VAR-201909-1454

Vulnerability from variot - Updated: 2024-11-23 22:05

Device record of the pairing device used after free during ACL disconnection in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016. plural Snapdragon The product contains a vulnerability related to the use of released memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MSM8996AU is a central processing unit (CPU) product of Qualcomm (Qualcomm). A resource management error vulnerability exists in several Qualcomm products. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201909-1454",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sd 632",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs405",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 427",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sda660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 835",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 710",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 425",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 675",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 429",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820a",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "snapdragon high med 2016",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 730",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 850",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm630",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm660",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca6574au",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 845",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 820",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 450",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sdm439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 670",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 439",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 855",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 430",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 665",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 712",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 636",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 625",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8909w",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "msm8996au",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qca6574au",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs405",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "qcs605",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 425",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 427",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 430",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 435",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      },
      {
        "model": "sd 439",
        "scope": null,
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10509"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qca6574au_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs405_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:qcs605_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:sd_439_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      }
    ]
  },
  "cve": "CVE-2019-10509",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-10509",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-142062",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-10509",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-10509",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-10509",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-10509",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201908-442",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-142062",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-142062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-442"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10509"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Device record of the pairing device used after free during ACL disconnection in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016. plural Snapdragon The product contains a vulnerability related to the use of released memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MSM8996AU is a central processing unit (CPU) product of Qualcomm (Qualcomm). A resource management error vulnerability exists in several Qualcomm products. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-10509"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142062"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-10509",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-442",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-142062",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-142062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-442"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10509"
      }
    ]
  },
  "id": "VAR-201909-1454",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-142062"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:05:59.689000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "August 2019 Code Aurora Security Bulletin",
        "trust": 0.8,
        "url": "https://www.codeaurora.org/security-bulletin/2019/08/05/august-2019-code-aurora-security-bulletin"
      },
      {
        "title": "Android Qualcomm BTHOST Fixes for component security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96179"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-442"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-416",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-142062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10509"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://www.codeaurora.org/security-bulletin/2019/08/05/august-2019-code-aurora-security-bulletin"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10509"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10509"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2019-08-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-august-2019-29951"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-142062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-442"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10509"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-142062"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-442"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10509"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-09-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-142062"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "date": "2019-08-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201908-442"
      },
      {
        "date": "2019-09-30T16:15:10.870000",
        "db": "NVD",
        "id": "CVE-2019-10509"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-142062"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      },
      {
        "date": "2020-07-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201908-442"
      },
      {
        "date": "2024-11-21T04:19:19.243000",
        "db": "NVD",
        "id": "CVE-2019-10509"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Snapdragon Vulnerability in using freed memory in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-010015"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201908-442"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…