Action not permitted
Modal body text goes here.
CVE-2020-11148
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Qualcomm, Inc. | Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables |
Version: APQ8017, APQ8053, MSM8917, MSM8953, PM215, PM3003A, PM439, PM6125, PM6150, PM6150A, PM6150L, PM6350, PM640A, PM640L, PM640P, PM660, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855B, PM855L, PM8916, PM8937, PM8953, PMI632, PMI8937, PMI8952, PMK7350, PMK8002, PMK8003, PMK8350, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCS605, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE ...[truncated*] |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:28:12.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "APQ8017, APQ8053, MSM8917, MSM8953, PM215, PM3003A, PM439, PM6125, PM6150, PM6150A, PM6150L, PM6350, PM640A, PM640L, PM640P, PM660, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855B, PM855L, PM8916, PM8937, PM8953, PMI632, PMI8937, PMI8952, PMK7350, PMK8002, PMK8003, PMK8350, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCS605, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE ...[truncated*]" } ] } ], "descriptions": [ { "lang": "en", "value": "Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables" } ], "problemTypes": [ { "descriptions": [ { "description": "Use After Free Issue in Bluetooth Host", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-21T09:41:16", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin" } ], "x_ConverterErrors": { "version_name": { "error": "version_name too long. Use array of versions to record more than one version.", "message": "Truncated!" } }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2020-11148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", "version": { "version_data": [ { "version_value": "APQ8017, APQ8053, MSM8917, MSM8953, PM215, PM3003A, PM439, PM6125, PM6150, PM6150A, PM6150L, PM6350, PM640A, PM640L, PM640P, PM660, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855B, PM855L, PM8916, PM8937, PM8953, PMI632, PMI8937, PMI8952, PMK7350, PMK8002, PMK8003, PMK8350, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCS605, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QFS2608, QFS2630, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4360, QPA4361, QPA5373, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5621, QPM5641, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC801S, QTM525, Qualcomm215, SA6155P, SA8150P, SA8155, SA8195P, SD429, SD439, SD632, SD665, SD675, SD690 5G, SD750G, SD765, SD765G, SD768G, SD855, SD865 5G, SD888 5G, SDA429W, SDM429W, SDR660, SDR660G, SDR735, SDR735G, SDR8250, SDR865, SDX55, SDX55M, SDXR1, SDXR2 5G, SM7250P, SM7350, SMB1351, SMB1355, SMB1358, SMB1360, SMB1381, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMR525, SMR526, SMR545, SMR546, WCD9326, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2955, WTR2965, WTR3925" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free Issue in Bluetooth Host" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2020-11148", "datePublished": "2021-01-21T09:41:16", "dateReserved": "2020-03-31T00:00:00", "dateUpdated": "2024-08-04T11:28:12.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-11148\",\"sourceIdentifier\":\"product-security@qualcomm.com\",\"published\":\"2021-01-21T10:15:13.683\",\"lastModified\":\"2021-01-29T19:18:54.403\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables\"},{\"lang\":\"es\",\"value\":\"Un problema de uso de la memoria previamente liberada en HIDL mientras usa la devoluci\u00f3n de la llamada para publicar el evento en el subproceso Rx cuando un mutex interno no es adquirido y mientras tanto el cierre es activado y la instancia de devoluci\u00f3n de llamada es eliminada en los productos Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.2},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D29295A-7183-46BE-B4EE-F891D1C17ED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B59B60-A298-4A56-A45A-E34B7AAB43D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"369295A2-8236-44B6-A09F-7CB0BD20527F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F76229-1A4A-4306-A4CC-C823A99F041A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B243231F-2266-4876-A612-1245BE208249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF03FD6-E0DF-4216-8639-BCD58F56E646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm439:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC75E299-94BB-4014-B14D-9ED08B0A8129\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"988554E5-F881-4DA5-BF68-7FEB1E41EB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D757D8-2A81-4161-ABA8-54D61E71568A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BAEEB4E-8C21-4DE3-8230-0E64DA8BCF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD92FEFB-EFAF-4622-BEEB-16D828E87C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"629AC2EB-637D-493A-913A-66989EE2BB91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm640a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E4F34A-9C0D-4966-B38A-7E708AE72C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm640l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C52F30-2B28-4A02-BA24-04A137E0B5B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm640p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD43CDF8-11E5-42DD-A8F3-229BEC82C692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EA4BC14-3A93-42C9-A51F-54C229FB2617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E2BC76-B6BB-44A0-9023-116EAA66B388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"875C0C0A-5B10-4A63-9441-4B9279ADDE63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm670l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6418B48-0A81-4425-8011-7405F901F024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B66F085D-874B-43D3-A965-FCAC14657A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E3064A-C411-4097-8E4D-4984C5769126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B20B944-46FA-4D10-8B50-E31D1E08EC4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3AD9E23-148B-4AF7-BE79-A1324CC6F546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E65C30-DEE4-4E34-BBD1-824AFCD06FBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A128D0-9E32-4B88-B92B-E15D56CE30E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2D27C4-B364-4991-AE9E-4F3DC486D581\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6151FB45-F8F7-4F92-ACB7-57272CCAD255\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF5EE00-7002-4190-BCCF-8B63ACA70CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"660ADC5A-799B-42C4-B7E1-52539AD994D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5ABEF07-694B-47E8-A3A9-8164EF6E45BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB6FFB29-7370-43CD-8410-2A17D9A3BD64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87FEDC09-E1DE-49A5-8EDF-E895467CD8C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7AFEEAC-A37D-497F-B9D0-BE7CB673F92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F13F5A7-FD3E-499F-863D-A1BEADB0D06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97CA505-D827-48C1-A46B-7B82DE719C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D137B13B-24D1-41C4-BC8C-2F6F51CEBCFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179E3B9E-0EE6-436B-AC5B-49FB3F375BD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED8C7A7-884F-412B-BF47-D122810A67E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A320056A-818F-4BEB-9DB0-14F8F26A309B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEDA1620-8FFC-4DF4-9CBC-188D21581CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8E31E7-9ED7-4F8E-ADC8-60C087F4E340\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pm8953:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"316C919A-BD79-4859-9F85-AEDBA5E6137A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA5F089-6FBC-4B6B-8980-6BFEB6670BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmi8937:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A176D9B-816F-47CA-B8BC-E4E7C1E96325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmi8952:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F914570-082A-4276-85DB-ADA944BA771F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB7918E9-FFD6-4041-88FB-975A708D8EA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43ED5B2-BE32-4650-9726-970135570455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7350FB-760C-41D1-A72F-A1FD65F7CE60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C9E197C-4C9E-4B76-A9DC-78BF0325C764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmm8195au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F18ED67-902E-4DFC-8239-B8188DBD7FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F67FB3-5725-4A19-904E-B1FC95D4402E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA1D854-AD1B-4732-AEF3-321936B5DF7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"728A6173-6582-4153-A040-70FF40516A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1E4545F-B38C-4535-BF0E-6A9FC0579265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E63676-6E36-4B26-88C6-36CF73B5FBA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53A0FCE5-32EE-4999-8D63-B438862B49A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D80915F-096A-4B69-B6B8-6C6609B463DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49400DEF-EB72-419F-AD00-37BF7C30F2BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04842F87-AA4D-43BF-8148-FE7BD521C975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298034D1-85C6-42AF-BC06-7B19A8C84FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF6F7AF-9839-46A1-8552-ED6F9F246E98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FDC5240-C134-44E6-8E90-63C09BA01970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D209F276-3539-4231-9735-B31C22AE8E5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6919C