{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T17:22:31.606","vulnerabilities":[{"cve":{"id":"CVE-2019-14104","sourceIdentifier":"product-security@qualcomm.com","published":"2020-04-16T11:15:14.933","lastModified":"2024-11-21T04:26:06.007","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Slab-out-of-bounds access can occur if the context pointer is invalid due to lack of null check on pointer before accessing it in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, SC8180X, SDX55, SM8150"},{"lang":"es","value":"Un acceso fuera de límites del bloque puede ocurrir si el puntero context no es válido debido a una falta de comprobación de null sobre el puntero antes de acceder a él en los productos Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile en versiones APQ8053, SC8180X, SDX55, SM8150."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:N/A:C","baseScore":6.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":9.2,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"B052615D-857A-46D4-9098-1CBFA14687C6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*","matchCriteriaId":"19B59B60-A298-4A56-A45A-E34B7AAB43D7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"30A45C1A-C921-42B5-9237-367245023B45"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*","matchCriteriaId":"56C9D979-F214-4CD4-8CF9-43BC804BB179"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"E93FB34B-3674-404D-9687-E092E9A246AB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*","matchCriteriaId":"F3FF5A9A-A34A-499C-B6E0-D67B496C5454"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"9286B1E8-E39F-4DAA-8969-311CA2A0A8AA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*","matchCriteriaId":"19B9AE36-87A9-4EE7-87C8-CCA2DCF51039"}]}]}],"references":[{"url":"https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin","source":"product-security@qualcomm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}