diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4445.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4445.json index ac53843405b..aff7ed13c73 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4445.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4445.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4445", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:10.193", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T18:13:11.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,26 +71,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.2", + "matchCriteriaId": "A9A9D95F-8EA9-45DF-9E96-A943C7FC2389" + } + ] + } + ] + } + ], "references": [ { "url": "https://ithemes.com/blog/wordpress-vulnerability-report-september-2021-part-2/#ib-toc-anchor-2", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2590819%40premium-addons-for-elementor&new=2590819%40premium-addons-for-elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/premium-addons-for-elementor/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wpscan.com/vulnerability/2e5b3608-1dfc-468f-b3ae-12ce7c25ee6c", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cffb26bc-3d3f-4593-bb36-d2abcd67861e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42248.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42248.json index de19707172a..dbf084bea2e 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42248.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42248.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42248", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-06T22:15:09.763", - "lastModified": "2024-11-21T07:24:34.857", + "lastModified": "2025-03-06T17:15:13.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47474.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47474.json index fc4c4ea3d0b..ec6915ade60 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47474.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47474.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47474", "sourceIdentifier": "security@unisoc.com", "published": "2023-03-10T21:15:13.820", - "lastModified": "2024-11-21T07:32:02.217", + "lastModified": "2025-03-06T17:15:14.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47475.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47475.json index 268448684fa..282713f501a 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47475.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47475.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47475", "sourceIdentifier": "security@unisoc.com", "published": "2023-03-10T21:15:13.870", - "lastModified": "2024-11-21T07:32:02.330", + "lastModified": "2025-03-06T17:15:14.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47477.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47477.json index b34f7189e23..02b3d5448d3 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47477.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47477.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47477", "sourceIdentifier": "security@unisoc.com", "published": "2023-03-10T21:15:13.977", - "lastModified": "2024-11-21T07:32:02.597", + "lastModified": "2025-03-06T17:15:14.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47478.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47478.json index e4153abc84a..e0413fa810f 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47478.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47478.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47478", "sourceIdentifier": "security@unisoc.com", "published": "2023-03-10T21:15:14.030", - "lastModified": "2024-11-21T07:32:02.717", + "lastModified": "2025-03-06T17:15:14.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20623.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20623.json index 369b038f439..a4a2f77cb95 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20623.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20623.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20623", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:10.447", - "lastModified": "2024-11-21T07:41:14.633", + "lastModified": "2025-03-06T17:15:15.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20624.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20624.json index c41cf0d8989..2c771e1debc 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20624.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20624.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20624", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:10.503", - "lastModified": "2024-11-21T07:41:14.757", + "lastModified": "2025-03-06T17:15:15.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20625.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20625.json index a7bf21cf31f..37af1540518 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20625.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20625.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20625", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:10.560", - "lastModified": "2024-11-21T07:41:14.870", + "lastModified": "2025-03-06T17:15:15.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-662" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-662" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20626.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20626.json index cfaa2f8f2a9..b78d67d53c5 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20626.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20626.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20626", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:10.617", - "lastModified": "2024-11-21T07:41:14.990", + "lastModified": "2025-03-06T17:15:15.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20627.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20627.json index abeb9304a5c..b36c2a3c209 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20627.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20627.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20627", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:10.673", - "lastModified": "2024-11-21T07:41:15.110", + "lastModified": "2025-03-06T17:15:15.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-131" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20633.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20633.json index b7810fafdf3..a3ae9841b29 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20633.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20633.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20633", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:10.907", - "lastModified": "2024-11-21T07:41:15.570", + "lastModified": "2025-03-06T18:15:34.393", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-129" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20634.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20634.json index 9e8bb8c57de..2387ee35ff9 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20634.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20634.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20634", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:10.963", - "lastModified": "2024-11-21T07:41:15.690", + "lastModified": "2025-03-06T18:15:36.003", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20636.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20636.json index 5f5b15d02c3..4fe60158808 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20636.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20636.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20636", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.080", - "lastModified": "2024-11-21T07:41:15.943", + "lastModified": "2025-03-06T18:15:36.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20637.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20637.json index a23370cd04c..dd0b2eedd00 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20637.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20637.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20637", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.137", - "lastModified": "2024-11-21T07:41:16.050", + "lastModified": "2025-03-06T18:15:36.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20638.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20638.json index 1bfcc421d65..e67bc16b953 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20638.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20638.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20638", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.200", - "lastModified": "2024-11-21T07:41:16.160", + "lastModified": "2025-03-06T18:15:36.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20639.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20639.json index 848585716b1..8210e77f4d0 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20639.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20639.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20639", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.270", - "lastModified": "2024-11-21T07:41:16.273", + "lastModified": "2025-03-06T18:15:37.287", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20640.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20640.json index b62a15802eb..31785b7f0f7 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20640.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20640.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20640", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.337", - "lastModified": "2024-11-21T07:41:16.397", + "lastModified": "2025-03-06T18:15:37.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20641.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20641.json index 5ee16b6f90b..8384812d515 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20641.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20641.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20641", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.397", - "lastModified": "2024-11-21T07:41:16.507", + "lastModified": "2025-03-06T18:15:38.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20642.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20642.json index 601c7483109..e8165a854f3 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20642.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20642.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20642", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.457", - "lastModified": "2024-11-21T07:41:16.630", + "lastModified": "2025-03-06T18:15:38.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20643.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20643.json index 18c9a62d5f7..b5367c8497e 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20643.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20643.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20643", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.513", - "lastModified": "2024-11-21T07:41:16.737", + "lastModified": "2025-03-06T18:15:39.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20644.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20644.json index 8d643f940e9..d7c1ee04845 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20644.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20644.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20644", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.570", - "lastModified": "2024-11-21T07:41:16.850", + "lastModified": "2025-03-06T18:15:40.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20651.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20651.json index bae080e78d7..75744c5911e 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20651.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20651.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20651", "sourceIdentifier": "security@mediatek.com", "published": "2023-03-07T21:15:11.957", - "lastModified": "2024-11-21T07:41:17.647", + "lastModified": "2025-03-06T17:15:16.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json index 010c6007522..452b2de9a5b 100644 --- a/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json +++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22101", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-10-17T22:15:15.033", - "lastModified": "2024-11-21T07:44:16.653", + "lastModified": "2025-03-06T17:15:16.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json index bb19dba6197..c281f710fdf 100644 --- a/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json +++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22102", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-10-17T22:15:15.100", - "lastModified": "2024-11-21T07:44:16.763", + "lastModified": "2025-03-06T17:15:16.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22335.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22335.json index e9fc22c9929..91ab60351a8 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22335.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22335.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22335", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-03-06T00:15:10.350", - "lastModified": "2024-11-21T07:44:35.147", + "lastModified": "2025-03-06T17:15:16.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22847.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22847.json index b70f490f7b0..2bda88d00b5 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22847.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22847.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22847", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-03-07T01:15:10.300", - "lastModified": "2024-11-21T07:45:30.923", + "lastModified": "2025-03-06T17:15:16.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23554.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23554.json index 46df6b939a2..fe3632d192f 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23554.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23554.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23554", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-03-07T01:15:10.363", - "lastModified": "2024-11-21T07:46:24.613", + "lastModified": "2025-03-06T17:15:16.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24780.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24780.json index 3ad638c3f8f..fc407cd4946 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24780.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24780.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24780", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-08T00:15:08.937", - "lastModified": "2024-11-21T07:48:24.097", + "lastModified": "2025-03-06T18:15:40.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24781.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24781.json index e0d3e2d697f..f9a21e7e549 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24781.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24781.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24781", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-07T15:15:11.247", - "lastModified": "2024-11-21T07:48:24.223", + "lastModified": "2025-03-06T18:15:40.553", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26954.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26954.json index 4b2e01217c5..4fa6954110d 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26954.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26954.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26954", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-07T13:15:10.257", - "lastModified": "2024-11-21T07:52:06.593", + "lastModified": "2025-03-06T18:15:40.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27567.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27567.json index 78269bbcdad..0e32537e138 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27567.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27567.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27567", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T22:15:10.067", - "lastModified": "2024-11-21T07:53:09.820", + "lastModified": "2025-03-06T17:15:17.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27574.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27574.json index ae7b2ed7f62..be6b5843d11 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27574.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27574.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27574", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T22:15:10.147", - "lastModified": "2024-11-21T07:53:10.753", + "lastModified": "2025-03-06T17:15:17.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12742.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12742.json new file mode 100644 index 00000000000..e7949857e14 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12742.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-12742", + "sourceIdentifier": "security@ni.com", + "published": "2025-03-06T17:15:17.740", + "lastModified": "2025-03-06T17:15:17.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A deserialization of untrusted data vulnerability exists in NI G Web Development Software that may result in arbitrary code execution.\u202f Successful exploitation requires an attacker to get a user to open a specially crafted project file.\u202f This vulnerability affects G Web Development Software 2022 Q3 and prior versions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NO", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/deserialization-of-untrusted-data-vulnerability-in-ni-g-web-deve.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13469.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13469.json index 39c56ceea18..e191022c987 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13469.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13469.json @@ -2,20 +2,24 @@ "id": "CVE-2024-13469", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:09.823", - "lastModified": "2025-02-28T09:15:09.823", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:54.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Pricing Table by PickPlugins plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button Link in all versions up to, and including, 1.12.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Pricing Table de PickPlugins para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del enlace del bot\u00f3n en todas las versiones hasta la 1.12.10 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pickplugins:pricing_table:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.12.10", + "matchCriteriaId": "DB607E9A-E179-4920-94DE-AB718F889754" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/pricingtable/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5239c414-cd1d-4257-9f8e-e7a92c2119f9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13638.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13638.json index 4661f166c22..3884ccbe516 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13638.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13638.json @@ -2,20 +2,24 @@ "id": "CVE-2024-13638", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:10.043", - "lastModified": "2025-02-28T09:15:10.043", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:54.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Order Attachments for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.1 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments added to orders." + }, + { + "lang": "es", + "value": "El complemento Order Attachments for WooCommerce para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.5.1 incluida a trav\u00e9s del directorio 'uploads'. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads, que puede contener archivos adjuntos agregados a los pedidos." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,20 +69,57 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:directsoftware:order_attachments_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.5.1", + "matchCriteriaId": "562F2F64-AE9F-466C-A288-464B5164B9B4" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/order-attachments-for-woocommerce/trunk/src/WCOA/Attachments/Attachment.php#L87", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/order-attachments-for-woocommerce/trunk/src/WCOA/Utils/Ajax.php#L61", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e98b1ef-70dd-408d-8644-08933bca1cdd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13716.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13716.json index 59d4f980150..b42e28d1976 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13716.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13716.json @@ -2,19 +2,43 @@ "id": "CVE-2024-13716", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:10.223", - "lastModified": "2025-02-28T09:15:10.223", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:54.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Forex Calculators plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_settings_callback() function in all versions up to, and including, 1.3.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento Forex Calculators para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n ajax_settings_callback() en todas las versiones hasta la 1.3.5 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n del complemento." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -45,16 +69,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tarbor:forex_calculators:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.8", + "matchCriteriaId": "5544AEAA-B299-4A9F-B470-A269997EE115" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/fx-calculators/tags/1.3.5/forex-calculators.php#L101", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49ce8ca1-c1ae-4dda-909e-70c3b6d2b561?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13831.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13831.json index 971a500bc9d..21fa3bf973a 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13831.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13831.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13831", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:10.400", - "lastModified": "2025-02-28T09:15:10.400", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:54.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Tabs for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.0 via deserialization of untrusted input in the 'product_has_custom_tabs' function. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + }, + { + "lang": "es", + "value": "El complemento Tabs for WooCommerce para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta la 1.0.0 incluida, a trav\u00e9s de la deserializaci\u00f3n de entradas no confiables en la funci\u00f3n 'product_has_custom_tabs'. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador de tienda y superior, inyecten un objeto PHP. No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo seg\u00fan la cadena POP presente." } ], "metrics": { @@ -45,16 +49,49 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbranch:tabs_for_woocommerce:1.0.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "BCFDDBCD-0A62-4A84-8AC8-36D548EAFF75" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wc-tabs/trunk/wc-tabs-lite.php#L363", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/790a2c64-b358-41ed-be17-f2b99d294617?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13832.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13832.json index 2dda385ffcb..8fd2be1ffb8 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13832.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13832.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13832", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:10.570", - "lastModified": "2025-02-28T09:15:10.570", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:54.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ultra Addons Lite for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.1.8 via the 'ut_elementor' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento Ultra Addons Lite para Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.1.8 incluida a trav\u00e9s del c\u00f3digo abreviado 'ut_elementor' debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden incluir. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones protegidas con contrase\u00f1a, privadas o en borrador a las que no deber\u00edan tener acceso." } ], "metrics": { @@ -45,16 +49,50 @@ "value": "CWE-639" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:uncodethemes:ultra_addons_lite_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.8", + "matchCriteriaId": "C862A491-1577-445A-AD47-DF0E8C6ABE97" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ut-elementor-addons-lite/trunk/includes/queries.php#L506", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/476883a8-c258-477b-99d3-f35423d7a312?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13851.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13851.json index 220fc75f30c..aabfae23011 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13851.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13851.json @@ -2,20 +2,24 @@ "id": "CVE-2024-13851", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:10.733", - "lastModified": "2025-02-28T09:15:10.733", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:54.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Modal Portfolio plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.7.