289-456D-4A2F-A508-4C1E41E9ACC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5098C94E-4146-4D68-BCE6-D860B9A62BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87A58C3D-B9C1-4155-9FF1-C5312D699164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A345E2B6-0DD7-454C-B9ED-33469866A217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8B8C5E9-3F03-4A5E-95FC-B9318BA85268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA626EC-59F1-43CC-835C-1E4F3FE579BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3BF86E1-3FAC-4A42-8C01-5944C6C30AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34661A30-92C3-4F0D-ABD1-8DA8E928DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34D021D-C043-4EFD-9AB3-B2174528CBA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11405993-5903-4716-B452-370281034B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8374DDB3-D484-4141-AE0C-42333D2721F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477F6529-4CE1-44FC-B6EE-D24D44C71AE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0996EA3-1C92-4933-BE34-9CF625E59FE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E23922D-C37F-476F-A623-4C1458A9156F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D665C1-3EBA-42F2-BF56-55E6C365F7DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2430E3C4-89EA-41F2-9A19-DBCB69A4F91D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm2302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ECD486B-C685-48F9-B00B-E3F6B497B823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F2396C-5527-4E03-B005-029F020A095F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B485D6-7BA1-4B48-9F35-02CC03F0F1BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE93D494-6DF3-41AC-BF66-BD6C2822DA19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907EC235-3B08-4F42-9B5E-676D4CAD4A11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA76C6A-0988-436A-B93A-273AB8E0226A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C396A7DA-25F1-417D-96F2-E3500EF42498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45CE8949-77E4-4D3C-8C88-8A2BE892ADA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F822A512-FEC8-49AB-A763-0684BB304252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E6AD633-267E-48A4-ACF5-6307E427CD74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF4ED992-0B17-433A-82FD-B94DE482DB65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45EE0BDE-155D-4F1D-B4A5-DFD21C5502FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A850430E-BA5F-4A79-BCC0-346014064A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F1AEEB3-DE39-429B-A373-8BFB51BD21FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF219397-DA5D-4758-BE04-35B56C3891F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AF9895A-1A99-49B6-B89A-C6C2170CB9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"151E59EF-A5F1-4378-8A34-4AAFB074E879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D2DFD77-3D15-4156-BADC-F48F73AF7C68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7872ACFC-C2BF-43EC-B061-A100EF25A70D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42AF43F3-26C1-4CB0-98D4-F98AA6B4A5FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"661B3675-83F6-439E-A256-06D7E45ED8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6A9CE9A-1323-480C-BFE6-BEA5B176D748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC427584-98A2-4842-9EE8-72AF8AD2B912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe2101:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0862428-695F-4445-AD89-536376E57E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe2520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F58DA0F-88A4-4C88-A1A4-0455584D8BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe2550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC33174B-9D45-4C82-BDC1-A60B085A4513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe3340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7255B9DD-58B2-4211-B999-558EAE484B39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe4301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6BEAB2B-8272-49DD-B0D5-25A2DA8CDBF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe4302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5A2D83B-93BB-45B3-B905-6974CF7EF361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe4303:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D82CAB-56F9-4B4B-854F-F92D4076A097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe4305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76BA7E25-6384-4D1E-912E-E0D89E8883C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe4308:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0528FA86-1360-432E-8193-8AF43B95F028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe4309:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"457B3C15-F6E1-40B5-B273-5B7D9216159D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe4320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D026A491-D75E-4798-B046-07D5701A7779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfe4373fc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49B62857-F0CF-4E81-BC52-1E2208175D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E5B822-FCBC-48F4-AB60-B9AF73A8D58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55BEA113-FA98-4BB3-B92C-71FF6C2F6310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC694AC-EF51-40BA-9EB7-10A3889BB4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E9AD07C-1CCA-4E36-9AB7-772E4F2C4192\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45F730FA-3E02-47A5-BDB3-9E132183DB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F83D75FB-822D-420A-9069-28E55091C05C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8D7085-36BE-4E13-B34B-9D5E9AEC7673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AE158C6-5444-4B17-9848-7F9876F8F2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EB46FAF-E84E-4007-9B47-EE13E8E31B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A30903-7531-42C4-B0CD-2B0D45EA6481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0724FE57-87D4-45FB-B189-D45A80C679D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa4361:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8030F98D-5105-4A8E-8C33-27CD9A9C1FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa5373:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3215DA42-E059-4490-A562-1423164F54B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"440234CE-FF87-476D-9E4A-128850D967B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C1E390-8B11-4DC7-ACF7-87B7F7C21EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36BE6C57-84D7-4CA7-BDC6-0407D6AFC365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7AC75C-65EC-48E8-AECD-77F41EA60D06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E9669EE-515D-40E1-A260-118B9F0D1DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC94A215-4CF9-4F95-B25B-3DCDF2F4FCA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0047E7B-50CD-492A-B7A2-FD3863ECF499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89E1CDD6-480A-4027-B74D-CD987FD38DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F89782-9105-4437-A33E-BBA59FFF7B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72FE2FC-4AC6-4F9A-8868-0977B4713513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"027FD323-DD57-49D6-AD5B-18B84EC5B086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C9F941-5551-4CB5-B819-5E0905A171E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BF4B4A-F8ED-4E86-A43A-5BA83CFFC3D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F141854-187F-4869-B9B3-1FAEE7E0DE7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7BF3B9D-B96C-4528-B680-7ED8022D5EEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB823470-EA4C-499C-856D-4B514CC7510F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DA9B6E-B01F-4A91-BF54-74E6C2C900C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20720A3D-9199-4110-BC97-83B350F69F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89EC822B-3F9E-46F3-A792-CD4BE73EC0E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25DDF73E-92A7-4E53-9550-EBAAC1B3B8F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5827067-95F2-4615-897C-92A3749F98AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DFF710-2581-4E83-A60B-DC61FF534453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F026D09-A91B-4CDF-8A01-119DD10DBC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA8815F8-0703-4CCE-8BD8-0E78E7544321\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C51B88E1-BD42-416E-BF9F-FA8AF3C8C312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C92D88-FF1E-4ADE-8370-F99FCDE00665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE62E62A-3927-4916-BCE4-8189263E06C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED2C326-000C-4FAC-BEAD-EFF945245801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC546B18-D916-4168-89A6-0CB332D83264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9D356E-5CFB-4E72-8F08-F38C0AAD0B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3091C44D-D258-4C87-89E0-EBA8E21FD305\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32636F9D-1A2D-4B87-AB95-518AC2787DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13CB7F4-B30D-4DB9-AAB3-797A79F888E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qsw6310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6178ADF9-FE75-4FC4-A0E2-2509E8F2F572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BC1FD31-5D16-4901-8C83-F8882A6476E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qsw8574:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BF5F35-303E-4D41-A4BA-77549713ACFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qtc410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237B4A43-C864-4EF5-9ED6-E6B6B49D4C56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"462C175D-5C9B-4CC1-8329-B21656DB99CