var-202001-1493
Vulnerability from variot
While trying to obtain datad ipc handle during DPL initialization, Heap use-after-free issue can occur if modem SSR occurs at same time in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SXR1130. plural Snapdragon The product contains a vulnerability related to the use of freed memory.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Qualcomm MSM8996AU, etc. are all a central processing unit (CPU) product of Qualcomm.
HLOS Data in many Qualcomm products has a resource management error vulnerability. Local attackers can use this vulnerability to execute arbitrary code or cause a denial of service by sending a specially crafted request
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-1493", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "msm8909w", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8009", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8053", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "apq8096au", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8917", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8920", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8937", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8905", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8909", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8939", "scope": null, "trust": 1.4, "vendor": "qualcomm", "version": null }, { "model": "msm8909", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8053", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8953", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm8150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8917", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8096au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8998", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8009", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm7150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm6150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm429w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qm215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "nicobar", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8905", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8920", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8940", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8937", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8939", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sxr1130", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sm7150", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "nicobar", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm670", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sm8150", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429w", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8940", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8953", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm450", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "msm8998", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "qm215", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sdm845", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sm6150", "scope": null, "trust": 0.6, "vendor": "qualcomm", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41778" }, { "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "db": "NVD", "id": "CVE-2019-10548" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:apq8009_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8053_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:apq8096au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8905_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8917_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8920_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8937_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8939_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014198" } ] }, "cve": "CVE-2019-10548", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2019-10548", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2020-41778", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-10548", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-10548", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-10548", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-10548", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-41778", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202001-207", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-10548", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41778" }, { "db": "VULMON", "id": "CVE-2019-10548" }, { "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "db": "CNNVD", "id": "CNNVD-202001-207" }, { "db": "NVD", "id": "CVE-2019-10548" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "While trying to obtain datad ipc handle during DPL initialization, Heap use-after-free issue can occur if modem SSR occurs at same time in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCS605, QM215, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SXR1130. plural Snapdragon The product contains a vulnerability related to the use of freed memory.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Qualcomm MSM8996AU, etc. are all a central processing unit (CPU) product of Qualcomm. \n\r\n\r\nHLOS Data in many Qualcomm products has a resource management error vulnerability. Local attackers can use this vulnerability to execute arbitrary code or cause a denial of service by sending a specially crafted request", "sources": [ { "db": "NVD", "id": "CVE-2019-10548" }, { "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "db": "CNVD", "id": "CNVD-2020-41778" }, { "db": "VULMON", "id": "CVE-2019-10548" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-10548", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-014198", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-41778", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-207", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-10548", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41778" }, { "db": "VULMON", "id": "CVE-2019-10548" }, { "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "db": "CNNVD", "id": "CNNVD-202001-207" }, { "db": "NVD", "id": "CVE-2019-10548" } ] }, "id": "VAR-202001-1493", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-41778" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41778" } ] }, "last_update_date": "2024-11-23T23:11:35.031000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "January 2020 Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin" }, { "title": "Patch for Resource management error vulnerabilities in multiple Qualcomm products (CNVD-2020-41778)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/226747" }, { "title": "Multiple Qualcomm Product resource management error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108335" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41778" }, { "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "db": "CNNVD", "id": "CNNVD-202001-207" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "db": "NVD", "id": "CVE-2019-10548" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10548" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10548" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-january-2020-31267" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-41778" }, { "db": "VULMON", "id": "CVE-2019-10548" }, { "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "db": "CNNVD", "id": "CNNVD-202001-207" }, { "db": "NVD", "id": "CVE-2019-10548" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-41778" }, { "db": "VULMON", "id": "CVE-2019-10548" }, { "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "db": "CNNVD", "id": "CNNVD-202001-207" }, { "db": "NVD", "id": "CVE-2019-10548" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-41778" }, { "date": "2020-01-21T00:00:00", "db": "VULMON", "id": "CVE-2019-10548" }, { "date": "2020-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "date": "2020-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-207" }, { "date": "2020-01-21T07:15:11.353000", "db": "NVD", "id": "CVE-2019-10548" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-41778" }, { "date": "2020-01-23T00:00:00", "db": "VULMON", "id": "CVE-2019-10548" }, { "date": "2020-02-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014198" }, { "date": "2020-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-207" }, { "date": "2024-11-21T04:19:25.520000", "db": "NVD", "id": "CVE-2019-10548" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-207" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Products use free memory vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014198" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-207" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.