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Modal Portfolio para WordPress es vulnerable a cross site scripting almacenado en todas las versiones hasta la 1.7.4.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de administrador o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a instalaciones multisitio e instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -45,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:internet-formation:modal_portfolio:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.7.4.2", + "matchCriteriaId": "4670F315-266A-42A7-863A-F354F1995239" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/modal-portfolio/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc049cab-6793-4656-9b17-8ca64c566c4c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42844.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42844.json index 74d6e39fa83..b291628deb0 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42844.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42844.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42844", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-06T15:15:15.800", - "lastModified": "2025-03-06T15:15:15.800", + "lastModified": "2025-03-06T17:15:18.793", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n SQL en EPICOR Prophet 21 (P21) hasta la versi\u00f3n 23.2.5232. Esta vulnerabilidad permite a atacantes remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s de campos de entrada de usuario no depurados para obtener informaci\u00f3n no autorizada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/getHecked/dc4ae46526d181d3deb17092815b9bec", diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43056.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43056.json index a2eeea107d7..c33fcd08ee2 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43056.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43056.json @@ -2,20 +2,24 @@ "id": "CVE-2024-43056", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:11.787", - "lastModified": "2025-03-03T11:15:11.787", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS during hypervisor virtual I/O operation in a virtual machine." + }, + { + "lang": "es", + "value": "DOS transitorio durante la operaci\u00f3n de E/S virtual del hipervisor en una m\u00e1quina virtual." } ], "metrics": { "cvssMetricV31": [ { "source": "product-security@qualcomm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 } ] }, @@ -45,12 +69,5211 @@ "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63C2ACAC-BCDC-4453-99C4-56868172ACB0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2321AF41-BFED-4567-B61D-EEB445C92511" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:*:*:*:*:*:*:*:*", + "matchCriteriaId": "353DE282-A541-4E6C-90B9-D79D36E179A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "279C3F0E-56E1-4878-9F02-5B71FD356D4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C4096902-AAA2-4CD4-863F-DFCB9D5A2887" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "84CB74A6-63D9-40FA-AC10-0DFF308E4605" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2534DFE0-C26E-4422-B788-DB0A6C3D27A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "883AB62A-ABD3-4482-9C3C-1CB9CC6C6403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE8BDAAA-B7E1-496B-9F72-791D9A516DF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE078A8-1117-4713-A276-1E9599EF7E3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs9100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "057E49CC-28C0-4A82-A895-6E681AB1E22F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs9100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D123577F-6BEA-400B-B608-97ADD28357C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A81C45-B22A-4B56-BC8E-6ED38186A178" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1010:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69547D69-1A27-4094-BAB6-191E6D319F83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1110:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A2671726-93CB-40D8-B2B8-F6FD011DB95F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1210:*:*:*:*:*:*:*:*", + "matchCriteriaId": "521067A5-E74A-43E6-8321-527C7716FE75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1010:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F7BAB034-67C5-45B8-B6E3-60C54C355F36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1011:*:*:*:*:*:*:*:*", + "matchCriteriaId": "26D532E2-FF3F-4115-B8F6-DE6C87207A9E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:*:*:*:*:*:*:*:*", + "matchCriteriaId": "339B1A30-B78C-4A19-BF37-C402B54D86A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69944B37-CCD1-470B-A766-170948AC0AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65307900-11B4-4374-9656-462DC8059048" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1032:*:*:*:*:*:*:*:*", + "matchCriteriaId": "62CBDF54-2DE7-423F-9974-7741D1361AC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1052:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9165360C-256C-48CB-8239-DA589F33B140" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1062:*:*:*:*:*:*:*:*", + "matchCriteriaId": "982C1E0F-E564-4234-8997-E294706E3E9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A314357F-9D15-4645-ABC5-5AA641C37B3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86E9A547-9F3D-453E-B338-01F4D47479A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01264215-1B23-4406-B5A2-2C0A7B4E9937" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9DACF4-308F-438A-A578-5965402A1CD8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80710FCC-C0AE-43AD-8AFD-728E7CBD6CE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A90E5001-D8BF-4D38-8C7E-3DA37000560C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8380xp:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C6E486C5-1567-4C1B-B01C-02F6A331CBC9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "51F9A779-2DFF-46A8-BFC4-C6A2F3A9C624" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D5E6782E-CC46-450B-B0DD-B17D9EA7BD51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4E8A5620-161F-45EF-B40C-C8383591FE19" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966CDA56-809F-4FF4-909D-0DD92F44CF67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6335:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C53983C6-9CA5-4B1B-9025-210956F07B88" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3108B9-9A5F-4FE9-9E22-13B7A7EDE3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D144B580-1D35-45C5-BC23-0DF4BC466D9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:*:*:*:*:*:*:*:*", + "matchCriteriaId": "351FE14B-CB15-4A9F-9CB7-356C48CB6E92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F84AABA5-6C93-43E8-A4C6-D3C892D735CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "909A12CE-67B6-4C98-8562-26EEC578C2E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19843BB0-DA51-481D-8135-F570E7CD23AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F1013-B90A-4F20-8643-6F079002257D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "00663346-5CF1-4901-9AA9-39B4E6B71778" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A342D02-01FD-4497-ADB2-2E7F6F9CF3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E253913-B6A1-4066-B60B-951BEE92EF6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C613D1E-71EE-4730-A388-C1A38921D1DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5EAE2E0F-A4FF-4432-B455-E27BA359DD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "759D3B14-4D4D-4B76-8F7F-C3B2ED03CE3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C59CBE82-96D8-402D-B313-34948D75D703" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F0C8EF72-8147-408B-B0B6-B75A962A021B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9900E07-69F3-4C20-8211-513760BF7F9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A08879B4-D5E7-426A-A4EC-70E05605E378" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "358ADECD-A006-4444-9EE3-0CF33962DEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B2984B8-0632-48B1-A510-FEB2D4AF33F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9BF5D5A3-E22F-4F0A-B53E-8A66C2ED808E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:*:*:*:*:*:*:*:*", + "matchCriteriaId": "374E91E7-4375-4EAF-9718-7FB2B94EE60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F62D8EF1-71CC-4F40-ADA5-E9835277BF7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D44F7AE4-A114-4DFF-884F-EE121D5767A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69C4B0CC-F50D-4793-B638-2B1C99433B6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D48FCEB1-2D84-4749-A41D-76DB2F2EDDA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B074E7F1-6317-42D1-8468-7A5B3D1F59B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19220ED5-7A56-4B03-B4A5-4FF520670ED6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFC9FA-E6EF-44C5-BD50-2824C7711541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6450:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE831E17-AC45-4C39-9075-49FC7DB7E77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B39273DF-FD6F-4D01-821E-BC5EE26FD502" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFC5073D-4EC8-46DB-BB16-C4A73820934A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E54B5E4-F43F-4779-89CF-B77DD7CF956C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80EFF1CA-03DD-4E81-BAFA-77B5BD67EE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "788C622C-6D7D-4276-8E9E-833D5596908E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D1A7C-537F-458B-BA56-A11F95E36EA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8cx:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D84CEFE8-B491-46E5-98D5-D598C4E3E015" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd670:*:*:*:*:*:*:*:*", + "matchCriteriaId": "24D548CA-593C-485C-A660-100A37EC5D5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "06FF6F86-28E4-45B6-871B-A5DDB331F3E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:*:*:*:*:*:*:*:*", + "matchCriteriaId": "92DBF43F-06EB-4E92-80AC-B5A002B7B322" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8511C0-4BF6-45B6-8383-C722C2528CAA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AFB1F551-5ABB-40D7-B4BF-E1913AB25C92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx57m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3716039D-2947-4F74-ADB9-1BFDD5AD0E28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx80m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CAE7C89-05DD-4083-9DCE-68E02F77EA69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx80m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BE13DE5E-BCEB-4C85-9B08-C76F486A266A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E4D58719-033C-4671-8E50-6012D173D5D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE676369-CC9C-4A16-A477-188240861747" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "036F5630-A224-4C27-98E3-F7618FAB3567" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "37D06270-BBE2-4C97-9F5F-51EEA79AD8D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D415D6A4-5586-4A9F-8F9C-BFA733A4A3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33A13707-4866-4016-BAAA-100C16E3F267" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2293C7B3-FB54-41C9-86B1-A9E175111BCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B8E47A4-4558-43D4-8FFB-EAC5A643140A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A485B67-22C4-4906-BB3E-AA6A804D85D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D8919F90-252F-401B-8CB5-76CEEEFF89E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7C8F35-52E6-465A-A794-5B4E67A57DC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8650q:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1458A539-FA35-4E1A-B02C-9391F7262176" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96954CAA-5244-42BF-BCC8-1381D9C45CB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A094C515-42BB-4A54-B19E-F5375E5C2686" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D675A8D-0FB3-4B2F-9D60-0DBB521820D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_670:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BB065369-EE36-4273-8168-0E6D0FD72B7F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6976CA-9019-4B8A-84B1-58F73A0E2673" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "618CBEBD-0B1D-4A98-B4E6-1CFC10707A8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FDD354-0044-4BD2-B1B9-B89BE040070D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_678:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FCCD21-39FC-4B68-89E0-B3A9F4B1A932" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D8D5607-F0BC-46C9-A94F-1D28EE5A3F0E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8942236-F6DC-4769-89A7-7001093BC234" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F4659B0-547B-4492-9338-90B45B0462FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D579F9FE-7B00-4B19-A9A5-4A2AE9B101D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9D188A-2029-431E-A225-302C7795B891" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "741B4512-2150-4E92-A12F-A3CFBF5717D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28CDE5F9-947E-4EEC-810A-1105060738AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8A598302-1AA1-4D76-A852-700D06DD2296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7504F41-E4C8-4C43-AA65-C7F67C01E105" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC5DBF41-E232-48D5-AE56-BA2B758B38D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C03E2E4E-A9AD-411A-ABB7-7E87F44D37E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A03C0F57-B266-463B-813F-B6D055AB944A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C36C7F9-2C63-46A0-A8B7-AB6225229255" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B401D1A9-E930-42EF-B2C2-6D4C547311D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA1D0BD4-DF9A-41DC-8A96-E021F0A72102" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_850:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0903633-75B5-48D9-BD6C-8E66B0EE1D00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5501670-56E2-48B6-ACFC-67F908D5ECCA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D284823-94B0-4DEA-8473-19FE88DC67B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06165461-2AA0-4306-8F72-C8F6A9D5113A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+:*:*:*:*:*:*:*:*", + "matchCriteriaId": "083BEE0F-BE6D-4CE7-A0A3-79CDAAE24EB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47D193F3-8369-4253-B46A-07DC2D4CC19D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D30E2C95-7B82-42C9-B1D2-0E9379321C7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "713B1CB7-985F-49F4-A5A7-23DFD0F4EA04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "35E751E0-C81B-4B77-A639-5C1C177BF303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CC661443-FF57-4303-9609-307F103DC5A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5B9E4C73-9B08-4D2D-842F-390FE1DB162B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB133AD-4616-4B0E-82D3-6F579F871D84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3CEBEDFD-EF7F-4A35-8042-D0C04AAB89BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C520263-AE1E-42FF-8F93-9BB2ACC2882B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "648B2096-82C9-4698-A7F4-F9BD786BAACC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2802A422-CCEA-4634-B164-09AC35C00C2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x-ad:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9B751EDD-6207-42D4-816A-CD8866A4600A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7EB4CA4-CEAF-4D8C-AE28-5373CC5E46D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-ad:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D44D34DB-517C-4B6A-BDED-90A4952DF91E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x-aaab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "328838FB-9338-4BB1-8492-9F3E6628F105" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x-aaab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "72DA5C37-DFE1-4E9B-93DB-31CE39F28DE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-acaf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "360E939C-2089-4402-9D72-EF3014EBB330" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-acaf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A730E8CB-D55F-4CE3-9F7B-75A016332915" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180x-acaf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84B9DA10-0264-4226-AA31-B5C7DAEA8BB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180x-acaf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "96C7A7EA-C4BC-4AF6-95B2-77722848A2FD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8180xp-aaab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04274F69-E871-4EEC-A66B-698048D00225" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8180xp-aaab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B2A2CAB9-B3D8-4BA3-AA82-C9D8EF599A58" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8280xp-abbb_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7EA3A08-8624-4B78-AD75-828A3DF4CC52" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8280xp-abbb:*:*:*:*:*:*:*:*", + "matchCriteriaId": "251E7CBF-8932-4EAE-B531-35AECFDEABD4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1__firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "586F22DE-0DF7-4F72-BF93-E27636B53E3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1_:*:*:*:*:*:*:*:*", + "matchCriteriaId": "597B5B49-C3E9-49B7-AEA8-69461953D57B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1__firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8120890-88C1-4DCF-9E2C-AE2289737002" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E37EF3A1-40B8-4260-BB23-AA624890226C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D277C7D-A04F-4DD2-B0A9-5CFC2F3AAEAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+__firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5CA32DC-F54A-41ED-9ED6-12E510651861" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+_:*:*:*:*:*:*:*:*", + "matchCriteriaId": "854EEBDC-B0AC-4CC5-BB08-1C10E8C0878F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x24_lte_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16777702-41D2-40FC-9DF5-611E69A68E7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x24_lte:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF4879FA-CAEE-4889-A150-3ED3D6995DC1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF17BE73-08FC-46C8-8C20-5A72E97AD077" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B31855B3-E8D9-412D-AB79-E568E462DE84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9C56B06-3D58-4720-835F-103C404D109E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DFDFD257-3F86-40F4-8B9F-C42CAAD09553" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "504FAFDF-7D53-4495-A0E0-4051AEA2BC31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x62_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43D86C99-E647-4800-A86A-F3207D9D9479" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x62_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "71F6BB4B-3475-4B59-AC34-3680E87C26BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "193DA42A-82EE-4536-A4B4-B6ED03F0D0D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC4E695-278F-4A4B-BB0E-E6EFDCB125E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5338CA14-E28C-4AEC-98D1-DC6C57957FCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4291ACCE-22E9-40AB-81C6-BF9E8F5C0504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "597D0A13-2CA6-4DF4-8684-551B31889CF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9905B493-4C70-45D2-BBF8-69DB60CEFAF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g__firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7217BAC3-2B89-4C9F-B985-A0B3D56E8C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B7F0DC63-9D46-49E0-A214-7506D0F66F15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F11BC3C1-993F-42CE-AA2B-41A531CDDCAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0BC123B4-C1F1-4391-8ED7-CD6CE4CFABAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "508D9A36-1928-44D8-9957-E4281D87301B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB89808-3037-489D-BDB3-B8F5CF0ED3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D80271-D460-47D7-A52E-93D58BB47ABD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D2CEB90-83F6-4A96-A666-18F81533F67D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:talynplus:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BD582373-558B-4DC8-8862-7BF2670262AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_300__firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB5E393A-17A9-4F8F-A563-6E61F8D616CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_300_:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AD5F7034-767F-4547-833F-1ADA3CC2399C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400__firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21B8335D-A28D-4694-910C-6E4C324F7DBD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400_:*:*:*:*:*:*:*:*", + "matchCriteriaId": "27BC7797-88D1-40BF-9CD3-29028F48E375" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4528A5B4-A537-4707-8FF8-C9A304776DFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6E1283-5F67-435C-82B7-6D98BC61A3A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82D516CF-045C-4AFB-9CFA-3BBA108F8426" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43057.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43057.json index d7ebf7836fa..16daf4a3ec9 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43057.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43057.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43057", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:11.970", - "lastModified": "2025-03-03T11:15:11.970", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while processing command in Glink linux." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al procesar comando en Glink Linux." } ], "metrics": { @@ -47,10 +51,4147 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:*:*:*:*:*:*:*:*", + "matchCriteriaId": "374E91E7-4375-4EAF-9718-7FB2B94EE60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C4096902-AAA2-4CD4-863F-DFCB9D5A2887" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C46FCBE-C6AC-4715-8E16-6B070A222452" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6402:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AAB72AB3-19CD-4AEC-90A5-ACAD0CE3A1CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1F6CC23-583C-4A6C-BB56-EE68CA4803DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6412:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DB64867B-54E6-4C44-B524-F71E4D60ACEB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48BBE3D5-9B42-444C-9119-DB282FAE98FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6422:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9DB2DA7-14F9-437F-BE7E-A4C70F8F8B08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B079570-EBBE-40B6-8C08-343CDA74DB04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6432:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B23C8FC3-8A30-46E9-B51B-95D079DE1A97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BCCFF8B-4857-439D-BD4A-EB35672F474B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86EC8DEC-F457-4A33-8A97-D6EDA77BA71A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5EA1B4C-510A-4D92-9BEC-6FAAD8EA227B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36A10EB2-E7A2-461F-836E-FC38B9428C98" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9022:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8B375453-CE1B-42F6-B34F-8F3E2147A245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAD1884-D549-4E40-BF84-A49C49BE2475" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C10CAAC-FD93-4116-9F0C-E983B3693FAF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9070:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7A385122-07F2-4DEF-8171-F69E916AD6A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "809FD84D-11C5-4EE3-B830-62CF5F6CB1BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9072:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8CF3DEBA-9853-4A49-AE39-17D2F9D56B48" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:*:*:*:*:*:*:*:*", + "matchCriteriaId": "77E784C6-1579-407F-B9D8-3DCDC83A97B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B31EEE9E-CDEC-4E88-B950-3413205E483E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9B69B965-D166-4899-9D64-F30C2875EC28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B0687D7-DD06-430F-8CD2-968D766E3491" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9160:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B773EE0-ADEA-493B-A5D8-22473EE3E169" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "84CB74A6-63D9-40FA-AC10-0DFF308E4605" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDD25AC-DCC7-4B9E-A852-B7D467901739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:*:*:*:*:*:*:*:*", + "matchCriteriaId": "065B25FE-2B77-4C60-9FB9-82D001BE4423" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69944B37-CCD1-470B-A766-170948AC0AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65307900-11B4-4374-9656-462DC8059048" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F929DF34-D0FF-4A77-91A9-7ED45EA1F303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4F674F1B-3A7E-448C-A64C-5FD143B4B68F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86E9A547-9F3D-453E-B338-01F4D47479A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5308653F-A89A-4FA8-BAB0-72300E4A6346" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qxm8083:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1E83935C-211B-4453-91D4-A1DF43F565B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CA20C890-AAB8-45FA-B525-82E0CFA175BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E917DC4-6881-4276-8A0C-2C90E844D1AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8511C0-4BF6-45B6-8383-C722C2528CAA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AFB1F551-5ABB-40D7-B4BF-E1913AB25C92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx65m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08C59BD9-8629-467F-9C1C-F2232C821DDB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx65m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "081BB625-9E1C-4366-A264-85F9AEDFF1B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "713B1CB7-985F-49F4-A5A7-23DFD0F4EA04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "35E751E0-C81B-4B77-A639-5C1C177BF303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CC661443-FF57-4303-9609-307F103DC5A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "244760FB-DB14-47B0-B301-0891F3ED3CB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CAA848-413D-4C63-823B-BFCE95C7740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csr8811:*:*:*:*:*:*:*:*", + "matchCriteriaId": "91A37878-9138-41A1-A4E7-464F759E6310" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "279C3F0E-56E1-4878-9F02-5B71FD356D4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0EF47C0-45AA-4B1C-B9E8-A83E5D9938F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fsm10056:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F51A45F1-06CF-4247-83F5-3C118DAC62CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fsm20055_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "873C7C42-9770-410A-A4CA-ABDC16F075A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fsm20055:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49681D7F-F21D-4F96-B1E0-834DF00BFEDF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fsm20056_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B74FD97-F1FE-4F1E-A858-B9293FB1AA4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fsm20056:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9407F0C-6839-4378-A680-A89B663D426D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_214_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C7CEC6E-D316-4A89-BB58-003C2E3369FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_214:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07D84A16-4C46-499E-B462-6F0008D62559" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_216_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "779827C5-93CF-45BE-827C-F8B4443AE302" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_216:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2EE8F06-C409-4E7A-A940-478CCA9F5033" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_316_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7FCC903-A4B0-4462-9D1D-9B7B767D4607" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_316:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BB627037-1909-4A5A-9EA8-D919062CF80A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_318_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87655E53-09B3-4BC0-8BB4-1E4F0FFAE15F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_318:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE91C94-3E76-4041-8846-AABB8571E1E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_3210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76575CA9-1AB3-4439-94CA-92BB5621BCBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_3210:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D75C4B25-803C-49F7-883C-69C0B4F41947" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:immersive_home_326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88A90EF6-B60A-4027-B301-C9A86CB096A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:immersive_home_326:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7536E36F-0889-4C75-8B8D-95F309EFDA61" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8543C671-054B-489F-ACFE-B7D7BEC1DEE6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5010:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1A75B34F-40D4-428C-8181-D8581E0F432B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AE3085F-59BE-46A0-9A96-65CFAB7DFEAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5028:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D9AFA453-E2F6-4009-9619-44802658CBD2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19FE4D11-3A23-4652-B86E-ED996426DD61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5300:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC0F83E-FE72-4125-9548-29C89E8D4EF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EB5FF59-057F-42D9-8829-EF0AD2CBB6DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5302:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FFC9F0B0-499C-4F04-9FE9-D1D119EBD396" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01F79573-A728-4052-92A6-5ADE4E7A4B23" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5312:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DACFC51-AB73-454C-B238-A4E4DF8222C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A795F64D-6DE9-4D56-AA22-D77470B9E5AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq5332:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CE01B34-65F2-464E-B4C5-51F773B5A87B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA7A5C46-48BF-42A9-A477-A660C6D7B437" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0234B8FE-D1BB-462A-B134-F2C8A32AFA9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5CF970F-17AE-4C59-89A5-5B41A41E1DE0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6010:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82355BED-E5D6-4719-87E5-6CD4225B4221" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B04589FF-F299-4EF6-A57B-1AD145372DBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6018:*:*:*:*:*:*:*:*", + "matchCriteriaId": "99EBE004-9A79-4C18-B1A4-272BFBD1B297" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06126F30-D081-4A11-92FB-4074A451FAF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq6028:*:*:*:*:*:*:*:*", + "matchCriteriaId": "798E43EC-D6D2-4466-B5C9-0AC46BED838A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "711FC14F-4DED-4F90-9BA5-0036537E6DCF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8070a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1E644C2D-AA38-412A-B7D7-2CBEA9ED550A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "623ED6A2-EE37-458E-BEFA-8BAD08256AE8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8071a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5F6B1A41-BC2D-433F-85B2-B9D47BCD9938" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93E5DB9B-F388-49F3-ABD5-CE773FC4B045" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8072a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0FBB1766-3F62-44CF-A24A-E76CFC6AEECA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C7691C2-C4F8-4F23-9B5F-5E8FE0E2293E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8074a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ED7A71F4-4D0E-46C1-BE74-948C28C208A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "966392A8-DD8E-4AA1-B407-5BF2D937139E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8076:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5ADAD069-094A-4B10-8C46-530667347F36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF245F8E-C056-4BEF-982E-9616F8C65CD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8076a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "720F0AA9-A2A6-47DE-9418-EB5CE4D8D890" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A24951FD-C4AB-4988-A1DD-019412430AC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8078:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E868C773-A8BF-49CE-B397-E730371046A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF609C6C-CD50-423A-A75E-83C730296089" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8078a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8658AF61-10DF-4D11-961F-24A4D11D5DEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8890C528-C2A3-4148-A397-85B63FB920C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8173:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6011137E-2F0B-4778-9287-450620522E6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BB84228-3083-4048-8E83-E1F30B537223" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq8174:*:*:*:*:*:*:*:*", + "matchCriteriaId": "85F6819E-25EE-4E42-A9CD-70CA284B82D6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78A6F4F3-0CE3-4A02-B615-63E76C93ADC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9008:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F7592475-87A0-40D9-8120-9177556D3EBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9048_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C736654C-1E52-4CE7-8B11-0F0028BF8568" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9048:*:*:*:*:*:*:*:*", + "matchCriteriaId": "59064FDE-1B22-439D-A588-D1BED91EF43D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C656780-05E9-40D5-936B-B73ECE9E0330" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9554:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E017243A-03E5-46AC-96EC-FFC1B8FE4D99" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A6182C0-AAE7-45A9-8ECB-F198B55181AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9570:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7DFE3807-593A-45EF-9B83-E16D18D0E291" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0327D8C9-DD6B-4831-BBD4-2EE57A351493" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ipq9574:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F3810BDE-38AE-46E7-8538-FAE1071A0C35" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:pmp8074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9B58B4E-86B7-4EB2-B78A-5E35FBA4A4FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:pmp8074:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AE7F9898-E118-49C7-BC82-F1755025DD4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca0000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC941093-1A7C-47B2-AB3B-05AE4AE2FBE4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca0000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A828B78-416B-4B33-BCE1-852C171FCC78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C359D1E7-6E0A-41B5-ABE5-B55598960700" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4232696D-EDA8-483F-BC20-3557E6343F16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D5E6782E-CC46-450B-B0DD-B17D9EA7BD51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3108B9-9A5F-4FE9-9E22-13B7A7EDE3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F84AABA5-6C93-43E8-A4C6-D3C892D735CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F1013-B90A-4F20-8643-6F079002257D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5EAE2E0F-A4FF-4432-B455-E27BA359DD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F4012FC-F0D9-41DE-BC2A-FBDD1B212540" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8072:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4FE20A34-8698-47E5-AE73-968D20AA5B05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC8A5A87-7D62-4EB7-962A-0F160DE3E889" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8075:*:*:*:*:*:*:*:*", + "matchCriteriaId": "41BF4851-1BFA-404E-BD83-58C3E333E1F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB1F2E8B-1ED2-473D-AFD8-F2590F6BD414" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8082:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8CB3F355-C2EC-4B3D-88C6-0BBF15376391" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9045A8-BA53-43C4-B24D-5EF320DE7A4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8084:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F591F180-17F5-493D-8CFA-DA3363E35ECC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B87335A8-DC52-478E-B19F-0C4CC63132EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8085:*:*:*:*:*:*:*:*", + "matchCriteriaId": "98E87923-FCA5-4972-B71C-AF09C0997213" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08E9E6CB-2216-4AF2-81C2-D482598298BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8386:*:*:*:*:*:*:*:*", + "matchCriteriaId": "15EA7D26-0A55-47C9-887E-C127E6023904" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:*:*:*:*:*:*:*:*", + "matchCriteriaId": "16297CD7-0688-4C89-8369-D4D1C653F6A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F0C8EF72-8147-408B-B0B6-B75A962A021B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF227702-EEFC-43CC-AC80-81EA6E4927E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9888:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CCCD1A38-7688-4FF5-8340-13B366BE9A07" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "728CCD27-ED06-49FD-AECD-9B0856813EDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9889:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2AF26040-1AC9-4F42-972A-094295CF45BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9900E07-69F3-4C20-8211-513760BF7F9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A05AC12-9E7A-4837-A447-1718396011FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcf8000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8DB28CFC-CEF8-49BE-BB33-52BE0DEC3167" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcf8000sfp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E6F522F-CBD1-4A95-A69D-1F397C687C2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcf8000sfp:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDF60319-44FA-40C1-A44D-F750EBCF4EAC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "287199B4-9CBB-4290-BDB3-ABBB41794259" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcf8001:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8C94F760-97C5-4E96-A985-F2C1880FDAC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0F7D48A-7D06-46C5-A093-FAA12666A666" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5021:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9B6BD573-656B-457B-B394-13145E7E2A16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "478B79F0-D257-41B2-965B-3E251A584D45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5022:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E00FCA66-EAF2-4201-9F28-27E500EAD035" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63965F19-033E-4755-B9CA-EF409EC339A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7456BD69-2446-460A-9A46-A89FDD80000C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85740DB4-3B08-48A4-ACAF-7BBB2612009A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5052:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F9BE4058-686F-424A-B841-E06664E48BC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6190FE-17A6-48CE-AA34-5DCF01362E9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5054:*:*:*:*:*:*:*:*", + "matchCriteriaId": "08B62C20-0627-40DD-8368-D8C1276F6EF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "290BFC8A-0D76-4BCD-B059-2DAFD368A10C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5122:*:*:*:*:*:*:*:*", + "matchCriteriaId": "43125556-C45B-499E-A098-C3E47B98C1CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A9F76FF-96D3-4BCE-918D-B3B0ADA3E8E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F229D7C8-97EF-4CA5-B727-73BB68F2EB0E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAE1EBF-AD14-4C07-99B5-2547A5196B20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5152:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E9C87B66-42C6-41C9-8B84-7BDD68B70819" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED3ED74-C2D0-4A84-A2F8-392818E5CD20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5154:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14B04226-10D2-4DB5-8C10-44387E8E2CE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F6EAD64-D133-42C4-92ED-90C49938C0F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn5164:*:*:*:*:*:*:*:*", + "matchCriteriaId": "817EC45A-A84C-4AA8-8E16-9F43569D496E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FF89C5-3BBF-4A13-8A3B-F490C2FA1A95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6023:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2A93167D-1A6E-4327-92A8-FB87BCA1D5C8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB71A28-0E31-4052-B8AA-429ED63CEAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4730B8E7-C884-4AFA-ACB5-D0F39A993D18" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FAB8327A-FD17-419F-B7DE-3A7F1F4A5556" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6102_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C37D96A3-0466-4FC4-9E56-35B55C3FA970" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6102:*:*:*:*:*:*:*:*", + "matchCriteriaId": "351789D5-9BA5-4988-9FD4-AE292E6A3788" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6112_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6300827E-F6F0-490B-8043-38DD415E3161" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6112:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0EA36D8A-6642-4D67-B1D3-189C5F5C5C91" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A988BD3-71D8-4F2B-9EC2-8E385B114114" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6122:*:*:*:*:*:*:*:*", + "matchCriteriaId": "26B7D7F4-5981-4FDA-8F47-0542DF7E4B66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6132_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A59FBBDC-0495-422C-B25A-FFDF94D33C34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6132:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A3D88C6D-334B-4664-A7E8-8DFF2D85744B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5B9E4C73-9B08-4D2D-842F-390FE1DB162B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB133AD-4616-4B0E-82D3-6F579F871D84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3CEBEDFD-EF7F-4A35-8042-D0C04AAB89BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C520263-AE1E-42FF-8F93-9BB2ACC2882B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "648B2096-82C9-4698-A7F4-F9BD786BAACC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D277C7D-A04F-4DD2-B0A9-5CFC2F3AAEAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F761E3-62F7-4A70-A3CA-09FF283ABD9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D349CCF3-0F16-4464-B1A0-091FB2F4A5C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "504FAFDF-7D53-4495-A0E0-4051AEA2BC31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "193DA42A-82EE-4536-A4B4-B6ED03F0D0D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC4E695-278F-4A4B-BB0E-E6EFDCB125E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5338CA14-E28C-4AEC-98D1-DC6C57957FCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4291ACCE-22E9-40AB-81C6-BF9E8F5C0504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "597D0A13-2CA6-4DF4-8684-551B31889CF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9905B493-4C70-45D2-BBF8-69DB60CEFAF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "763EEF62-9EC9-4BF6-8F2D-D603A24AA0F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A5256482-ED19-4039-98FD-36EF1FCD6D00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11C3A315-D3D9-4CF1-AD61-70A819F1B04E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB89808-3037-489D-BDB3-B8F5CF0ED3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6E1283-5F67-435C-82B7-6D98BC61A3A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82D516CF-045C-4AFB-9CFA-3BBA108F8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F62D8EF1-71CC-4F40-ADA5-E9835277BF7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69C4B0CC-F50D-4793-B638-2B1C99433B6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D48FCEB1-2D84-4749-A41D-76DB2F2EDDA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B074E7F1-6317-42D1-8468-7A5B3D1F59B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E54B5E4-F43F-4779-89CF-B77DD7CF956C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80EFF1CA-03DD-4E81-BAFA-77B5BD67EE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43059.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43059.json index 33e7d065526..7f4d4d7d174 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43059.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43059.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43059", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:12.140", - "lastModified": "2025-03-03T11:15:12.140", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while invoking IOCTL calls from the use-space for HGSL memory node." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al invocar llamadas IOCTL desde el espacio de uso para el nodo de memoria HGSL." } ], "metrics": { @@ -47,10 +51,556 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43060.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43060.json index 5195b5fee95..70e600c5b8f 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43060.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43060.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43060", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:12.300", - "lastModified": "2025-03-03T11:15:12.300", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption during voice activation, when sound model parameters are loaded from HLOS to ADSP." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante la activaci\u00f3n de voz, cuando los par\u00e1metros del modelo de sonido se cargan desde HLOS a ADSP." } ], "metrics": { @@ -45,12 +49,1135 @@ "value": "CWE-823" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:*:*:*:*:*:*:*:*", + "matchCriteriaId": "16297CD7-0688-4C89-8369-D4D1C653F6A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F0C8EF72-8147-408B-B0B6-B75A962A021B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9900E07-69F3-4C20-8211-513760BF7F9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:*:*:*:*:*:*:*:*", + "matchCriteriaId": "374E91E7-4375-4EAF-9718-7FB2B94EE60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C4096902-AAA2-4CD4-863F-DFCB9D5A2887" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE078A8-1117-4713-A276-1E9599EF7E3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69944B37-CCD1-470B-A766-170948AC0AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65307900-11B4-4374-9656-462DC8059048" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CA20C890-AAB8-45FA-B525-82E0CFA175BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E917DC4-6881-4276-8A0C-2C90E844D1AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6107034C-E0B0-43BD-963B-2B558B913537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8530p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EBB4F0-ED67-4096-B49D-14299AC26836" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5338CA14-E28C-4AEC-98D1-DC6C57957FCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4291ACCE-22E9-40AB-81C6-BF9E8F5C0504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "597D0A13-2CA6-4DF4-8684-551B31889CF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9905B493-4C70-45D2-BBF8-69DB60CEFAF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6E1283-5F67-435C-82B7-6D98BC61A3A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43061.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43061.json index 9c435f4a170..65f620bf843 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43061.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43061.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43061", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:12.460", - "lastModified": "2025-03-03T11:15:12.460", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption during voice activation, when sound model parameters are loaded from HLOS, and the received sound model list is empty in HLOS drive." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria durante la activaci\u00f3n por voz, cuando los par\u00e1metros del modelo de sonido se cargan desde HLOS y la lista de modelos de sonido recibidos est\u00e1 vac\u00eda en la unidad HLOS." } ], "metrics": { @@ -47,10 +51,826 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:*:*:*:*:*:*:*:*", + "matchCriteriaId": "16297CD7-0688-4C89-8369-D4D1C653F6A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F0C8EF72-8147-408B-B0B6-B75A962A021B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE078A8-1117-4713-A276-1E9599EF7E3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CA20C890-AAB8-45FA-B525-82E0CFA175BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E917DC4-6881-4276-8A0C-2C90E844D1AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6107034C-E0B0-43BD-963B-2B558B913537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8530p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EBB4F0-ED67-4096-B49D-14299AC26836" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43062.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43062.json index 3c0b5de0826..8caab94ec61 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43062.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43062.