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62013476-1792-4BCC-B7AB-FB6D1D111C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1EBF0B4-1305-4E97-BA42-5E98DA3EE290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADFD2AF-C62F-4684-A238-E9080A3FEE01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0514D433-162C-4680-8912-721D19BE6201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FEACAA9-C061-4713-9A54-37D8BFC0B00B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50EF47E5-2875-412F-815D-44804BB3A739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3945686E-666C-4A47-A062-608AD8C6F112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589BF3A7-70F0-4C52-B4FE-36CE6192A0C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26C32652-9BE2-4A85-9A7F-3B7896922D1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6AE7466-2094-4E1E-BF4C-D3C6A5F6223A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589F4888-28F6-4ECA-860E-8054C2A8C419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd6905g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F14F6E-8962-4709-B5E3-4F89496D4AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A29739-DC41-4DEB-8613-26DECA4B4013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF1560D8-14F6-4FD8-B83A-2023BB792065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE196A0-AB55-4A5B-A1D6-630706310163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13D505D9-E00B-4934-AD85-E5EA2921FD50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51104EA4-B075-488C-A717-9CE785016C88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFE2A68-4EB1-4C36-8807-184940B9DBF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6616E0B9-B10F-483C-9B28-0A0557DC3372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F6CE39-9299-4FC3-BC48-11F79034F2E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C543239C-018C-42C1-AC4F-5359810395BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdr660g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ADAA31-F79A-49F7-9F7C-433D548EA8BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B28EC8E-1263-4ECD-8C90-9943468BA9B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FACAF8DE-5D82-4386-BE26-3C84283B97C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6D8E67-38BE-45E1-80A7-9A5776E9BFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C221A7A-2F73-4060-A147-9712D43D02BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3FF5A9A-A34A-499C-B6E0-D67B496C5454\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585B794A-0674-418B-B45B-42EA97C40B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17B2E7D7-A8C3-4EC9-9148-F048AFD03D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"099751A2-A158-4A58-BDA0-D74DF0E8658B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D395018-251C-45AA-9EE8-A638CAB0B508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E77EAC-C832-4AD3-A307-B485F081A7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54720F88-446D-47BD-9F0B-DD45C968C50D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AABDE55-DCDE-4E7D-8752-704B5EE745C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1358:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"726EF442-9D09-4C76-8EAE-8BCA61A127A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1D7205-33E9-452B-BECD-F551801071DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D8BD2B3-EC60-41F8-ABF3-0DFCC4DA9F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"961BB1ED-BD12-4EDF-94D3-122F8AA6D064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66C76A2-978C-4496-8CE8-F9485F8BFB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C854E653-E387-455B-805B-44DBFB9843B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E683B05-8631-4CCF-A39A-DB9A532C1926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE647A70-A87E-42B9-ACE3-9654A1BBE709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B616C2E-B3A5-44D2-8AC9-EC7A51094C17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E0E633-BC19-4805-962D-C06E3A193DE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A19C416B-F270-4B5F-949F-CA16D89F6854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D4CAD6-452C-4694-8F2B-3B488CE37246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9E96B3-F1BB-46F8-B715-7DF90180F1E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98784DC-3143-4D38-AD28-DBBDCCAB4272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA94C6D6-85DB-4031-AAF4-C399019AE16D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FA2EB9-416F-4D69-8786-386CC73978AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044A14FB-64F6-4200-AC85-8DC91C31BD16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7D32B3-325E-4B1F-8649-3D0071396BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B00662-139A-4E36-98FA-D4F7D101D4AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B612B044-C7D1-4662-AB2A-5400E34A3CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE861CE7-B530-4698-A9BC-43A159647BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"120E8F0F-EBEB-4565-9927-2D473F783EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36D3274-F8D0-49C5-A6D5-95F5DC6D1950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF676C5B-838B-446C-A689-6A25AB8A87E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F28E29-520F-469E-B048-62DE2EF07ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9523ACC9-9D2F-4A40-9CEF-9A9676176867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"362252ED-1DB3-4CF6-86DD-14919826D75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB21B3F-6D07-4B45-8A71-DC5490176296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E650C510-037F-47DB-A486-EBF871C73278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F5D7CA-6F31-4842-AC66-EB975C19C83D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D8E02BA-3A7E-4B13-A8D7-20FD0FAE3187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31DA4BC4-C634-4F62-A49E-5AD8F4FD4672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA85B322-E593-4499-829A-CC6D70BAE884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E870D82-DE3B-4199-A730-C8FB545BAA98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF680174-5FA6-47D9-8EAB-CC2A37A7BD42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B36F4B2-BAA3-45AD-9967-0EB482C99708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wtr2955:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5516E6E3-D8DA-4172-A059-503B369E2034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1267A5A-D6C7-405B-AD58-6A80A30E6813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27666130-DB04-457F-A968-3919FD5314BC\"}]}]}],\"references\":[{\"url\":\"https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin\",\"source\":\"product-security@qualcomm.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin\",\"source\":\"nvd@nist.gov\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
var-202101-0083
Vulnerability from variot
Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables. plural Qualcomm The product contains a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The Qualcomm chip is a chip of Qualcomm (Qualcomm). A way to miniaturize circuits (mainly including semiconductor equipment, but also passive components, etc.) and often manufactured on the surface of semiconductor wafers. Many Qualcomm products have resource management error vulnerabilities. The vulnerability originates from the use of callbacks to release the problem in HIDL when the event is released in the RID thread when the internal mutex is not obtained and the callback instance is triggered to close and delete at the same time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0083", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "qpa4360", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6696", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qsw8574", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm4621", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qualcomm215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5679", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm855b", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm670l", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa5580", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm8870", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm6150", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6431", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe2101", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe4373fc", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sa8155", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm3003a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd6905g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm5621", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmr735b", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx55", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6595au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qtc801s", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdr660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat5522", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd429", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qet5100", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcd9385", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qtc800h", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8350bhs", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe4301", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6391", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat5568", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfs2530", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8150c", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat3518", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd675", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smr545", