" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10536" }, { "trust": 1.7, "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10536" }, { "trust": 0.6, "url": "https://source.android.google.cn/security/bulletin/2019-12-01.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-december-2019-31041" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-03573" }, { "db": "VULMON", "id": "CVE-2019-10536" }, { "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "db": "CNNVD", "id": "CNNVD-201912-094" }, { "db": "NVD", "id": "CVE-2019-10536" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-03573" }, { "db": "VULMON", "id": "CVE-2019-10536" }, { "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "db": "CNNVD", "id": "CNNVD-201912-094" }, { "db": "NVD", "id": "CVE-2019-10536" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2020-03573" }, { "date": "2019-12-18T00:00:00", "db": "VULMON", "id": "CVE-2019-10536" }, { "date": "2019-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "date": "2019-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-094" }, { "date": "2019-12-18T06:15:11.847000", "db": "NVD", "id": "CVE-2019-10536" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2020-03573" }, { "date": "2019-12-23T00:00:00", "db": "VULMON", "id": "CVE-2019-10536" }, { "date": "2019-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013385" }, { "date": "2020-06-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-094" }, { "date": "2024-11-21T04:19:23.160000", "db": "NVD", "id": "CVE-2019-10536" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-094" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Double release vulnerability in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013385" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-094" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.