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43062", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:12.617", - "lastModified": "2025-03-03T11:15:12.617", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption caused by missing locks and checks on the DMA fence and improper synchronization." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria causada por bloqueos y verificaciones faltantes en la barrera DMA y sincronizaci\u00f3n incorrecta." } ], "metrics": { @@ -47,10 +51,394 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45580.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45580.json index 3148e9bfa0c..cef3a76195d 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45580.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45580.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45580", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:12.763", - "lastModified": "2025-03-03T11:15:12.763", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption while handling multuple IOCTL calls from userspace for remote invocation." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria al gestionar m\u00faltiples llamadas IOCTL desde el espacio de usuario para invocaci\u00f3n remota." } ], "metrics": { @@ -47,10 +51,1015 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5298473D-8B34-42E6-BC32-69A3800972B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qmp1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FA414960-717C-4410-8DC0-DCBC2BE9ED2B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "167C1CC1-03F8-49B3-B460-FCA38644DA06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8735:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3960C2B5-0754-409B-9374-B0355AA7BE92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "10804BB9-4B83-4538-B4FE-03D3057EF219" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A4AC7FF-1A74-4DB8-878B-D28359F6EE45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69D9315-2233-4C4E-8651-8E32C4BA5866" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B99D121-12DD-4A6E-A4A9-718B2021F9CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B61B9BC-4A8B-4711-B32C-23BA4350F79E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F11BC3C1-993F-42CE-AA2B-41A531CDDCAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0BC123B4-C1F1-4391-8ED7-CD6CE4CFABAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "508D9A36-1928-44D8-9957-E4281D87301B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D80271-D460-47D7-A52E-93D58BB47ABD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69C4B0CC-F50D-4793-B638-2B1C99433B6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "572B883C-0F03-4C69-8B4D-C1EC8FE3A198" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EB8794F-7998-424E-AF68-E4A4F9310F65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D73AEF-A4E2-4710-A4C1-FEA666490C29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7880:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3EFAA6C2-5370-4281-82A0-058DFEF1DA3B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48040.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48040.json index 3b01d13181e..6183225a7e3 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48040.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48040", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-11T19:15:10.660", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T18:13:11.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.21.9", + "matchCriteriaId": "620F3FC0-BABC-4D1C-A496-B563F38E3689" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-8-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49836.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49836.json index 2bcee18f845..f9126ca1a57 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49836.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49836.json @@ -2,13 +2,17 @@ "id": "CVE-2024-49836", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:12.923", - "lastModified": "2025-03-03T11:15:12.923", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption may occur during the synchronization of the camera`s frame processing pipeline." + }, + { + "lang": "es", + "value": "Es posible que se produzcan da\u00f1os en la memoria durante la sincronizaci\u00f3n del proceso de procesamiento de cuadros de la c\u00e1mara." } ], "metrics": { @@ -47,10 +51,799 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5298473D-8B34-42E6-BC32-69A3800972B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qmp1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FA414960-717C-4410-8DC0-DCBC2BE9ED2B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "167C1CC1-03F8-49B3-B460-FCA38644DA06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8735:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3960C2B5-0754-409B-9374-B0355AA7BE92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "10804BB9-4B83-4538-B4FE-03D3057EF219" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A4AC7FF-1A74-4DB8-878B-D28359F6EE45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "572B883C-0F03-4C69-8B4D-C1EC8FE3A198" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EB8794F-7998-424E-AF68-E4A4F9310F65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D73AEF-A4E2-4710-A4C1-FEA666490C29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7880:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3EFAA6C2-5370-4281-82A0-058DFEF1DA3B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50130.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50130.json index cf1e8a8ae55..18e69c20fb6 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50130.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50130.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50130", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:15.850", - "lastModified": "2024-11-07T21:49:00.380", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-06T17:15:18.953", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50150.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50150.json index ed225fc8889..11c1fe692ae 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50150.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50150.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50150", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:06.707", - "lastModified": "2024-11-22T17:29:00.880", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-06T17:15:19.133", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-502xx/CVE-2024-50283.json b/CVE-2024/CVE-2024-502xx/CVE-2024-50283.json index 119c59816d2..57ceb3e7fb5 100644 --- a/CVE-2024/CVE-2024-502xx/CVE-2024-50283.json +++ b/CVE-2024/CVE-2024-502xx/CVE-2024-50283.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50283", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T02:16:30.620", - "lastModified": "2024-12-14T21:15:34.663", + "lastModified": "2025-03-06T17:15:19.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-502xx/CVE-2024-50286.json b/CVE-2024/CVE-2024-502xx/CVE-2024-50286.json index ed53948a327..ac1e855b85a 100644 --- a/CVE-2024/CVE-2024-502xx/CVE-2024-50286.json +++ b/CVE-2024/CVE-2024-502xx/CVE-2024-50286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50286", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T02:16:30.860", - "lastModified": "2024-11-21T21:12:17.143", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-06T17:15:19.563", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51476.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51476.json new file mode 100644 index 00000000000..bb63d975103 --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51476.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51476", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-06T17:15:19.763", + "lastModified": "2025-03-06T17:15:19.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Concert Software 1.0.5 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7184961", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52923.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52923.json new file mode 100644 index 00000000000..4f8bfaf8d83 --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52923.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-52923", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-06T18:15:41.160", + "lastModified": "2025-03-06T18:15:41.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in NRMM in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. Lack of a boundary check during the decoding of DL NAS Transport messages leads to a Denial of Service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52924.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52924.json new file mode 100644 index 00000000000..db52285439c --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52924.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-52924", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-06T18:15:41.320", + "lastModified": "2025-03-06T18:15:41.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in NRMM in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. Lack of boundary check during the decoding of Registration Accept messages can lead to out-of-bounds writes on the stack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53014.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53014.json index 4c99c1398a2..9e2e6fa49e1 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53014.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53014.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53014", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:13.450", - "lastModified": "2025-03-03T11:15:13.450", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:55.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption may occur while validating ports and channels in Audio driver." + }, + { + "lang": "es", + "value": "Es posible que se produzcan da\u00f1os en la memoria al validar puertos y canales en el controlador de audio." } ], "metrics": { @@ -47,10 +51,6820 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB558B-F8E3-4846-8869-51F0268D1EE1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3BC2E75B-5067-4C10-B66D-71763F744C22" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "37D06270-BBE2-4C97-9F5F-51EEA79AD8D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D415D6A4-5586-4A9F-8F9C-BFA733A4A3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5467FEC-5CF7-492A-B792-A7DE345427ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BBCD5A75-497D-4D26-BF35-AF04743FA138" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33A13707-4866-4016-BAAA-100C16E3F267" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2293C7B3-FB54-41C9-86B1-A9E175111BCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B8E47A4-4558-43D4-8FFB-EAC5A643140A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A485B67-22C4-4906-BB3E-AA6A804D85D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D8919F90-252F-401B-8CB5-76CEEEFF89E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7C8F35-52E6-465A-A794-5B4E67A57DC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8650q:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1458A539-FA35-4E1A-B02C-9391F7262176" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "167C1CC1-03F8-49B3-B460-FCA38644DA06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8735:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3960C2B5-0754-409B-9374-B0355AA7BE92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "10804BB9-4B83-4538-B4FE-03D3057EF219" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A4AC7FF-1A74-4DB8-878B-D28359F6EE45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82AB582B-5F4B-48E6-BEF4-EE1991407A6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C57BEA9E-2DAD-47E5-9777-DF835C83FC89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65AC22FB-C41B-4255-A4D8-6DB345AA51C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96954CAA-5244-42BF-BCC8-1381D9C45CB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A094C515-42BB-4A54-B19E-F5375E5C2686" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5009631F-3632-4AF8-AC1B-A0570778B6D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_439:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F3D9037D-B828-4FA1-B082-52617396550D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4DA61D9-00F0-44AE-9821-41C730D85CA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460:*:*:*:*:*:*:*:*", + "matchCriteriaId": "312FA254-572C-41A2-83F8-F292F862496E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04DAFFC1-9038-4CEB-B181-C555BC0A3CF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC1664B3-034D-4D0A-A792-4ADCA22C575C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BE024DC-38BD-4AD5-8505-C3218C5FCF06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A6B708B-48B9-48CD-9AFB-0A5C892E82DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF33DF89-CD83-4003-B3E2-F399A61B71AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_660:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9B938218-3ECD-4342-BF1E-709BDE16015C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECA86357-66BD-4356-87DF-5AF445BC8DF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90B80966-2148-45AA-9E7D-EB3994D7DAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6976CA-9019-4B8A-84B1-58F73A0E2673" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "618CBEBD-0B1D-4A98-B4E6-1CFC10707A8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FDD354-0044-4BD2-B1B9-B89BE040070D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_678:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FCCD21-39FC-4B68-89E0-B3A9F4B1A932" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7C981FE-CD14-4DA0-86FE-94C34B490A36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CCD3ECCA-575E-4E68-990D-03843C55C5C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0989BA-DEBC-4B45-AC3A-F2033C17B93A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6653E682-718A-4892-BAD6-9B031491BA6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DCF8439-B259-43FE-B797-57C2D62A35E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "150C4223-4560-49A6-9080-AA73A739AB9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "624349A3-DAD6-4C93-A694-AB4CDC0F00EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BF6629A5-FC3F-448C-9BC3-0C88BADBD70B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDCFF2B-1713-46E2-AA4A-419FB63ED8A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A91DE4C3-96DD-4DEB-B258-515E83028F1E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CB628D4-566E-454D-B2B9-04A5533C6737" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0571FA3B-F1E1-4154-94A3-8F0F31C702AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7A5B684-09BB-4DD0-9F16-D3761EA37D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "32FD60FF-1974-44AC-A0C9-6B8776A18386" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8C1A76A-AD97-4A08-B45A-F9994D5455DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7C019467-2193-4A7B-9CAA-4F44D19EB058" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1DF0CA5-9874-4C25-8357-7E5D9AABACD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F3850D5D-7AA3-4DC3-84FC-E6F31C6ABA21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D8D5607-F0BC-46C9-A94F-1D28EE5A3F0E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8942236-F6DC-4769-89A7-7001093BC234" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F4659B0-547B-4492-9338-90B45B0462FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D579F9FE-7B00-4B19-A9A5-4A2AE9B101D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9D188A-2029-431E-A225-302C7795B891" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "741B4512-2150-4E92-A12F-A3CFBF5717D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB958799-6C95-4066-A564-2440B94EA064" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "61260043-6FB2-49CD-B8F5-AC896D95276E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1C0227CD-1414-4E2D-9F2A-B47E5D24CF8A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63C2ACAC-BCDC-4453-99C4-56868172ACB0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D06AAD09-7CBF-4761-A258-EE5B34B7B27C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "244760FB-DB14-47B0-B301-0891F3ED3CB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C29494C-C342-4B83-B574-ECD706020DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F6F95AC0-C2B5-4EBF-905A-D3C6D1BD99A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2321AF41-BFED-4567-B61D-EEB445C92511" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:*:*:*:*:*:*:*:*", + "matchCriteriaId": "353DE282-A541-4E6C-90B9-D79D36E179A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "279C3F0E-56E1-4878-9F02-5B71FD356D4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD5C60F1-5B7F-4AB0-9863-720A1972563E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D07B173E-FDAE-4640-B567-2156EFA15A1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9628:*:*:*:*:*:*:*:*", + "matchCriteriaId": "95C5F72E-5F31-4D7C-8ED3-A19B7BF43B13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D5E6782E-CC46-450B-B0DD-B17D9EA7BD51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3108B9-9A5F-4FE9-9E22-13B7A7EDE3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D144B580-1D35-45C5-BC23-0DF4BC466D9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F84AABA5-6C93-43E8-A4C6-D3C892D735CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "909A12CE-67B6-4C98-8562-26EEC578C2E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F1013-B90A-4F20-8643-6F079002257D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCD3FF6-484D-4D51-B281-DA9AAFBCBD0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "00663346-5CF1-4901-9AA9-39B4E6B71778" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A342D02-01FD-4497-ADB2-2E7F6F9CF3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E253913-B6A1-4066-B60B-951BEE92EF6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C613D1E-71EE-4730-A388-C1A38921D1DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5EAE2E0F-A4FF-4432-B455-E27BA359DD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "759D3B14-4D4D-4B76-8F7F-C3B2ED03CE3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD2B67E-FDD1-41B9-BBBE-513023BB72BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C59CBE82-96D8-402D-B313-34948D75D703" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:*:*:*:*:*:*:*:*", + "matchCriteriaId": "16297CD7-0688-4C89-8369-D4D1C653F6A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F0C8EF72-8147-408B-B0B6-B75A962A021B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB441C-DCC6-4AF9-B3E6-6DE6305D3AAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "57ABC4DE-7213-4C0A-ACE2-803F667E78B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "481E3382-E1DB-45A6-9FF7-B86712DFBF0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0F1B8798-4A1F-4FEA-AE81-6C1F299A08F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D264E36-5E39-4ABD-B05D-153C852CE40B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A829FBCE-2F22-4D03-92FA-B6F3FFE30777" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB2936E-F3AF-4623-B32B-3D50285AC6D6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28CDE5F9-947E-4EEC-810A-1105060738AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8A598302-1AA1-4D76-A852-700D06DD2296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7504F41-E4C8-4C43-AA65-C7F67C01E105" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC5DBF41-E232-48D5-AE56-BA2B758B38D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C03E2E4E-A9AD-411A-ABB7-7E87F44D37E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A03C0F57-B266-463B-813F-B6D055AB944A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5501670-56E2-48B6-ACFC-67F908D5ECCA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D284823-94B0-4DEA-8473-19FE88DC67B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06165461-2AA0-4306-8F72-C8F6A9D5113A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+:*:*:*:*:*:*:*:*", + "matchCriteriaId": "083BEE0F-BE6D-4CE7-A0A3-79CDAAE24EB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47D193F3-8369-4253-B46A-07DC2D4CC19D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D30E2C95-7B82-42C9-B1D2-0E9379321C7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "713B1CB7-985F-49F4-A5A7-23DFD0F4EA04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "35E751E0-C81B-4B77-A639-5C1C177BF303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CC661443-FF57-4303-9609-307F103DC5A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5B9E4C73-9B08-4D2D-842F-390FE1DB162B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB133AD-4616-4B0E-82D3-6F579F871D84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3CEBEDFD-EF7F-4A35-8042-D0C04AAB89BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C520263-AE1E-42FF-8F93-9BB2ACC2882B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "648B2096-82C9-4698-A7F4-F9BD786BAACC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69D9315-2233-4C4E-8651-8E32C4BA5866" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B99D121-12DD-4A6E-A4A9-718B2021F9CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B61B9BC-4A8B-4711-B32C-23BA4350F79E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "901F9968-53C6-4A19-87C8-5FC90A74DF30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "788D8CF2-D2E1-4B1C-8A5E-905C7A2CDD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "901F9968-53C6-4A19-87C8-5FC90A74DF30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "788D8CF2-D2E1-4B1C-8A5E-905C7A2CDD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F761E3-62F7-4A70-A3CA-09FF283ABD9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D349CCF3-0F16-4464-B1A0-091FB2F4A5C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x12_lte_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD477FCB-4FDE-43AD-8CA9-E64D8C95F8E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x12_lte:*:*:*:*:*:*:*:*", + "matchCriteriaId": "15919125-D919-438B-A95D-9E398E7011A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF17BE73-08FC-46C8-8C20-5A72E97AD077" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B31855B3-E8D9-412D-AB79-E568E462DE84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9C56B06-3D58-4720-835F-103C404D109E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DFDFD257-3F86-40F4-8B9F-C42CAAD09553" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "504FAFDF-7D53-4495-A0E0-4051AEA2BC31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x62_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43D86C99-E647-4800-A86A-F3207D9D9479" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x62_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "71F6BB4B-3475-4B59-AC34-3680E87C26BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "193DA42A-82EE-4536-A4B4-B6ED03F0D0D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC4E695-278F-4A4B-BB0E-E6EFDCB125E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5338CA14-E28C-4AEC-98D1-DC6C57957FCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4291ACCE-22E9-40AB-81C6-BF9E8F5C0504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "597D0A13-2CA6-4DF4-8684-551B31889CF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9905B493-4C70-45D2-BBF8-69DB60CEFAF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "763EEF62-9EC9-4BF6-8F2D-D603A24AA0F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD779739-5919-43A9-B949-D1FB4A46FA11" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "205D5B11-AEA6-4AA9-81D4-A87CB390FBC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDDA8319-911D-4689-A28B-AD70EBB23BB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "561382A5-CAAE-44D6-9ECD-A086F1CF44C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F11BC3C1-993F-42CE-AA2B-41A531CDDCAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0BC123B4-C1F1-4391-8ED7-CD6CE4CFABAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A5256482-ED19-4039-98FD-36EF1FCD6D00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11C3A315-D3D9-4CF1-AD61-70A819F1B04E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9900E07-69F3-4C20-8211-513760BF7F9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "723EAD03-6C32-4B1C-95C1-6FDA94F08151" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2825BB85-7AA1-45E4-95C3-92D405C977AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A62E8B-549B-4A89-BDCD-EAEF7083B7F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4220BE43-073D-4E0C-A572-0D300E3D85E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9FFECE-96F6-4230-A91F-8266AC13EEC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A08879B4-D5E7-426A-A4EC-70E05605E378" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "358ADECD-A006-4444-9EE3-0CF33962DEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "781E405C-F1AA-4825-9BE1-E091EA432D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B2984B8-0632-48B1-A510-FEB2D4AF33F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9BF5D5A3-E22F-4F0A-B53E-8A66C2ED808E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB71A28-0E31-4052-B8AA-429ED63CEAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:*:*:*:*:*:*:*:*", + "matchCriteriaId": "374E91E7-4375-4EAF-9718-7FB2B94EE60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C4096902-AAA2-4CD4-863F-DFCB9D5A2887" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA96DEE-5234-4B16-ADB4-FF21B0FE578D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5EA1B4C-510A-4D92-9BEC-6FAAD8EA227B