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn6851", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8053", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe2520", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm7250b", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm5677", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1355", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8953", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfs2580", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm5670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm215", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm6125", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcd9380", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat3555", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe4320", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1396", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm660", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8350", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm2301", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmk8350", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm3301", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qbt2000", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1390", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcd9375", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat5533", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8937", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8350b", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm6670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8350bh", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm8820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qln4650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm6582", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1381", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm4630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa8821", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat3519", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm4643", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm6150a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat3522", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdm429w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sa6155p", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wsa8810", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdr660g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smr525", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm855", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3680", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn6856", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qsm7250", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat3550", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa6560", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm7350c", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8350c", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qet6110", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sda429w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8150l", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe4308", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5621", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3680b", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wsa8835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wsa8830", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm7350", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1358", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qet4101", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smr526", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcd9326", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfs2630", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm3302", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm5641", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa2625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdr865", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5579", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmm8195au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6436", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn6740", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wsa8815", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd8885g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat5516", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdxr1", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3610", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmi8952", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5670", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qcs605", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa5461", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd439", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm5679", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1394", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm7150a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmi8937", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3991", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn6850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1351", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm2310", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa8842", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat5515", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmk8003", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe4309", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3998", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qbt1500", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm7250", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd765g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm855l", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sm7250p", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcd9341", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm5875", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm640l", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfs2608", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8150a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe4305", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6426", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8250", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa5581", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3980", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm2308", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sa8150p", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa8673", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa4361", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qln5020", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd8655g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8917", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3660b", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa5373", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qet6100", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa8802", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd750g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8150b", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8009", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smr546", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qln5040", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe3340", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm4650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm5870", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm6585", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm4641", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat3516", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe4302", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm4650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmm855au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd765", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdr735", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm6150l", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm640a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6390", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1395", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qat3514", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5620", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe4303", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcd9370", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd768g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wgr7640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm5658", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd665", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdx55m", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wtr2955", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa8803", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qet5100m", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm660l", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5671", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qsw8573", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3990", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm8830", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6595", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdr735g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6421", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdxr25g", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qtm525", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm4640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qfe2550", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm640p", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3988", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wtr2965", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm7150l", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8916", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmk7350", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmr525", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmr735a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmx55", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa8686", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm6350", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm2305", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmi632", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm5677", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1360", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3950", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pmk8002", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qtc410s", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wcn3620", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpa8801", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8953", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qln4642", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sdr8250", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sa8195p", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "apq8017", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm6621", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "wtr3925", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm2302", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qpm8895", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qsw6310", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "smb1398", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qln5030", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qdm2307", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "pm8008", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8917", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "pm6150a", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "pm3003a", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "pm6125", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "pm215", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "pm6150", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "pm439", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "apq8017", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "msm8953", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null }, { "model": "apq8053", "scope": null, "trust": 0.8, "vendor": "\u30af\u30a2\u30eb\u30b3\u30e0", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "db": "NVD", "id": "CVE-2020-11148" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm215:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm439:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm640a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm640l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm640p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm670l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8953:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmi8937:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmi8952:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmm8195au:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2302:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe2101:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe2520:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe2550:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe3340:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4301:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4302:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4303:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4305:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4308:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4309:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4373fc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa4361:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa5373:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qsw6310:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qsw8574:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qtc410s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd6905g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr660g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1358:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1360:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wtr2955:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-11148" } ] }, "cve": "CVE-2020-11148", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2020-11148", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-11148", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-11148", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202012-504", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-11148", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-11148" }, { "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "db": "NVD", "id": "CVE-2020-11148" }, { "db": "CNNVD", "id": "CNNVD-202012-504" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables. plural Qualcomm The product contains a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. The Qualcomm chip is a chip of Qualcomm (Qualcomm). A way to miniaturize circuits (mainly including semiconductor equipment, but also passive components, etc.) and often manufactured on the surface of semiconductor wafers. \nMany Qualcomm products have resource management error vulnerabilities. The vulnerability originates from the use of callbacks to release the problem in HIDL when the event is released in the RID thread when the internal mutex is not obtained and the callback instance is triggered to close and delete at the same time", "sources": [ { "db": "NVD", "id": "CVE-2020-11148" }, { "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "db": "CNNVD", "id": "CNNVD-202012-504" }, { "db": "VULMON", "id": "CVE-2020-11148" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-11148", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015617", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202012-504", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-11148", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-11148" }, { "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "db": "NVD", "id": "CVE-2020-11148" }, { "db": "CNNVD", "id": "CNNVD-202012-504" } ] }, "id": "VAR-202101-0083", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.16046866999999998 }, "last_update_date": "2023-12-18T13:27:52.262000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "December\u00a02020\u00a0Security\u00a0Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin" }, { "title": "Google Android Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=136344" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "db": "CNNVD", "id": "CNNVD-202012-504" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.0 }, { "problemtype": "Use of freed memory (CWE-416) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "db": "NVD", "id": "CVE-2020-11148" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin" }, { "trust": 1.7, "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11148" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-december-2020-34050" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-11148" }, { "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "db": "NVD", "id": "CVE-2020-11148" }, { "db": "CNNVD", "id": "CNNVD-202012-504" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-11148" }, { "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "db": "NVD", "id": "CVE-2020-11148" }, { "db": "CNNVD", "id": "CNNVD-202012-504" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-21T00:00:00", "db": "VULMON", "id": "CVE-2020-11148" }, { "date": "2021-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "date": "2021-01-21T10:15:13.683000", "db": "NVD", "id": "CVE-2020-11148" }, { "date": "2020-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-504" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-29T00:00:00", "db": "VULMON", "id": "CVE-2020-11148" }, { "date": "2021-10-06T08:57:00", "db": "JVNDB", "id": "JVNDB-2020-015617" }, { "date": "2021-01-29T19:18:54.403000", "db": "NVD", "id": "CVE-2020-11148" }, { "date": "2021-07-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-504" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-504" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Qualcomm\u00a0 Product Free Memory Usage Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015617" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-504" } ], "trust": 0.6 } }
wid-sec-w-2022-2387