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAD1884-D549-4E40-BF84-A49C49BE2475" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:*:*:*:*:*:*:*:*", + "matchCriteriaId": "77E784C6-1579-407F-B9D8-3DCDC83A97B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F85D0833-4F0F-489E-A47D-020D82D5E78F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDD25AC-DCC7-4B9E-A852-B7D467901739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D22BAC46-9C86-4346-BA5C-B090ABDFF86C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2534DFE0-C26E-4422-B788-DB0A6C3D27A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "883AB62A-ABD3-4482-9C3C-1CB9CC6C6403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:*:*:*:*:*:*:*:*", + "matchCriteriaId": "065B25FE-2B77-4C60-9FB9-82D001BE4423" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "56D82472-1B6A-486D-A0B9-FDF87DCD5358" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE8BDAAA-B7E1-496B-9F72-791D9A516DF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:*:*:*:*:*:*:*:*", + "matchCriteriaId": "678C51B2-953B-4693-A2AD-9B26B0678EC5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B27389EE-3335-4C72-92AE-8399345FBD8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE078A8-1117-4713-A276-1E9599EF7E3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:*:*:*:*:*:*:*:*", + "matchCriteriaId": "339B1A30-B78C-4A19-BF37-C402B54D86A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69944B37-CCD1-470B-A766-170948AC0AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65307900-11B4-4374-9656-462DC8059048" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5298473D-8B34-42E6-BC32-69A3800972B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qmp1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FA414960-717C-4410-8DC0-DCBC2BE9ED2B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D4562404-F3CD-45B8-8CB4-2528AE1B9CA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2551312-D07A-49D2-BA91-5176AAF6BD86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F929DF34-D0FF-4A77-91A9-7ED45EA1F303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3667862-8469-4B33-9B2D-939EA07497E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:215:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B1743434-977D-458A-8BEA-132E6C41AD6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4F674F1B-3A7E-448C-A64C-5FD143B4B68F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86E9A547-9F3D-453E-B338-01F4D47479A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A3D6E5-8D3B-41D8-A6A6-596F35E34D7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B65F9151-BFDB-40B2-9167-99CCC3E038A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F674AEE0-9AF8-4BA9-A6CF-BBDBCDEB696C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D193E214-8DE0-4334-95D5-512123C0D879" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "508D9A36-1928-44D8-9957-E4281D87301B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB89808-3037-489D-BDB3-B8F5CF0ED3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D80271-D460-47D7-A52E-93D58BB47ABD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D2CEB90-83F6-4A96-A666-18F81533F67D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:talynplus:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BD582373-558B-4DC8-8862-7BF2670262AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:vision_intelligence_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8E976A6-4785-4F88-9035-0F6F0509A642" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:vision_intelligence_400:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81FFF0F5-85BD-42CC-9725-A43BD3EF6268" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4528A5B4-A537-4707-8FF8-C9A304776DFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:*:*:*:*:*:*:*:*", + "matchCriteriaId": "12D31522-9ECC-4DE0-AC2D-0FB4872A5385" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6E1283-5F67-435C-82B7-6D98BC61A3A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82D516CF-045C-4AFB-9CFA-3BBA108F8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9360:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1CDF028-7E2D-431F-B489-7EDBA7C1A541" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F62D8EF1-71CC-4F40-ADA5-E9835277BF7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9371:*:*:*:*:*:*:*:*", + "matchCriteriaId": "52E496AD-3A70-434D-954F-D39EA9DE0B83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D44F7AE4-A114-4DFF-884F-EE121D5767A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3615:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9337CEB3-91E9-42D2-A6B0-79EEB159C221" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB3542E-4800-4DD0-B114-98F5DFB5B704" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69C4B0CC-F50D-4793-B638-2B1C99433B6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD712DD-C731-45B4-84AF-5C21BE6299B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D48FCEB1-2D84-4749-A41D-76DB2F2EDDA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B074E7F1-6317-42D1-8468-7A5B3D1F59B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19220ED5-7A56-4B03-B4A5-4FF520670ED6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFC9FA-E6EF-44C5-BD50-2824C7711541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6450:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE831E17-AC45-4C39-9075-49FC7DB7E77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B39273DF-FD6F-4D01-821E-BC5EE26FD502" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19379AEB-8F1C-43E8-8489-BFAAC63DBC71" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFC5073D-4EC8-46DB-BB16-C4A73820934A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "572B883C-0F03-4C69-8B4D-C1EC8FE3A198" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EB8794F-7998-424E-AF68-E4A4F9310F65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D73AEF-A4E2-4710-A4C1-FEA666490C29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7880:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3EFAA6C2-5370-4281-82A0-058DFEF1DA3B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E54B5E4-F43F-4779-89CF-B77DD7CF956C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71CFA659-DE2C-4AA0-8AAD-75033B2F4663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "805FF69D-E338-44AE-8B7A-75113272BFB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa2150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23586F55-C82A-4B4C-892A-EDAEE9ECE93D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa2150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2169920C-C658-46EF-93A8-957F3306F11C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82ABE90C-B964-4EB3-AE2B-BB71D0D0F0CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "54F08AEB-AF90-4C8C-8691-5C2E800D9E66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CA20C890-AAB8-45FA-B525-82E0CFA175BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80710FCC-C0AE-43AD-8AFD-728E7CBD6CE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E917DC4-6881-4276-8A0C-2C90E844D1AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A90E5001-D8BF-4D38-8C7E-3DA37000560C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6107034C-E0B0-43BD-963B-2B558B913537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8530p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EBB4F0-ED67-4096-B49D-14299AC26836" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "51F9A779-2DFF-46A8-BFC4-C6A2F3A9C624" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "788C622C-6D7D-4276-8E9E-833D5596908E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd660:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1E9B113-B1D6-4DC8-B1A0-7FD883EFF76B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "06FF6F86-28E4-45B6-871B-A5DDB331F3E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB70F81-3A5B-4839-8746-E60ABFA73F08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:*:*:*:*:*:*:*:*", + "matchCriteriaId": "92DBF43F-06EB-4E92-80AC-B5A002B7B322" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8511C0-4BF6-45B6-8383-C722C2528CAA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A32638A-D67C-4A43-9C5A-24ED0C632F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AFB1F551-5ABB-40D7-B4BF-E1913AB25C92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3125FCBA-94BA-415A-A005-CDC5B2CDBE39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx61:*:*:*:*:*:*:*:*", + "matchCriteriaId": "53DD36F1-19B4-4C48-87BD-03E16DED14FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A990A85A-34B9-4402-9F1E-588B880EE264" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E4D58719-033C-4671-8E50-6012D173D5D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "17738B45-947D-4C4F-820C-11C8314338A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE676369-CC9C-4A16-A477-188240861747" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "036F5630-A224-4C27-98E3-F7618FAB3567" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D777F3D4-0707-472E-A768-A00E7AD9D2BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80EFF1CA-03DD-4E81-BAFA-77B5BD67EE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53022.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53022.json index cbf7424ebf0..5ccce68160c 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53022.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53022.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53022", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:13.630", - "lastModified": "2025-03-03T11:15:13.630", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:55.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption may occur during communication between primary and guest VM." + }, + { + "lang": "es", + "value": "Se puede producir corrupci\u00f3n de memoria durante la comunicaci\u00f3n entre la m\u00e1quina virtual principal y la invitada." } ], "metrics": { @@ -45,12 +49,648 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53024.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53024.json index c108fb356e0..4f85e5cf569 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53024.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53024.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53024", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:13.943", - "lastModified": "2025-03-03T11:15:13.943", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:41.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption in display driver while detaching a device." + }, + { + "lang": "es", + "value": "Corrupci\u00f3n de memoria en el controlador de pantalla al desconectar un dispositivo." } ], "metrics": { @@ -47,10 +51,4498 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE8BDAAA-B7E1-496B-9F72-791D9A516DF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:*:*:*:*:*:*:*:*", + "matchCriteriaId": "678C51B2-953B-4693-A2AD-9B26B0678EC5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B27389EE-3335-4C72-92AE-8399345FBD8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0661B631-68E0-45DD-A9BD-943AB98181A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8300:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63446B2F-926B-42B6-ABEE-00AE06BC62EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE078A8-1117-4713-A276-1E9599EF7E3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs9100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "057E49CC-28C0-4A82-A895-6E681AB1E22F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs9100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D123577F-6BEA-400B-B608-97ADD28357C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5298473D-8B34-42E6-BC32-69A3800972B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qmp1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FA414960-717C-4410-8DC0-DCBC2BE9ED2B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D4562404-F3CD-45B8-8CB4-2528AE1B9CA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2551312-D07A-49D2-BA91-5176AAF6BD86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A314357F-9D15-4645-ABC5-5AA641C37B3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4F674F1B-3A7E-448C-A64C-5FD143B4B68F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86E9A547-9F3D-453E-B338-01F4D47479A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A3D6E5-8D3B-41D8-A6A6-596F35E34D7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B65F9151-BFDB-40B2-9167-99CCC3E038A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F674AEE0-9AF8-4BA9-A6CF-BBDBCDEB696C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D193E214-8DE0-4334-95D5-512123C0D879" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71CFA659-DE2C-4AA0-8AAD-75033B2F4663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "805FF69D-E338-44AE-8B7A-75113272BFB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6107034C-E0B0-43BD-963B-2B558B913537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8530p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EBB4F0-ED67-4096-B49D-14299AC26836" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "788C622C-6D7D-4276-8E9E-833D5596908E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A32638A-D67C-4A43-9C5A-24ED0C632F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3125FCBA-94BA-415A-A005-CDC5B2CDBE39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx61:*:*:*:*:*:*:*:*", + "matchCriteriaId": "53DD36F1-19B4-4C48-87BD-03E16DED14FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A990A85A-34B9-4402-9F1E-588B880EE264" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E4D58719-033C-4671-8E50-6012D173D5D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE676369-CC9C-4A16-A477-188240861747" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "036F5630-A224-4C27-98E3-F7618FAB3567" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB558B-F8E3-4846-8869-51F0268D1EE1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3BC2E75B-5067-4C10-B66D-71763F744C22" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "37D06270-BBE2-4C97-9F5F-51EEA79AD8D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5467FEC-5CF7-492A-B792-A7DE345427ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BBCD5A75-497D-4D26-BF35-AF04743FA138" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C29494C-C342-4B83-B574-ECD706020DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F6F95AC0-C2B5-4EBF-905A-D3C6D1BD99A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2321AF41-BFED-4567-B61D-EEB445C92511" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:*:*:*:*:*:*:*:*", + "matchCriteriaId": "353DE282-A541-4E6C-90B9-D79D36E179A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD5C60F1-5B7F-4AB0-9863-720A1972563E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D07B173E-FDAE-4640-B567-2156EFA15A1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3108B9-9A5F-4FE9-9E22-13B7A7EDE3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E253913-B6A1-4066-B60B-951BEE92EF6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C613D1E-71EE-4730-A388-C1A38921D1DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "759D3B14-4D4D-4B76-8F7F-C3B2ED03CE3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD2B67E-FDD1-41B9-BBBE-513023BB72BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C59CBE82-96D8-402D-B313-34948D75D703" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9FFECE-96F6-4230-A91F-8266AC13EEC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A08879B4-D5E7-426A-A4EC-70E05605E378" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "358ADECD-A006-4444-9EE3-0CF33962DEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "781E405C-F1AA-4825-9BE1-E091EA432D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B2984B8-0632-48B1-A510-FEB2D4AF33F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9BF5D5A3-E22F-4F0A-B53E-8A66C2ED808E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB71A28-0E31-4052-B8AA-429ED63CEAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA96DEE-5234-4B16-ADB4-FF21B0FE578D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5EA1B4C-510A-4D92-9BEC-6FAAD8EA227B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAD1884-D549-4E40-BF84-A49C49BE2475" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "84CB74A6-63D9-40FA-AC10-0DFF308E4605" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDD25AC-DCC7-4B9E-A852-B7D467901739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2534DFE0-C26E-4422-B788-DB0A6C3D27A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "883AB62A-ABD3-4482-9C3C-1CB9CC6C6403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:*:*:*:*:*:*:*:*", + "matchCriteriaId": "065B25FE-2B77-4C60-9FB9-82D001BE4423" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "56D82472-1B6A-486D-A0B9-FDF87DCD5358" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A369459-FC20-4F7C-A8D9-89E132900F37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs615:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F048AFD5-F328-44B1-BC15-33F3AC91C1FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33A13707-4866-4016-BAAA-100C16E3F267" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2293C7B3-FB54-41C9-86B1-A9E175111BCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B8E47A4-4558-43D4-8FFB-EAC5A643140A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A485B67-22C4-4906-BB3E-AA6A804D85D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D8919F90-252F-401B-8CB5-76CEEEFF89E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7C8F35-52E6-465A-A794-5B4E67A57DC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8650q:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1458A539-FA35-4E1A-B02C-9391F7262176" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8735_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "167C1CC1-03F8-49B3-B460-FCA38644DA06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8735:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3960C2B5-0754-409B-9374-B0355AA7BE92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "10804BB9-4B83-4538-B4FE-03D3057EF219" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A4AC7FF-1A74-4DB8-878B-D28359F6EE45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82AB582B-5F4B-48E6-BEF4-EE1991407A6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C57BEA9E-2DAD-47E5-9777-DF835C83FC89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65AC22FB-C41B-4255-A4D8-6DB345AA51C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96954CAA-5244-42BF-BCC8-1381D9C45CB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A094C515-42BB-4A54-B19E-F5375E5C2686" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4DA61D9-00F0-44AE-9821-41C730D85CA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460:*:*:*:*:*:*:*:*", + "matchCriteriaId": "312FA254-572C-41A2-83F8-F292F862496E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04DAFFC1-9038-4CEB-B181-C555BC0A3CF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC1664B3-034D-4D0A-A792-4ADCA22C575C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BE024DC-38BD-4AD5-8505-C3218C5FCF06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A6B708B-48B9-48CD-9AFB-0A5C892E82DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECA86357-66BD-4356-87DF-5AF445BC8DF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90B80966-2148-45AA-9E7D-EB3994D7DAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7C981FE-CD14-4DA0-86FE-94C34B490A36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CCD3ECCA-575E-4E68-990D-03843C55C5C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0989BA-DEBC-4B45-AC3A-F2033C17B93A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6653E682-718A-4892-BAD6-9B031491BA6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "624349A3-DAD6-4C93-A694-AB4CDC0F00EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BF6629A5-FC3F-448C-9BC3-0C88BADBD70B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB958799-6C95-4066-A564-2440B94EA064" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "61260043-6FB2-49CD-B8F5-AC896D95276E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB441C-DCC6-4AF9-B3E6-6DE6305D3AAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "57ABC4DE-7213-4C0A-ACE2-803F667E78B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "481E3382-E1DB-45A6-9FF7-B86712DFBF0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0F1B8798-4A1F-4FEA-AE81-6C1F299A08F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D264E36-5E39-4ABD-B05D-153C852CE40B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A829FBCE-2F22-4D03-92FA-B6F3FFE30777" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB2936E-F3AF-4623-B32B-3D50285AC6D6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28CDE5F9-947E-4EEC-810A-1105060738AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8A598302-1AA1-4D76-A852-700D06DD2296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7504F41-E4C8-4C43-AA65-C7F67C01E105" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC5DBF41-E232-48D5-AE56-BA2B758B38D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C03E2E4E-A9AD-411A-ABB7-7E87F44D37E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A03C0F57-B266-463B-813F-B6D055AB944A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB133AD-4616-4B0E-82D3-6F579F871D84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3CEBEDFD-EF7F-4A35-8042-D0C04AAB89BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C520263-AE1E-42FF-8F93-9BB2ACC2882B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "648B2096-82C9-4698-A7F4-F9BD786BAACC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69D9315-2233-4C4E-8651-8E32C4BA5866" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B99D121-12DD-4A6E-A4A9-718B2021F9CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B61B9BC-4A8B-4711-B32C-23BA4350F79E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F761E3-62F7-4A70-A3CA-09FF283ABD9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D349CCF3-0F16-4464-B1A0-091FB2F4A5C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x62_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43D86C99-E647-4800-A86A-F3207D9D9479" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x62_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "71F6BB4B-3475-4B59-AC34-3680E87C26BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "193DA42A-82EE-4536-A4B4-B6ED03F0D0D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC4E695-278F-4A4B-BB0E-E6EFDCB125E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F11BC3C1-993F-42CE-AA2B-41A531CDDCAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0BC123B4-C1F1-4391-8ED7-CD6CE4CFABAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A5256482-ED19-4039-98FD-36EF1FCD6D00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11C3A315-D3D9-4CF1-AD61-70A819F1B04E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "508D9A36-1928-44D8-9957-E4281D87301B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D80271-D460-47D7-A52E-93D58BB47ABD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D2CEB90-83F6-4A96-A666-18F81533F67D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:talynplus:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BD582373-558B-4DC8-8862-7BF2670262AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:*:*:*:*:*:*:*:*", + "matchCriteriaId": "12D31522-9ECC-4DE0-AC2D-0FB4872A5385" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82D516CF-045C-4AFB-9CFA-3BBA108F8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F62D8EF1-71CC-4F40-ADA5-E9835277BF7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D44F7AE4-A114-4DFF-884F-EE121D5767A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D48FCEB1-2D84-4749-A41D-76DB2F2EDDA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B074E7F1-6317-42D1-8468-7A5B3D1F59B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFC9FA-E6EF-44C5-BD50-2824C7711541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6450:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE831E17-AC45-4C39-9075-49FC7DB7E77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B39273DF-FD6F-4D01-821E-BC5EE26FD502" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19379AEB-8F1C-43E8-8489-BFAAC63DBC71" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFC5073D-4EC8-46DB-BB16-C4A73820934A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0B2800F-B0A7-489E-BD70-B2EAAF45DE7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "572B883C-0F03-4C69-8B4D-C1EC8FE3A198" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EB8794F-7998-424E-AF68-E4A4F9310F65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D73AEF-A4E2-4710-A4C1-FEA666490C29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7880:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3EFAA6C2-5370-4281-82A0-058DFEF1DA3B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E54B5E4-F43F-4779-89CF-B77DD7CF956C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80EFF1CA-03DD-4E81-BAFA-77B5BD67EE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53025.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53025.json index 7fcbdad1e5f..20b59736b78 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53025.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53025.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53025", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:14.120", - "lastModified": "2025-03-03T11:15:14.120", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:41.