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Android Betriebssystem von Google ist eine quelloffene Plattform f\u00fcr mobile Ger\u00e4te. Die Basis bildet der Linux-Kernel.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, seine Privilegien zu erh\u00f6hen, einen Denial of Service Zustand herbeizuf\u00fchren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Android\n- Blackberry", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2387 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-2387.json" }, { "category": "self", "summary": "WID-SEC-2022-2387 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2387" }, { "category": "external", "summary": "IBM Security Bulletin 6999317 vom 2023-05-30", "url": "https://www.ibm.com/support/pages/node/6999317" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2314-1 vom 2023-05-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/015022.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2021-026 vom 2021-05-07", "url": "https://downloads.avaya.com/css/P8/documents/101075693" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:1093 vom 2021-04-06", "url": "https://access.redhat.com/errata/RHSA-2021:1093" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-1093 vom 2021-04-07", "url": "http://linux.oracle.com/errata/ELSA-2021-1093.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9164 vom 2021-04-09", "url": "http://linux.oracle.com/errata/ELSA-2021-9164.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2099 vom 2021-05-25", "url": "https://access.redhat.com/errata/RHSA-2021:2099" }, { "category": "external", "summary": "Android Security Bulletin Dezember 2020 vom 2020-12-15", "url": "https://source.android.com/security/bulletin/2020-12-01" }, { "category": "external", "summary": "Pixel Update Bulletin - Dezember 2020", "url": "https://source.android.com/security/bulletin/pixel/2020-12-01" }, { "category": "external", "summary": "BlackBerry Powered by Android Security Bulletin - December 2020", "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000072551" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3933-1 vom 2020-12-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:2106 vom 2021-05-25", "url": "https://access.redhat.com/errata/RHSA-2021:2106" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0452-1 vom 2021-02-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0686 vom 2021-03-02", "url": "https://access.redhat.com/errata/RHSA-2021:0686" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0689 vom 2021-03-02", "url": "https://access.redhat.com/errata/RHSA-2021:0689" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0763 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0763" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0774 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0774" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0765 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0765" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0529 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0529" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0533 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0533" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0531 vom 2022-02-15", "url": "https://access.redhat.com/errata/RHSA-2022:0531" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0592 vom 2022-02-22", "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0622 vom 2022-02-22", "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-026 vom 2022-02-25", "url": "https://downloads.avaya.com/css/P8/documents/101080640" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0712 vom 2022-03-01", "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0718 vom 2022-03-01", "url": "https://access.redhat.com/errata/RHSA-2022:0718" } ], "source_lang": "en-US", "title": "Google Android Patchday Dezember 2020", "tracking": { "current_release_date": "2023-05-30T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:07:42.540+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-2387", "initial_release_date": "2020-12-15T23:00:00.000+00:00", "revision_history": [ { "date": "2020-12-15T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-12-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von BlackBerry aufgenommen" }, { "date": "2020-12-27T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-02-14T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-03-01T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-03-08T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-04-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-04-08T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-05-09T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2021-05-24T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-05-25T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-15T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-27T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-03-01T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-21T23:00:00.000+00:00", "number": "17", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-05-30T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE und IBM aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Google Android 8.0", "product": { "name": "Google Android 8.0", "product_id": "344177", "product_identification_helper": { "cpe": "cpe:/o:google:android:8.0" } } }, { "category": "product_name", "name": "Google Android 8.1", "product": { "name": "Google Android 8.1", "product_id": "407131", "product_identification_helper": { "cpe": "cpe:/o:google:android:8.1" } } }, { "category": "product_name", "name": "Google Android 10", "product": { "name": "Google Android 10", "product_id": "560061", "product_identification_helper": { "cpe": "cpe:/o:google:android:10.0" } } }, { "category": "product_name", "name": "Google Android 9", "product": { "name": "Google Android 9", "product_id": "T012696", "product_identification_helper": { "cpe": "cpe:/o:google:android:9" } } }, { "category": "product_name", "name": "Google Android 11", "product": { "name": "Google Android 11", "product_id": "T017166", "product_identification_helper": { "cpe": "cpe:/o:google:android:11" } } } ], "category": "product_name", "name": "Android" } ], "category": "vendor", "name": "Google" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Security Guardium 11.4", "product": { "name": "IBM Security Guardium 11.4", "product_id": "1076561", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.4" } } }, { "category": "product_name", "name": "IBM Security Guardium 11.5", "product": { "name": "IBM Security Guardium 11.5", "product_id": "T026399", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:11.5" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "BlackBerry BlackBerry", "product": { "name": "BlackBerry BlackBerry", "product_id": "1321", "product_identification_helper": { "cpe": "cpe:/h:rim:blackberry:-" } } } ], "category": "vendor", "name": "rim" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16862", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2018-16862" }, { "cve": "CVE-2019-19535", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2019-19535" }, { "cve": "CVE-2019-20812", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0016", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0016" }, { "cve": "CVE-2020-0019", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0019" }, { "cve": "CVE-2020-0099", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0099" }, { "cve": "CVE-2020-0202", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0202" }, { "cve": "CVE-2020-0244", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0244" }, { "cve": "CVE-2020-0280", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0280" }, { "cve": "CVE-2020-0294", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0294" }, { "cve": "CVE-2020-0368", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0368" }, { "cve": "CVE-2020-0440", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0440" }, { "cve": "CVE-2020-0444", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0455", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0455" }, { "cve": "CVE-2020-0456", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0456" }, { "cve": "CVE-2020-0457", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0457" }, { "cve": "CVE-2020-0458", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0458" }, { "cve": "CVE-2020-0459", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0459" }, { "cve": "CVE-2020-0460", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0460" }, { "cve": "CVE-2020-0463", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0463" }, { "cve": "CVE-2020-0464", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0464" }, { "cve": "CVE-2020-0465", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0467", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0467" }, { "cve": "CVE-2020-0468", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0468" }, { "cve": "CVE-2020-0469", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0469" }, { "cve": "CVE-2020-0470", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0470" }, { "cve": "CVE-2020-0473", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0473" }, { "cve": "CVE-2020-0474", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0474" }, { "cve": "CVE-2020-0475", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0475" }, { "cve": "CVE-2020-0476", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0476" }, { "cve": "CVE-2020-0477", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0477" }, { "cve": "CVE-2020-0478", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0478" }, { "cve": "CVE-2020-0479", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0479" }, { "cve": "CVE-2020-0480", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0480" }, { "cve": "CVE-2020-0481", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0481" }, { "cve": "CVE-2020-0482", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0482" }, { "cve": "CVE-2020-0483", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0483" }, { "cve": "CVE-2020-0484", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0484" }, { "cve": "CVE-2020-0485", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0485" }, { "cve": "CVE-2020-0486", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0486" }, { "cve": "CVE-2020-0487", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0487" }, { "cve": "CVE-2020-0488", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0488" }, { "cve": "CVE-2020-0489", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0489" }, { "cve": "CVE-2020-0490", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0490" }, { "cve": "CVE-2020-0491", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0491" }, { "cve": "CVE-2020-