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS can occur while processing UCI command." + }, + { + "lang": "es", + "value": "Se puede producir una DOS transitoria mientras se procesa el comando UCI." } ], "metrics": { @@ -47,10 +51,501 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84641A8E-A93C-48C1-86AC-193951BA4D78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "10804BB9-4B83-4538-B4FE-03D3057EF219" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8ABDBF-BABC-4219-8A18-BDFC8C826B1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8750p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A4AC7FF-1A74-4DB8-878B-D28359F6EE45" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFC9FA-E6EF-44C5-BD50-2824C7711541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6450:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE831E17-AC45-4C39-9075-49FC7DB7E77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFC5073D-4EC8-46DB-BB16-C4A73820934A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EB8794F-7998-424E-AF68-E4A4F9310F65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8D73AEF-A4E2-4710-A4C1-FEA666490C29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63735D33-9F09-4841-9FE0-0D9AB604BECF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7880:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3EFAA6C2-5370-4281-82A0-058DFEF1DA3B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53027.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53027.json index 31ff6070686..86880d2276d 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53027.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53027.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53027", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:14.290", - "lastModified": "2025-03-03T11:15:14.290", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:41.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Transient DOS may occur while processing the country IE." + }, + { + "lang": "es", + "value": "Puede ocurrir una DOS transitoria mientras se procesa el IE del pa\u00eds." } ], "metrics": { @@ -47,10 +51,5740 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:*:*:*:*:*:*:*:*", + "matchCriteriaId": "16297CD7-0688-4C89-8369-D4D1C653F6A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F0C8EF72-8147-408B-B0B6-B75A962A021B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E02CCE45-27E9-436A-A49F-F92B1C9B0926" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc2073:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19508C99-BCB9-4D00-995E-A50E251D214F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90EF18E5-6D32-4A75-95B8-DF41A5373DEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc2076:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44157935-7BBC-4739-84C0-8DA0038612FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9900E07-69F3-4C20-8211-513760BF7F9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A62E8B-549B-4A89-BDCD-EAEF7083B7F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4220BE43-073D-4E0C-A572-0D300E3D85E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "358ADECD-A006-4444-9EE3-0CF33962DEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "781E405C-F1AA-4825-9BE1-E091EA432D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B2984B8-0632-48B1-A510-FEB2D4AF33F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9BF5D5A3-E22F-4F0A-B53E-8A66C2ED808E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB71A28-0E31-4052-B8AA-429ED63CEAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:*:*:*:*:*:*:*:*", + "matchCriteriaId": "374E91E7-4375-4EAF-9718-7FB2B94EE60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C4096902-AAA2-4CD4-863F-DFCB9D5A2887" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAD1884-D549-4E40-BF84-A49C49BE2475" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "84CB74A6-63D9-40FA-AC10-0DFF308E4605" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F85D0833-4F0F-489E-A47D-020D82D5E78F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDD25AC-DCC7-4B9E-A852-B7D467901739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D22BAC46-9C86-4346-BA5C-B090ABDFF86C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2534DFE0-C26E-4422-B788-DB0A6C3D27A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "883AB62A-ABD3-4482-9C3C-1CB9CC6C6403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:*:*:*:*:*:*:*:*", + "matchCriteriaId": "065B25FE-2B77-4C60-9FB9-82D001BE4423" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "56D82472-1B6A-486D-A0B9-FDF87DCD5358" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A369459-FC20-4F7C-A8D9-89E132900F37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs615:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F048AFD5-F328-44B1-BC15-33F3AC91C1FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE8BDAAA-B7E1-496B-9F72-791D9A516DF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:*:*:*:*:*:*:*:*", + "matchCriteriaId": "678C51B2-953B-4693-A2AD-9B26B0678EC5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B27389EE-3335-4C72-92AE-8399345FBD8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0661B631-68E0-45DD-A9BD-943AB98181A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8300:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63446B2F-926B-42B6-ABEE-00AE06BC62EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE078A8-1117-4713-A276-1E9599EF7E3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs9100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "057E49CC-28C0-4A82-A895-6E681AB1E22F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs9100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D123577F-6BEA-400B-B608-97ADD28357C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:*:*:*:*:*:*:*:*", + "matchCriteriaId": "339B1A30-B78C-4A19-BF37-C402B54D86A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69944B37-CCD1-470B-A766-170948AC0AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65307900-11B4-4374-9656-462DC8059048" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:205_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E9FB225-819E-44FD-B6B9-8A49909750B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:205:*:*:*:*:*:*:*:*", + "matchCriteriaId": "840C033A-4EA7-4266-8D7F-66EF9D4D7D4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4F674F1B-3A7E-448C-A64C-5FD143B4B68F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86E9A547-9F3D-453E-B338-01F4D47479A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A3D6E5-8D3B-41D8-A6A6-596F35E34D7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B65F9151-BFDB-40B2-9167-99CCC3E038A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82ABE90C-B964-4EB3-AE2B-BB71D0D0F0CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "54F08AEB-AF90-4C8C-8691-5C2E800D9E66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80EFF1CA-03DD-4E81-BAFA-77B5BD67EE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8017:*:*:*:*:*:*:*:*", + "matchCriteriaId": "161976DA-46C3-49EF-A321-53CA9AD84F29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C29494C-C342-4B83-B574-ECD706020DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F6F95AC0-C2B5-4EBF-905A-D3C6D1BD99A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2321AF41-BFED-4567-B61D-EEB445C92511" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:*:*:*:*:*:*:*:*", + "matchCriteriaId": "353DE282-A541-4E6C-90B9-D79D36E179A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "279C3F0E-56E1-4878-9F02-5B71FD356D4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9628:*:*:*:*:*:*:*:*", + "matchCriteriaId": "95C5F72E-5F31-4D7C-8ED3-A19B7BF43B13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9640:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CA81177-89FF-4941-B1CC-D99069A030C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8996au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "574CE24F-6575-4D36-B351-13806C3C1730" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D5E6782E-CC46-450B-B0DD-B17D9EA7BD51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08811FE5-AEF1-4D3C-8916-DABB7969BA93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6175a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "72C170A0-0868-4703-BC44-6ACA30ABA002" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4E8A5620-161F-45EF-B40C-C8383591FE19" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6320:*:*:*:*:*:*:*:*", + "matchCriteriaId": "45144999-8CE2-4FD2-9070-1B1E633AE317" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3108B9-9A5F-4FE9-9E22-13B7A7EDE3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F84AABA5-6C93-43E8-A4C6-D3C892D735CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F1013-B90A-4F20-8643-6F079002257D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B1397F3-8CCF-4BBA-9F0F-A12E4F045754" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6554a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EBF33E99-62D6-4CF6-8F2F-8A0690B42FB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00FE294D-4BE0-4436-9273-507E760884EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCD3FF6-484D-4D51-B281-DA9AAFBCBD0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "00663346-5CF1-4901-9AA9-39B4E6B71778" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A342D02-01FD-4497-ADB2-2E7F6F9CF3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E253913-B6A1-4066-B60B-951BEE92EF6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C613D1E-71EE-4730-A388-C1A38921D1DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5EAE2E0F-A4FF-4432-B455-E27BA359DD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "759D3B14-4D4D-4B76-8F7F-C3B2ED03CE3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD2B67E-FDD1-41B9-BBBE-513023BB72BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6777aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D4F65D-D644-4C88-BB56-8B4C0A0C6D6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6777aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD18F5-846E-4D47-A854-ED0641553D1C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6787aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FADF91E1-C5A5-4313-BC7E-1787E78AB0D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6787aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1D5B33E-8BB2-4322-8F9E-B91112EAC2D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C59CBE82-96D8-402D-B313-34948D75D703" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "193DA42A-82EE-4536-A4B4-B6ED03F0D0D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC4E695-278F-4A4B-BB0E-E6EFDCB125E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5338CA14-E28C-4AEC-98D1-DC6C57957FCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4291ACCE-22E9-40AB-81C6-BF9E8F5C0504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "597D0A13-2CA6-4DF4-8684-551B31889CF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9905B493-4C70-45D2-BBF8-69DB60CEFAF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED623126-9BE8-441A-8F5D-397F588FFC48" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "453D4145-BD73-4868-BE89-6F9FEE05C70A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "763EEF62-9EC9-4BF6-8F2D-D603A24AA0F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD779739-5919-43A9-B949-D1FB4A46FA11" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "205D5B11-AEA6-4AA9-81D4-A87CB390FBC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A5256482-ED19-4039-98FD-36EF1FCD6D00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11C3A315-D3D9-4CF1-AD61-70A819F1B04E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1120:*:*:*:*:*:*:*:*", + "matchCriteriaId": "00CB2F5C-C09A-4989-9265-284432739274" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB89808-3037-489D-BDB3-B8F5CF0ED3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D80271-D460-47D7-A52E-93D58BB47ABD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D2CEB90-83F6-4A96-A666-18F81533F67D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:talynplus:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BD582373-558B-4DC8-8862-7BF2670262AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4528A5B4-A537-4707-8FF8-C9A304776DFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:*:*:*:*:*:*:*:*", + "matchCriteriaId": "12D31522-9ECC-4DE0-AC2D-0FB4872A5385" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6E1283-5F67-435C-82B7-6D98BC61A3A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82D516CF-045C-4AFB-9CFA-3BBA108F8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F62D8EF1-71CC-4F40-ADA5-E9835277BF7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D44F7AE4-A114-4DFF-884F-EE121D5767A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3610:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9DE068D3-95AA-475D-B997-E679AC5F86B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD712DD-C731-45B4-84AF-5C21BE6299B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D48FCEB1-2D84-4749-A41D-76DB2F2EDDA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B074E7F1-6317-42D1-8468-7A5B3D1F59B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19220ED5-7A56-4B03-B4A5-4FF520670ED6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B39273DF-FD6F-4D01-821E-BC5EE26FD502" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19379AEB-8F1C-43E8-8489-BFAAC63DBC71" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFC5073D-4EC8-46DB-BB16-C4A73820934A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E54B5E4-F43F-4779-89CF-B77DD7CF956C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CA20C890-AAB8-45FA-B525-82E0CFA175BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80710FCC-C0AE-43AD-8AFD-728E7CBD6CE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E917DC4-6881-4276-8A0C-2C90E844D1AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A90E5001-D8BF-4D38-8C7E-3DA37000560C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6107034C-E0B0-43BD-963B-2B558B913537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8530p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EBB4F0-ED67-4096-B49D-14299AC26836" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "788C622C-6D7D-4276-8E9E-833D5596908E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd660:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1E9B113-B1D6-4DC8-B1A0-7FD883EFF76B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6BB8749B-33C8-411D-933A-8F778ECEBD97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8511C0-4BF6-45B6-8383-C722C2528CAA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A32638A-D67C-4A43-9C5A-24ED0C632F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3125FCBA-94BA-415A-A005-CDC5B2CDBE39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx61:*:*:*:*:*:*:*:*", + "matchCriteriaId": "53DD36F1-19B4-4C48-87BD-03E16DED14FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A990A85A-34B9-4402-9F1E-588B880EE264" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E4D58719-033C-4671-8E50-6012D173D5D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "17738B45-947D-4C4F-820C-11C8314338A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE676369-CC9C-4A16-A477-188240861747" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "036F5630-A224-4C27-98E3-F7618FAB3567" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB558B-F8E3-4846-8869-51F0268D1EE1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3BC2E75B-5067-4C10-B66D-71763F744C22" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "37D06270-BBE2-4C97-9F5F-51EEA79AD8D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5467FEC-5CF7-492A-B792-A7DE345427ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BBCD5A75-497D-4D26-BF35-AF04743FA138" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33A13707-4866-4016-BAAA-100C16E3F267" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2293C7B3-FB54-41C9-86B1-A9E175111BCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B8E47A4-4558-43D4-8FFB-EAC5A643140A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A485B67-22C4-4906-BB3E-AA6A804D85D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D8919F90-252F-401B-8CB5-76CEEEFF89E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7C8F35-52E6-465A-A794-5B4E67A57DC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8650q:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1458A539-FA35-4E1A-B02C-9391F7262176" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82AB582B-5F4B-48E6-BEF4-EE1991407A6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15838699-2BA0-4CF1-B3E6-0F80581C8DDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_210:*:*:*:*:*:*:*:*", + "matchCriteriaId": "62AD839A-5894-4F36-A635-7757E021B42A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_212_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3495C094-A59C-42B4-B4EB-E45DEF5BEAC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_212:*:*:*:*:*:*:*:*", + "matchCriteriaId": "08A3C72C-3965-4B42-9393-75DB5A8DA001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C57BEA9E-2DAD-47E5-9777-DF835C83FC89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65AC22FB-C41B-4255-A4D8-6DB345AA51C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96954CAA-5244-42BF-BCC8-1381D9C45CB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A094C515-42BB-4A54-B19E-F5375E5C2686" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4DA61D9-00F0-44AE-9821-41C730D85CA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460:*:*:*:*:*:*:*:*", + "matchCriteriaId": "312FA254-572C-41A2-83F8-F292F862496E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04DAFFC1-9038-4CEB-B181-C555BC0A3CF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC1664B3-034D-4D0A-A792-4ADCA22C575C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BE024DC-38BD-4AD5-8505-C3218C5FCF06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A6B708B-48B9-48CD-9AFB-0A5C892E82DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF33DF89-CD83-4003-B3E2-F399A61B71AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_660:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9B938218-3ECD-4342-BF1E-709BDE16015C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECA86357-66BD-4356-87DF-5AF445BC8DF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90B80966-2148-45AA-9E7D-EB3994D7DAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7C981FE-CD14-4DA0-86FE-94C34B490A36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CCD3ECCA-575E-4E68-990D-03843C55C5C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0989BA-DEBC-4B45-AC3A-F2033C17B93A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6653E682-718A-4892-BAD6-9B031491BA6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "624349A3-DAD6-4C93-A694-AB4CDC0F00EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BF6629A5-FC3F-448C-9BC3-0C88BADBD70B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB958799-6C95-4066-A564-2440B94EA064" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "61260043-6FB2-49CD-B8F5-AC896D95276E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB441C-DCC6-4AF9-B3E6-6DE6305D3AAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "57ABC4DE-7213-4C0A-ACE2-803F667E78B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "481E3382-E1DB-45A6-9FF7-B86712DFBF0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0F1B8798-4A1F-4FEA-AE81-6C1F299A08F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D264E36-5E39-4ABD-B05D-153C852CE40B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A829FBCE-2F22-4D03-92FA-B6F3FFE30777" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB2936E-F3AF-4623-B32B-3D50285AC6D6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28CDE5F9-947E-4EEC-810A-1105060738AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8A598302-1AA1-4D76-A852-700D06DD2296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7504F41-E4C8-4C43-AA65-C7F67C01E105" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC5DBF41-E232-48D5-AE56-BA2B758B38D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C03E2E4E-A9AD-411A-ABB7-7E87F44D37E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A03C0F57-B266-463B-813F-B6D055AB944A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73954A37-654B-4EE2-B14F-A70A992CA807" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F7DB3E97-A20A-4BDA-B061-0AA35FFB4442" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_pc_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54274BBB-DC4D-4F96-9EE3-50D132F84FBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_pc:*:*:*:*:*:*:*:*", + "matchCriteriaId": "12CDF792-CE3D-4F81-885F-C7E3DBC2BF88" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "713B1CB7-985F-49F4-A5A7-23DFD0F4EA04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "35E751E0-C81B-4B77-A639-5C1C177BF303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CC661443-FF57-4303-9609-307F103DC5A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5B9E4C73-9B08-4D2D-842F-390FE1DB162B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB133AD-4616-4B0E-82D3-6F579F871D84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3CEBEDFD-EF7F-4A35-8042-D0C04AAB89BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C520263-AE1E-42FF-8F93-9BB2ACC2882B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "648B2096-82C9-4698-A7F4-F9BD786BAACC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B61B9BC-4A8B-4711-B32C-23BA4350F79E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "84BE3209-9A2D-4D14-A6D3-EA5178A36E63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D277C7D-A04F-4DD2-B0A9-5CFC2F3AAEAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F761E3-62F7-4A70-A3CA-09FF283ABD9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D349CCF3-0F16-4464-B1A0-091FB2F4A5C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF17BE73-08FC-46C8-8C20-5A72E97AD077" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B31855B3-E8D9-412D-AB79-E568E462DE84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x5_lte_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03F7EED4-ACB6-4874-8849-D8B43373DC2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x5_lte:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B57765FF-FFDF-4E02-961B-5B3F45F8ACD7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "504FAFDF-7D53-4495-A0E0-4051AEA2BC31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x62_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43D86C99-E647-4800-A86A-F3207D9D9479" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x62_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "71F6BB4B-3475-4B59-AC34-3680E87C26BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53068.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53068.json index bbcc349852d..561e89d03b6 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53068.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53068.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53068", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:26.557", - "lastModified": "2024-11-25T13:43:00.467", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-06T17:15:19.957", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53182.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53182.json index d1c5f490d7b..abd17fde3cf 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53182.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53182.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53182", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:25.643", - "lastModified": "2024-12-27T14:15:25.643", + "lastModified": "2025-03-06T17:15:20.