0492", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0492" }, { "cve": "CVE-2020-0493", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0493" }, { "cve": "CVE-2020-0494", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0494" }, { "cve": "CVE-2020-0495", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0495" }, { "cve": "CVE-2020-0496", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0496" }, { "cve": "CVE-2020-0497", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0497" }, { "cve": "CVE-2020-0498", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0498" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-0500", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-0500" }, { "cve": "CVE-2020-11119", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11119" }, { "cve": "CVE-2020-11136", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11136" }, { "cve": "CVE-2020-11137", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11137" }, { "cve": "CVE-2020-11138", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11138" }, { "cve": "CVE-2020-11139", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11139" }, { "cve": "CVE-2020-11140", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11140" }, { "cve": "CVE-2020-11143", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11143" }, { "cve": "CVE-2020-11144", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11144" }, { "cve": "CVE-2020-11145", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11145" }, { "cve": "CVE-2020-11146", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11146" }, { "cve": "CVE-2020-11148", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11148" }, { "cve": "CVE-2020-11149", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11149" }, { "cve": "CVE-2020-11150", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11150" }, { "cve": "CVE-2020-11151", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11151" }, { "cve": "CVE-2020-11152", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11152" }, { "cve": "CVE-2020-11167", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11167" }, { "cve": "CVE-2020-11179", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11179" }, { "cve": "CVE-2020-11183", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11183" }, { "cve": "CVE-2020-11185", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11185" }, { "cve": "CVE-2020-11197", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11197" }, { "cve": "CVE-2020-11200", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11200" }, { "cve": "CVE-2020-11212", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11212" }, { "cve": "CVE-2020-11213", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11213" }, { "cve": "CVE-2020-11214", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11214" }, { "cve": "CVE-2020-11215", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11215" }, { "cve": "CVE-2020-11216", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11216" }, { "cve": "CVE-2020-11217", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11217" }, { "cve": "CVE-2020-11225", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-11225" }, { "cve": "CVE-2020-13143", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-13143" }, { "cve": "CVE-2020-15802", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-15802" }, { "cve": "CVE-2020-25220", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-25220" }, { "cve": "CVE-2020-27021", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27021" }, { "cve": "CVE-2020-27023", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27023" }, { "cve": "CVE-2020-27024", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27024" }, { "cve": "CVE-2020-27025", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27025" }, { "cve": "CVE-2020-27026", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27026" }, { "cve": "CVE-2020-27027", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27027" }, { "cve": "CVE-2020-27028", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27028" }, { "cve": "CVE-2020-27029", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27029" }, { "cve": "CVE-2020-27030", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27030" }, { "cve": "CVE-2020-27031", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27031" }, { "cve": "CVE-2020-27032", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27032" }, { "cve": "CVE-2020-27033", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27033" }, { "cve": "CVE-2020-27034", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27034" }, { "cve": "CVE-2020-27035", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27035" }, { "cve": "CVE-2020-27036", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27036" }, { "cve": "CVE-2020-27037", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27037" }, { "cve": "CVE-2020-27038", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27038" }, { "cve": "CVE-2020-27039", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27039" }, { "cve": "CVE-2020-27040", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27040" }, { "cve": "CVE-2020-27041", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27041" }, { "cve": "CVE-2020-27043", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27043" }, { "cve": "CVE-2020-27044", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27044" }, { "cve": "CVE-2020-27045", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27045" }, { "cve": "CVE-2020-27046", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27046" }, { "cve": "CVE-2020-27047", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27047" }, { "cve": "CVE-2020-27048", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27048" }, { "cve": "CVE-2020-27049", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27049" }, { "cve": "CVE-2020-27050", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27050" }, { "cve": "CVE-2020-27051", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27051" }, { "cve": "CVE-2020-27052", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27052" }, { "cve": "CVE-2020-27053", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27053" }, { "cve": "CVE-2020-27054", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27054" }, { "cve": "CVE-2020-27055", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27055" }, { "cve": "CVE-2020-27056", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27056" }, { "cve": "CVE-2020-27057", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27057" }, { "cve": "CVE-2020-27066", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27066" }, { "cve": "CVE-2020-27067", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27067" }, { "cve": "CVE-2020-27068", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-27068" }, { "cve": "CVE-2020-3685", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3685" }, { "cve": "CVE-2020-3686", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3686" }, { "cve": "CVE-2020-3691", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2020-3691" }, { "cve": "CVE-2022-42543", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2022-42543" }, { "cve": "CVE-2022-42544", "notes": [ { "category": "description", "text": "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausf\u00fchrung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeif\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399" ] }, "release_date": "2020-12-15T23:00:00Z", "title": "CVE-2022-42544" } ] }
gsd-2020-11148
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-11148", "description": "Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", "id": "GSD-2020-11148" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-11148" ], "details": "Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", "id": "GSD-2020-11148", "modified": "2023-12-13T01:22:06.459062Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2020-11148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", "version": { "version_data": [ { "version_value": "APQ8017, APQ8053, MSM8917, MSM8953, PM215, PM3003A, PM439, PM6125, PM6150, PM6150A, PM6150L, PM6350, PM640A, PM640L, PM640P, PM660, PM660L, PM670, PM670L, PM7150A, PM7150L, PM7250, PM7250B, PM7350C, PM8008, PM8009, PM8150A, PM8150B, PM8150C, PM8150L, PM8250, PM8350, PM8350B, PM8350BH, PM8350BHS, PM8350C, PM855, PM855B, PM855L, PM8916, PM8937, PM8953, PMI632, PMI8937, PMI8952, PMK7350, PMK8002, PMK8003, PMK8350, PMM8195AU, PMM855AU, PMR525, PMR735A, PMR735B, PMX55, QAT3514, QAT3516, QAT3518, QAT3519, QAT3522, QAT3550, QAT3555, QAT5515, QAT5516, QAT5522, QAT5533, QAT5568, QBT1500, QBT2000, QCA6390, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCS605, QDM2301, QDM2302, QDM2305, QDM2307, QDM2308, QDM2310, QDM3301, QDM3302, QDM4643, QDM4650, QDM5579, QDM5620, QDM5621, QDM5650, QDM5652, QDM5670, QDM5671, QDM5677, QDM5679, QET4101, QET5100, QET5100M, QET6100, QET6110, QFE2101, QFE2520, QFE2550, QFE3340, QFE4301, QFE4302, QFE4303, QFE4305, QFE4308, QFE4309, QFE4320, QFE4373FC, QFS2530, QFS2580, QFS2608, QFS2630, QLN4642, QLN4650, QLN5020, QLN5030, QLN5040, QPA2625, QPA4360, QPA4361, QPA5373, QPA5461, QPA5580, QPA5581, QPA6560, QPA8673, QPA8686, QPA8801, QPA8802, QPA8803, QPA8821, QPA8842, QPM4621, QPM4630, QPM4640, QPM4641, QPM4650, QPM5621, QPM5641, QPM5658, QPM5670, QPM5677, QPM5679, QPM5870, QPM5875, QPM6582, QPM6585, QPM6621, QPM6670, QPM8820, QPM8830, QPM8870, QPM8895, QSM7250, QSW6310, QSW8573, QSW8574, QTC410S, QTC800H, QTC801S, QTM525, Qualcomm215, SA6155P, SA8150P, SA8155, SA8195P, SD429, SD439, SD632, SD665, SD675, SD690 5G, SD750G, SD765, SD765G, SD768G, SD855, SD865 5G, SD888 5G, SDA429W, SDM429W, SDR660, SDR660G, SDR735, SDR735G, SDR8250, SDR865, SDX55, SDX55M, SDXR1, SDXR2 