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el n\u00facleo de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"block, bfq: merge bfq_release_process_ref() into bfq_put_cooperator()\" Esto revierte el commit bc3b1e9e7c50e1de0f573eea3871db61dd4787de. El bic est\u00e1 asociado con sync_bfqq y bfq_release_process_ref no se puede colocar en bfq_put_cooperator. informe de kasan: [ 400.347277] ======================================================================= [ 400.347287] ERROR: KASAN: slab-use-after-free en bic_set_bfqq+0x200/0x230 [ 400.347420] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff88881cab7d60 por la tarea dockerd/5800 [ 400.347430] [ 400.347436] CPU: 24 UID: 0 PID: 5800 Comm: dockerd Kdump: cargado Tainted: GE 6.12.0 #32 [ 400.347450] Contaminado: [E]=UNSIGNED_MODULE [ 400.347454] Nombre del hardware: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.20192059.B64.2207280713 28/07/2022 [ 400.347460] Seguimiento de llamadas: [ 400.347464] [ 400.347468] dump_stack_lvl+0x5d/0x80 [ 400.347490] print_report+0x174/0x505 [ 400.347521] kasan_report+0xe0/0x160 [ 400.347541] bic_set_bfqq+0x200/0x230 [ 400.347549] bfq_bic_update_cgroup+0x419/0x740 [ 400.347560] bfq_bio_merge+0x133/0x320 [ 400.347584] blk_mq_submit_bio+0x1761/0x1e20 [ 400.347625] __submit_bio+0x28b/0x7b0 [ 400.347664] enviar_bio_noacct_nocheck+0x6b2/0xd30 [ 400.347690] iomap_readahead+0x50c/0x680 [ 400.347731] p\u00e1ginas_de_lectura+0x17f/0x9c0 [ 400.347785] cach\u00e9_de_p\u00e1gina_ra_sin_l\u00edmites+0x366/0x4a0 [ 400.347795] error_mapa_archivo+0x83d/0x2340 [ 400.347819] error_mapa_archivo_xfs+0x11a/0x7d0 [xfs] [ 400.349256] error_do+0xf1/0x610 [ 400.349270] error_do+0x977/0x11a0 [ 400.349281] error_mm_gestionar+0x5d1/0x850 [ 400.349314] handle_mm_fault+0x1f8/0x560 [ 400.349324] do_user_addr_fault+0x324/0x970 [ 400.349337] exc_page_fault+0x76/0xf0 [ 400.349350] asm_exc_page_fault+0x26/0x30 [ 400.349360] RIP: 0033:0x55a480d77375 [ 400.349384] C\u00f3digo: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 49 3b 66 10 0f 86 ae 02 00 00 55 48 89 e5 48 83 ec 58 48 8b 10 <83> 7a 10 00 0f 84 27 02 00 00 44 0f b6 42 28 44 0f b6 4a 29 41 80 [ 400.349392] RSP: 002b:00007f18c37fd8b8 EFLAGS: 00010216 [ 400.349401] RAX: 00007f18c37fd9d0 RBX: 000000000000000 RCX: 0000000000000000 [ 400.349407] RDX: 000055a484407d38 RSI: 000000c000e8b0c0 RDI: 0000000000000000 [ 400.349412] RBP: 00007f18c37fd910 R08: 000055a484017f60 R09: 000055a484066f80 [ 400.349417] R10: 0000000000194000 R11: 0000000000000005 R12: 0000000000000008 [ 400.349422] R13: 0000000000000000 R14: 000000c000476a80 R15: 0000000000000000 [ 400.349430] [ 400.349452] [ 400.349454] Asignado por la tarea 5800: [ 400.349459] kasan_save_stack+0x30/0x50 [ 400.349469] kasan_save_track+0x14/0x30 [ 400.349475] __kasan_slab_alloc+0x89/0x90 [ 400.349482] kmem_cache_alloc_node_noprof+0xdc/0x2a0 [ 400.349492] bfq_get_queue+0x1ef/0x1100 [ 400.349502] __bfq_get_bfqq_handle_split+0x11a/0x510 [ 400.349511] bfq_insert_requests+0xf55/0x9030 [ 400.349519] blk_mq_flush_plug_list+0x446/0x14c0 [ 400.349527] __blk_flush_plug+0x27c/0x4e0 [ 400.349534] blk_finish_plug+0x52/0xa0 [ 400.349540] _xfs_buf_ioapply+0x739/0xc30 [xfs] [ 400.350246] __xfs_buf_submit+0x1b2/0x640 [xfs] [ 400.350967] xfs_buf_read_map+0x306/0xa20 [xfs] [ 400.351672] xfs_trans_read_buf_map+0x285/0x7d0 [xfs] [ 400.352386] xfs_imap_to_bp+0x107/0x270 [xfs] [ 400.353077] xfs_iget+0x70d/0x1eb0 [xfs] [ 400.353786] xfs_lookup+0x2ca/0x3a0 [xfs] [ 400.354506] xfs_vn_lookup+0x14e/0x1a0 [xfs] [ 400.355197] __lookup_slow+0x19c/0x340 [ 400.355204] lookup_one_unlocked+0xfc/0x120 [ 400.355211] ovl_lookup_single+0x1b3/0xcf0 [superposici\u00f3n] [ 400.355255] ovl_lookup_layer+0x316/0x490 [superposici\u00f3n] [ 400.355295] ovl_lookup+0x844/0x1fd0 [superposici\u00f3n] [ 400.355351] lookup_one_qstr_excl+0xef/0x150 [ 400.355357] do_unlinkat+0x22a/0x620 [ 400.355366] __x64_sys_unlinkat+0x109/0x1e0 [ 400.355375] do_syscall_64+0x82/0x160 [ 400.355384] entrada_SYSCALL_64_after_hwframe+0x76/0x7 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7baf94232651f39f7108c23bc9548bff89bdc77b", diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53208.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53208.json index 0329667acb2..dea66464d07 100644 --- a/CVE-2024/CVE-2024-532xx/CVE-2024-53208.json +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53208.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53208", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:28.677", - "lastModified": "2025-01-16T16:46:38.657", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-06T17:15:20.330", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56551.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56551.json index 819a57bd568..8895618f91f 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56551.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56551.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56551", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:13.850", - "lastModified": "2025-01-23T17:15:15.510", + "lastModified": "2025-03-06T17:15:20.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56658.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56658.json index ba2e5b9a95e..2fdd8b61ab3 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56658.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56658.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56658", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:25.643", - "lastModified": "2025-01-06T19:29:49.770", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-06T17:15:20.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json new file mode 100644 index 00000000000..d1507561266 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58076.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58076", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:20.997", + "lastModified": "2025-03-06T17:15:20.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: gcc-sm6350: Add missing parent_map for two clocks\n\nIf a clk_rcg2 has a parent, it should also have parent_map defined,\notherwise we'll get a NULL pointer dereference when calling clk_set_rate\nlike the following:\n\n [ 3.388105] Call trace:\n [ 3.390664] qcom_find_src_index+0x3c/0x70 (P)\n [ 3.395301] qcom_find_src_index+0x1c/0x70 (L)\n [ 3.399934] _freq_tbl_determine_rate+0x48/0x100\n [ 3.404753] clk_rcg2_determine_rate+0x1c/0x28\n [ 3.409387] clk_core_determine_round_nolock+0x58/0xe4\n [ 3.421414] clk_core_round_rate_nolock+0x48/0xfc\n [ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc\n [ 3.444483] clk_core_set_rate_nolock+0x8c/0x300\n [ 3.455886] clk_set_rate+0x38/0x14c\n\nAdd the parent_map property for two clocks where it's missing and also\nun-inline the parent_data as well to keep the matching parent_map and\nparent_data together." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/08b77ed7cfaac62bba51ac7a0487409ec9fcbc84", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/39336edd14a59dc086fb19957655e0f340bb28e8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3e567032233a240b903dc11c9f18eeb3faa10ffa", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/96fe1a7ee477d701cfc98ab9d3c730c35d966861", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b6fe13566bf5676b1e3b72d2a06d875733e93ee6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58077.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58077.json new file mode 100644 index 00000000000..35054834fbd --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58077.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58077", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.123", + "lastModified": "2025-03-06T17:15:21.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback\n\ncommit 1f5664351410 (\"ASoC: lower \"no backend DAIs enabled for ... Port\"\nlog severity\") ignores -EINVAL error message on common soc_pcm_ret().\nIt is used from many functions, ignoring -EINVAL is over-kill.\n\nThe reason why -EINVAL was ignored was it really should only be used\nupon invalid parameters coming from userspace and in that case we don't\nwant to log an error since we do not want to give userspace a way to do\na denial-of-service attack on the syslog / diskspace.\n\nSo don't use soc_pcm_ret() on .prepare callback is better idea." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/301c26a018acb94dd537a4418cefa0f654500c6f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/79b8c7c93beb4f5882c9ee5b9ba73354fa4bc9ee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8ec4e8c8e142933eaa8e1ed87168831069250e4e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/90778f31efdf44622065ebbe8d228284104bd26f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b65ba768302adc7ddc70811116cef80ca089af59", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58078.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58078.json new file mode 100644 index 00000000000..41940ebc438 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58078.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-58078", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.250", + "lastModified": "2025-03-06T17:15:21.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors\n\nmisc_minor_alloc was allocating id using ida for minor only in case of\nMISC_DYNAMIC_MINOR but misc_minor_free was always freeing ids\nusing ida_free causing a mismatch and following warn:\n> > WARNING: CPU: 0 PID: 159 at lib/idr.c:525 ida_free+0x3e0/0x41f\n> > ida_free called for id=127 which is not allocated.\n> > <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n...\n> > [<60941eb4>] ida_free+0x3e0/0x41f\n> > [<605ac993>] misc_minor_free+0x3e/0xbc\n> > [<605acb82>] misc_deregister+0x171/0x1b3\n\nmisc_minor_alloc is changed to allocate id from ida for all minors\nfalling in the range of dynamic/ misc dynamic minors" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3df72111c39f7e4c5029c9ff720b56ec2e05b764", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6635332d246d7db89b90e145f2bf937406cecaf0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6d04d2b554b14ae6c428a9c60b6c85f1e5c89f68", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8b4120b3e060e137eaa8dc76a1c40401088336e5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58079.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58079.json new file mode 100644 index 00000000000..2e97efb8618 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58079.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-58079", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.360", + "lastModified": "2025-03-06T17:15:21.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix crash during unbind if gpio unit is in use\n\nWe used the wrong device for the device managed functions. We used the\nusb device, when we should be using the interface device.\n\nIf we unbind the driver from the usb interface, the cleanup functions\nare never called. In our case, the IRQ is never disabled.\n\nIf an IRQ is triggered, it will try to access memory sections that are\nalready free, causing an OOPS.\n\nWe cannot use the function devm_request_threaded_irq here. The devm_*\nclean functions may be called after the main structure is released by\nuvc_delete.\n\nLuckily this bug has small impact, as it is only affected by devices\nwith gpio units and the user has to unbind the device, a disconnect will\nnot trigger this error." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0b5e0445bc8384c18bd35cb9fe87f6258c6271d9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5d2e65cbe53d0141ed095cf31c2dcf3d8668c11d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a9ea1a3d88b7947ce8cadb2afceee7a54872bbc5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d2eac8b14ac690aa73052aa6d4ba69005715367e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json new file mode 100644 index 00000000000..49d62c3091e --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58080.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58080", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.473", + "lastModified": "2025-03-06T17:15:21.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: dispcc-sm6350: Add missing parent_map for a clock\n\nIf a clk_rcg2 has a parent, it should also have parent_map defined,\notherwise we'll get a NULL pointer dereference when calling clk_set_rate\nlike the following:\n\n [ 3.388105] Call trace:\n [ 3.390664] qcom_find_src_index+0x3c/0x70 (P)\n [ 3.395301] qcom_find_src_index+0x1c/0x70 (L)\n [ 3.399934] _freq_tbl_determine_rate+0x48/0x100\n [ 3.404753] clk_rcg2_determine_rate+0x1c/0x28\n [ 3.409387] clk_core_determine_round_nolock+0x58/0xe4\n [ 3.421414] clk_core_round_rate_nolock+0x48/0xfc\n [ 3.432974] clk_core_round_rate_nolock+0xd0/0xfc\n [ 3.444483] clk_core_set_rate_nolock+0x8c/0x300\n [ 3.455886] clk_set_rate+0x38/0x14c\n\nAdd the parent_map property for the clock where it's missing and also\nun-inline the parent_data as well to keep the matching parent_map and\nparent_data together." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2dba8d5d423fa5f6f3a687aa6e0da5808f69091b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3ad28517385e2821e8e43388d6a0b3e1ba0bc3ab", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3daca9050857220726732ad9d4a8512069386f46", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a1f15808adfd77268eac7fefce5378ad9fedbfba", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d4cdb196f182d2fbe336c968228be00d8c3fed05", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json new file mode 100644 index 00000000000..5f154660be8 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58081.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-58081", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.577", + "lastModified": "2025-03-06T17:15:21.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mmp2: call pm_genpd_init() only after genpd.name is set\n\nSetting the genpd's struct device's name with dev_set_name() is\nhappening within pm_genpd_init(). If it remains NULL, things can blow up\nlater, such as when crafting the devfs hierarchy for the power domain:\n\n Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read\n ...\n Call trace:\n strlen from start_creating+0x90/0x138\n start_creating from debugfs_create_dir+0x20/0x178\n debugfs_create_dir from genpd_debug_add.part.0+0x4c/0x144\n genpd_debug_add.part.0 from genpd_debug_init+0x74/0x90\n genpd_debug_init from do_one_initcall+0x5c/0x244\n do_one_initcall from kernel_init_freeable+0x19c/0x1f4\n kernel_init_freeable from kernel_init+0x1c/0x12c\n kernel_init from ret_from_fork+0x14/0x28\n\nBisecting tracks this crash back to commit 899f44531fe6 (\"pmdomain: core:\nAdd GENPD_FLAG_DEV_NAME_FW flag\"), which exchanges use of genpd->name\nwith dev_name(&genpd->dev) in genpd_debug_add.part()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/763517124e27b07fa300b486d7d13c5d563a215e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e24b15d4704dcb73920c3d18a6157abd18df08c1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/eca01d5911fb34218d10a58d8d9534b758c8fd0a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58082.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58082.json new file mode 100644 index 00000000000..0beb5a7cda2 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58082.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-58082", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.677", + "lastModified": "2025-03-06T17:15:21.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nuvoton: Fix an error check in npcm_video_ece_init()\n\nWhen function of_find_device_by_node() fails, it returns NULL instead of\nan error code. So the corresponding error check logic should be modified\nto check whether the return value is NULL and set the error code to be\nreturned as -ENODEV." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/bdd823b9d068284e1d998b962cfef29236365df3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c36b830754ae1dd1db41c27f57b29267878f9702", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c4b7779abc6633677e6edb79e2809f4f61fde157", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58083.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58083.json new file mode 100644 index 00000000000..13f9fe66632 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58083.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58083", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.773", + "lastModified": "2025-03-06T17:15:21.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Explicitly verify target vCPU is online in kvm_get_vcpu()\n\nExplicitly verify the target vCPU is fully online _prior_ to clamping the\nindex in kvm_get_vcpu(). If the index is \"bad\", the nospec clamping will\ngenerate '0', i.e. KVM will return vCPU0 instead of NULL.\n\nIn practice, the bug is unlikely to cause problems, as it will only come\ninto play if userspace or the guest is buggy or misbehaving, e.g. KVM may\nsend interrupts to vCPU0 instead of dropping them on the floor.\n\nHowever, returning vCPU0 when it shouldn't exist per online_vcpus is\nproblematic now that KVM uses an xarray for the vCPUs array, as KVM needs\nto insert into the xarray before publishing the vCPU to userspace (see\ncommit c5b077549136 (\"KVM: Convert the kvm->vcpus array to a xarray\")),\ni.e. before vCPU creation is guaranteed to succeed.\n\nAs a result, incorrectly providing access to vCPU0 will trigger a\nuse-after-free if vCPU0 is dereferenced and kvm_vm_ioctl_create_vcpu()\nbails out of vCPU creation due to an error and frees vCPU0. Commit\nafb2acb2e3a3 (\"KVM: Fix vcpu_array[0] races\") papered over that issue, but\nin doing so introduced an unsolvable teardown conundrum. Preventing\naccesses to vCPU0 before it's fully online will allow reverting commit\nafb2acb2e3a3, without re-introducing the vcpu_array[0] UAF race." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/125da53b3c0c9d7f58353aea0076e9efd6498ba7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1e7381f3617d14b3c11da80ff5f8a93ab14cfc46", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ca8da90ed1432ff3d000de4f1e2275d4e7d21b96", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d817e510662fd1c9797952408d94806f97a5fffd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f2f805ada63b536bc192458a7098388286568ad4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58084.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58084.json new file mode 100644 index 00000000000..9ea356833fd --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58084.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-58084", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.890", + "lastModified": "2025-03-06T17:15:21.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: qcom: scm: Fix missing read barrier in qcom_scm_get_tzmem_pool()\n\nCommit 2e4955167ec5 (\"firmware: qcom: scm: Fix __scm and waitq\ncompletion variable initialization\") introduced a write barrier in probe\nfunction to store global '__scm' variable. We all known barriers are\npaired (see memory-barriers.txt: \"Note that write barriers should\nnormally be paired with read or address-dependency barriers\"), therefore\naccessing it from concurrent contexts requires read barrier. Previous\ncommit added such barrier in qcom_scm_is_available(), so let's use that\ndirectly.\n\nLack of this read barrier can result in fetching stale '__scm' variable\nvalue, NULL, and dereferencing it.\n\nNote that barrier in qcom_scm_is_available() satisfies here the control\ndependency." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/b628510397b5cafa1f5d3e848a28affd1c635302", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e03db7c1255ebabba5e1a447754faeb138de15a2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fee921e3c641f64185abee83f9a6e65f0b380682", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58085.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58085.json new file mode 100644 index 00000000000..db828c4d320 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58085.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58085", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:21.993", + "lastModified": "2025-03-06T17:15:21.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: don't emit warning in tomoyo_write_control()\n\nsyzbot is reporting too large allocation warning at tomoyo_write_control(),\nfor one can write a very very long line without new line character. To fix\nthis warning, I use __GFP_NOWARN rather than checking for KMALLOC_MAX_SIZE,\nfor practically a valid line should be always shorter than 32KB where the\n\"too small to fail\" memory-allocation rule applies.\n\nOne might try to write a valid line that is longer than 32KB, but such\nrequest will likely fail with -ENOMEM. Therefore, I feel that separately\nreturning -EINVAL when a line is longer than KMALLOC_MAX_SIZE is redundant.\nThere is no need to distinguish over-32KB and over-KMALLOC_MAX_SIZE." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3df7546fc03b8f004eee0b9e3256369f7d096685", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/414705c0303350d139b1dc18f329fe47dfb642dd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a01c200fa7eb59da4d2dbbb48b61f4a0d196c09f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c9382f380e8d09209b8e5c0def0545852168be25", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fe1c021eb03dae0dc9dce55e81f77a60e419a27a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58086.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58086.json new file mode 100644 index 00000000000..d5bfae85f60 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58086.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58086", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:22.117", + "lastModified": "2025-03-06T17:15:22.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/v3d: Stop active perfmon if it is being destroyed\n\nIf the active performance monitor (`v3d->active_perfmon`) is being\ndestroyed, stop it first. Currently, the active perfmon is not\nstopped during destruction, leaving the `v3d->active_perfmon` pointer\nstale. This can lead to undefined behavior and instability.\n\nThis patch ensures that the active perfmon is stopped before being\ndestroyed, aligning with the behavior introduced in commit\n7d1fd3638ee3 (\"drm/v3d: Stop the active perfmon before being destroyed\")." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1c5673a2c8926adbb61f340c779b28e18188a8cd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/21f1435b1e6b012a07c42f36b206d2b66fc8f13b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/95036d4c01167568166108d42c2b0e9f8dbd7d2b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/eb0e0eca0eab93f310c6c37b8564049366704691", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f8805b12f477bd964e2820a87921c7b58cc2dee3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8425.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8425.json index 49e2fd0387a..9e59630a76e 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8425.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8425.json @@ -2,19 +2,43 @@ "id": "CVE-2024-8425", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:11.083", - "lastModified": "2025-02-28T09:15:11.083", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.6.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El complemento WooCommerce Ultimate Gift Card para WordPress es vulnerable a la carga de archivos arbitrarios debido a una validaci\u00f3n de tipo de archivo insuficiente en las funciones 'mwb_wgm_preview_mail' y 'mwb_wgm_woocommerce_add_cart_item_data' en todas las versiones hasta la 2.6.0 incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -45,16 +69,50 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpswings:woocommerce_ultimate_gift_card:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.6.0", + "matchCriteriaId": "B4B1A329-4386-4BD5-9E2D-44F680812FFC" + } + ] + } + ] } ], "references": [ { "url": "https://codecanyon.net/item/woocommerce-ultimate-gift-card/19191057", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ebffb82-7455-40c9-9ffd-b78e0e73e431?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9019.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9019.json index 8d0782e5310..a6f9a409fc1 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9019.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9019.json @@ -2,20 +2,24 @@ "id": "CVE-2024-9019", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:11.270", - "lastModified": "2025-02-28T09:15:11.270", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SecuPress Free \u2014 WordPress Security plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's secupress_check_ban_ips_form shortcode in all versions up to, and including, 2.2.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento SecuPress Free \u2014 WordPress Security para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado secupress_check_ban_ips_form del complemento en todas las versiones hasta la 2.2.5.3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:secupress:secupress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2.5.3", + "matchCriteriaId": "8D9B79E0-6565-4526-9C30-0BAE363B1720" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/secupress/trunk/free/common.php#L238", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56e842c8-61ac-4281-8c4a-9cb1f8ecc062?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9888.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9888.json index 0cf1dc71389..cde9992405c 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9888.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9888.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9888", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T06:15:03.650", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T18:13:11.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.9", + "matchCriteriaId": "E307C7D7-F040-4D1D-83E9-2E28E024F4E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3168782/elementinvader-addons-for-elementor/trunk/modules/forms/ajax-handler.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba9d12c5-fe3a-4958-8d35-c63bb05b6d5a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0337.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0337.json new file mode 100644 index 00000000000..85ecc8ed4e1 --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0337.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-0337", + "sourceIdentifier": "psirt@servicenow.com", + "published": "2025-03-06T17:15:22.303", + "lastModified": "2025-03-06T17:15:22.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ServiceNow has addressed an authorization bypass vulnerability that was identified in the Washington release of the Now Platform. This vulnerability, if exploited, potentially could enable an authenticated user to access unauthorized data stored within the Now Platform that the user otherwise would not be entitled to access. \n\nThis issue is addressed in the listed patches and family release, which have been made available to hosted and self-hosted customers, as well as partners." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1948695", + "source": "psirt@servicenow.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0764.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0764.json index 1052e438b4f..5d85631e964 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0764.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0764.