5G, SM7250P, SM7350, SMB1351, SMB1355, SMB1358, SMB1360, SMB1381, SMB1390, SMB1394, SMB1395, SMB1396, SMB1398, SMR525, SMR526, SMR545, SMR546, WCD9326, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN6740, WCN6850, WCN6851, WCN6856, WGR7640, WSA8810, WSA8815, WSA8830, WSA8835, WTR2955, WTR2965, WTR3925" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free Issue in Bluetooth Host" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm215:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm3003a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm439:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6125:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6150:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6150a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6150l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm6350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm640a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm640l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm640p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm670l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7150a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7150l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7250b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm7350c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8008:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8009:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8150a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8150b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8150c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8150l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350bh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350bhs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8350c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pm8953:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmi8937:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmi8952:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmk7350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmk8002:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmk8003:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmk8350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmm8195au:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmm855au:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmr525:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmr735a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmr735b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:pmx55:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3516:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3518:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3519:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat3555:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5515:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5516:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5522:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5533:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qat5568:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2301:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2302:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2305:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2307:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2308:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm2310:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm3301:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm3302:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm4643:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm4650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5579:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5621:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5652:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5671:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5677:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qdm5679:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet6100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qet6110:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe2101:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe2520:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe2550:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe3340:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4301:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4302:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4303:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4305:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4308:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4309:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfe4373fc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfs2530:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfs2580:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfs2608:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qfs2630:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln4642:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln4650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln5020:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln5030:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qln5040:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa2625:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa4361:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa5373:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa5461:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa5580:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa5581:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa6560:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8673:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8686:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8801:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8802:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8803:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8821:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpa8842:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4621:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4630:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4640:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4641:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm4650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5621:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5641:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5658:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5677:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5679:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5870:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm5875:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm6582:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm6585:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm6621:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm6670:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm8820:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm8830:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm8870:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qpm8895:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qsm7250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qsw6310:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qsw8574:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qtc410s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qtm525:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd6905g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd8655g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sd8885g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr660g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr735:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr735g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr8250:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdr865:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sdxr25g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:sm7350:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1358:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1360:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1394:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1395:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1396:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smb1398:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smr525:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smr526:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smr545:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:smr546:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wtr2955:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security.cna@qualcomm.com", "ID": "CVE-2020-11148" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9 } }, "lastModifiedDate": "2021-01-29T19:18Z", "publishedDate": "2021-01-21T10:15Z" } } }
ghsa-3wqp-fp8q-5rmq
Vulnerability from github
Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
{ "affected": [], "aliases": [ "CVE-2020-11148" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-01-21T10:15:00Z", "severity": "HIGH" }, "details": "Use after free issue in HIDL while using callback to post event in Rx thread when internal mutex is not acquired and meantime close is triggered and callback instance is deleted in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", "id": "GHSA-3wqp-fp8q-5rmq", "modified": "2022-05-24T17:39:59Z", "published": "2022-05-24T17:39:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11148" }, { "type": "WEB", "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin" }, { "type": "WEB", "url": "https://www.qualcomm.com/company/product-security/bulletins/december-2020-security-bulletin" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.