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0764", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T07:15:33.863", - "lastModified": "2025-02-28T07:15:33.863", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:55.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wpForo Forum plugin for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'update' method of the 'Members' class in all versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with subscriber-level privileges or higher, to read arbitrary files on the server." + }, + { + "lang": "es", + "value": "El complemento wpForo Forum para WordPress es vulnerable a la lectura arbitraria de archivos debido a una validaci\u00f3n de entrada insuficiente en el m\u00e9todo 'update' de la clase 'Members' en todas las versiones hasta la 2.4.1 incluida. Esto hace posible que atacantes autenticados, con privilegios de nivel de suscriptor o superiores, lean archivos arbitrarios en el servidor." } ], "metrics": { @@ -45,16 +49,50 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.2", + "matchCriteriaId": "0A8C5320-0C88-4BF0-B458-9CB0EC6057AC" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3245711/wpforo", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8cd8ffcb-0a24-4e0a-a9f9-23501742715f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1405.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1405.json index 9b59a99c5a0..da83a133dc5 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1405.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1405.json @@ -2,20 +2,24 @@ "id": "CVE-2025-1405", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T07:15:34.063", - "lastModified": "2025-02-28T07:15:34.063", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:55.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Product Catalog Simple plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's show_products shortcode in all versions up to, and including, 1.7.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Product Catalog Simple para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado show_products del complemento en todas las versiones hasta la 1.7.11 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,20 +69,58 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:implecode:product_catalog_simple:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "1CD0F864-C574-417C-84AE-CEE4A78B21EF" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3246414/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/post-type-x/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2ddd9a2-79d7-4f9c-9832-25c3363d3ce9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1511.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1511.json index 47ae27cd8ca..dcf53154fa1 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1511.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1511.json @@ -2,19 +2,43 @@ "id": "CVE-2025-1511", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T06:15:25.750", - "lastModified": "2025-02-28T06:15:25.750", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:55.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The User Registration & Membership \u2013 Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 4.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento User Registration & Membership \u2013 Custom Registration Form, Login Form, and User Profile para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 's' en todas las versiones hasta la 4.0.4 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -45,20 +69,57 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpeverest:user_registration:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.1.0", + "matchCriteriaId": "A20A533F-4DC0-40EA-AA1E-C78323E454C6" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/user-registration/tags/4.0.2/modules/membership/includes/Admin/Membership/ListTable.php#L246", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3246826/user-registration/tags/4.1.0/modules/membership/includes/Admin/Membership/ListTable.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e0bee7c-8dce-421c-af16-7e5152797e6c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1513.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1513.json index c5824775ac4..6ea73664a1b 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1513.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1513.json @@ -2,20 +2,24 @@ "id": "CVE-2025-1513", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T06:15:25.937", - "lastModified": "2025-02-28T06:15:25.937", - "vulnStatus": "Received", + "lastModified": "2025-03-06T17:52:55.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery \u2013 Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Name and Comment field when commenting on photo gallery entries in all versions up to, and including, 26.0.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery \u2013 Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del campo Nombre y Comentario al comentar las entradas de la galer\u00eda de fotos en todas las versiones hasta la 26.0.0.1 incluida debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "26.0.1", + "matchCriteriaId": "92383DCE-86AC-40B0-B684-9393B4D05996" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3245199%40contest-gallery&new=3245199%40contest-gallery&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1b5cf360-0163-4a7c-8979-ec89ec80ad62?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1572.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1572.json index dfdeb1efd7f..9ec51c98301 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1572.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1572.json @@ -2,20 +2,24 @@ "id": "CVE-2025-1572", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T08:15:35.810", - "lastModified": "2025-02-28T08:15:35.810", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:54.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The KiviCare \u2013 Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the \u2018u_id\u2019 parameter in all versions up to, and including, 3.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with doctor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento KiviCare \u2013 Clinic & Patient Management System (EHR) para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'u_id' en todas las versiones hasta la 3.6.7 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso a nivel m\u00e9dico y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,32 +69,79 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iqonic:kivicare:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.6.8", + "matchCriteriaId": "87E8F39E-ADD1-469B-99B7-B771B05658FD" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php#L330", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php#L331", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3245759/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3245759/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/kivicare-clinic-management-system/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eb6b0c35-b478-4616-a708-1fd243c95c14?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json index aa8a717aece..7741bf2dcd1 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2031", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-06T16:15:55.727", - "lastModified": "2025-03-06T16:15:55.727", + "lastModified": "2025-03-06T17:15:24.153", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.512029", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/IceFoxH/VULN/issues/6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2032.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2032.json new file mode 100644 index 00000000000..0496e474df9 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2032.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-2032", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-06T17:15:24.297", + "lastModified": "2025-03-06T17:15:24.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in ChestnutCMS 1.5.2. This vulnerability affects the function renameFile of the file /cms/file/rename. The manipulation of the argument rename leads to path traversal. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 2.7, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 5.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/IceFoxH/VULN/issues/7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298774", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298774", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.512030", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2033.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2033.json new file mode 100644 index 00000000000..56bc1aa97df --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2033.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-2033", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-06T17:15:24.490", + "lastModified": "2025-03-06T17:15:24.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /user_dashboard/view_donor.php. The manipulation of the argument donor_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/intercpt/XSS1/blob/main/SQL.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298776", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298776", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.512164", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2034.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2034.json new file mode 100644 index 00000000000..f42966faed4 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2034.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-2034", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-06T18:15:43.230", + "lastModified": "2025-03-06T18:15:43.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit-class.php?cid=1. The manipulation of the argument classname/capacity leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wangCCTV/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298777", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298777", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.512292", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2035.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2035.json new file mode 100644 index 00000000000..df9ea387c33 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2035.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2035", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-06T18:15:43.457", + "lastModified": "2025-03-06T18:15:43.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in s-a-zhd Ecommerce-Website-using-PHP 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /customer_register.php. The manipulation of the argument name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.298778", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298778", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.512404", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.websecurityinsights.my.id/2025/03/e-commerce-v-10-customer-image.html?m=1", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21829.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21829.json new file mode 100644 index 00000000000..8773f566620 --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21829.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-21829", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:22.820", + "lastModified": "2025-03-06T17:15:22.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix the warning \"__rxe_cleanup+0x12c/0x170 [rdma_rxe]\"\n\nThe Call Trace is as below:\n\"\n \n ? show_regs.cold+0x1a/0x1f\n ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n ? __warn+0x84/0xd0\n ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n ? report_bug+0x105/0x180\n ? handle_bug+0x46/0x80\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n ? __rxe_cleanup+0x124/0x170 [rdma_rxe]\n rxe_destroy_qp.cold+0x24/0x29 [rdma_rxe]\n ib_destroy_qp_user+0x118/0x190 [ib_core]\n rdma_destroy_qp.cold+0x43/0x5e [rdma_cm]\n rtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core]\n rtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server]\n process_one_work+0x21d/0x3f0\n worker_thread+0x4a/0x3c0\n ? process_one_work+0x3f0/0x3f0\n kthread+0xf0/0x120\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x22/0x30\n \n\"\nWhen too many rdma resources are allocated, rxe needs more time to\nhandle these rdma resources. Sometimes with the current timeout, rxe\ncan not release the rdma resources correctly.\n\nCompared with other rdma drivers, a bigger timeout is used." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/45e567800492088bc52c9abac35524b4d332a8f8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/720653309dd31c8a927ef5d87964578ad544980f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7a2de8126ed3801f2396720e10a03cd546a3cea1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a7d15eaecf0d6e13226db629ae2401c8c02683e5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/edc4ef0e0154096d6c0cf5e06af6fc330dbad9d1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21830.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21830.json new file mode 100644 index 00000000000..abd2b612bab --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21830.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-21830", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:22.943", + "lastModified": "2025-03-06T17:15:22.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Handle weird files\n\nA corrupted filesystem (e.g. bcachefs) might return weird files.\nInstead of throwing a warning and allowing access to such file, treat\nthem as regular files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0fde195a373ab1267e60baa9e1a703a97e7464cd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2569e65d2eb6ac1afe6cb6dfae476afee8b6771a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/39bb3d56f1c351e76bb18895d0e73796e653d5c1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/49440290a0935f428a1e43a5ac8dc275a647ff80", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7d6121228959ddf44a4b9b6a177384ac7854e2f9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21831.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21831.json new file mode 100644 index 00000000000..f9ee617fa89 --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21831.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-21831", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:23.060", + "lastModified": "2025-03-06T17:15:23.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1\n\ncommit 9d26d3a8f1b0 (\"PCI: Put PCIe ports into D3 during suspend\") sets the\npolicy that all PCIe ports are allowed to use D3. When the system is\nsuspended if the port is not power manageable by the platform and won't be\nused for wakeup via a PME this sets up the policy for these ports to go\ninto D3hot.\n\nThis policy generally makes sense from an OSPM perspective but it leads to\nproblems with wakeup from suspend on the TUXEDO Sirius 16 Gen 1 with a\nspecific old BIOS. This manifests as a system hang.\n\nOn the affected Device + BIOS combination, add a quirk for the root port of\nthe problematic controller to ensure that these root ports are not put into\nD3hot at suspend.\n\nThis patch is based on\n\n https://lore.kernel.org/linux-pci/20230708214457.1229-2-mario.limonciello@amd.com\n\nbut with the added condition both in the documentation and in the code to\napply only to the TUXEDO Sirius 16 Gen 1 with a specific old BIOS and only\nthe affected root ports." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5ee3dd6e59b834e4d66e8b16fc684749ee40a257", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8852e056e297df1d8635ee7504e780d3184e45d0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a78dfe50fffe6058afed2bb04c50c2c9a16664ee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b1049f2d68693c80a576c4578d96774a68df2bad", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21832.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21832.json new file mode 100644 index 00000000000..965a0ae64b9 --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21832.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-21832", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:23.177", + "lastModified": "2025-03-06T17:15:23.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: don't revert iter for -EIOCBQUEUED\n\nblkdev_read_iter() has a few odd checks, like gating the position and\ncount adjustment on whether or not the result is bigger-than-or-equal to\nzero (where bigger than makes more sense), and not checking the return\nvalue of blkdev_direct_IO() before doing an iov_iter_revert(). The\nlatter can lead to attempting to revert with a negative value, which\nwhen passed to iov_iter_revert() as an unsigned value will lead to\nthrowing a WARN_ON() because unroll is bigger than MAX_RW_COUNT.\n\nBe sane and don't revert for -EIOCBQUEUED, like what is done in other\nspots." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/68f16d3034a06661245ecd22f0d586a8b4e7c473", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6c26619effb1b4cb7d20b4e666ab8f71f6a53ccb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/84671b0630ccb46ae9f1f99a45c7d63ffcd6a474", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a58f136bad29f9ae721a29d98c042fddbee22f77", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b13ee668e8280ca5b07f8ce2846b9957a8a10853", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json new file mode 100644 index 00000000000..cd8ada9a51e --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21833.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-21833", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:23.293", + "lastModified": "2025-03-06T17:15:23.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Avoid use of NULL after WARN_ON_ONCE\n\nThere is a WARN_ON_ONCE to catch an unlikely situation when\ndomain_remove_dev_pasid can't find the `pasid`. In case it nevertheless\nhappens we must avoid using a NULL pointer." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/60f030f7418d3f1d94f2fb207fe3080e1844630b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/df96876be3b064aefc493f760e0639765d13ed0d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21834.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21834.json new file mode 100644 index 00000000000..6e2a7fa804b --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21834.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-21834", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T17:15:23.397", + "lastModified": "2025-03-06T17:15:23.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nseccomp: passthrough uretprobe systemcall without filtering\n\nWhen attaching uretprobes to processes running inside docker, the attached\nprocess is segfaulted when encountering the retprobe.\n\nThe reason is that now that uretprobe is a system call the default seccomp\nfilters in docker block it as they only allow a specific set of known\nsyscalls. This is true for other userspace applications which use seccomp\nto control their syscall surface.\n\nSince uretprobe is a \"kernel implementation detail\" system call which is\nnot used by userspace application code directly, it is impractical and\nthere's very little point in forcing all userspace applications to\nexplicitly allow it in order to avoid crashing tracked processes.\n\nPass this systemcall through seccomp without depending on configuration.\n\nNote: uretprobe is currently only x86_64 and isn't expected to ever be\nsupported in i386.\n\n[kees: minimized changes for easier backporting, tweaked commit log]" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5a262628f4cf2437d863fe41f9d427177b87664c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cf6cb56ef24410fb5308f9655087f1eddf4452e6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fa80018aa5be10c35e9fa896b7b4061a8dce3eed", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25793.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25793.json index 68409fda4b9..426ab24ac26 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25793.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25793.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25793", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.367", - "lastModified": "2025-02-26T15:15:27.367", - "vulnStatus": "Received", + "lastModified": "2025-03-06T18:15:41.480", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que SeaCMS v13.3 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente admin_notify.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://seacms.com", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25794.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25794.json index a5ef4d27140..e0ed6ea2990 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25794.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25794.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25794", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.490", - "lastModified": "2025-02-26T15:15:27.490", - "vulnStatus": "Received", + "lastModified": "2025-03-06T18:15:41.883", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que SeaCMS v13.3 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente admin_ping.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://seacms.com", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25796.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25796.json index 4f1f807f0f7..b518cbcbb84 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25796.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25796.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25796", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.620", - "lastModified": "2025-02-26T15:15:27.620", - "vulnStatus": "Received", + "lastModified": "2025-03-06T18:15:42.103", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que SeaCMS v13.3 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente admin_template.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://seacms.com", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25797.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25797.json index bed3e80b891..022feef22fa 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25797.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25797.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25797", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.743", - "lastModified": "2025-02-26T15:15:27.743", - "vulnStatus": "Received", + "lastModified": "2025-03-06T18:15:42.377", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que SeaCMS v13.3 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente admin_smtp.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://seacms.com", diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json index 9b3d788a40e..e6a5cdf4907 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25799.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25799", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:27.870", - "lastModified": "2025-02-26T15:15:27.870", - "vulnStatus": "Received", + "lastModified": "2025-03-06T18:15:42.587", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que SeaCMS 13.3 contiene una vulnerabilidad de lectura de archivos arbitrarios en la funci\u00f3n file_get_contents en admin_safe.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], "references": [ { "url": "http://seacms.com", diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json index 5a80d047b23..ccf280785f7 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25802.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25802", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:28.127", - "lastModified": "2025-02-26T15:15:28.127", - "vulnStatus": "Received", + "lastModified": "2025-03-06T18:15:42.800", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que SeaCMS v13.3 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente admin_ip.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://seacms.com", diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json index 9df21de6a45..4ec5715bcf5 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25813.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25813", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-26T15:15:28.250", - "lastModified": "2025-02-26T15:15:28.250", - "vulnStatus": "Received", + "lastModified": "2025-03-06T18:15:43.027", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que SeaCMS v13.3 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente admin_files.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://seacms.com", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27622.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27622.json index 68395307542..a5ad1f07524 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27622.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27622.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27622", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-03-05T23:15:13.990", - "lastModified": "2025-03-05T23:15:13.990", + "lastModified": "2025-03-06T17:15:23.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read permission to view encrypted values of secrets." + }, + { + "lang": "es", + "value": "Jenkins 2.499 y anteriores, LTS 2.492.1 y anteriores no redactan los valores cifrados de los secretos al acceder a `config.xml` de los agentes a trav\u00e9s de la API REST o CLI, lo que permite a los atacantes con permiso de Agente/Lectura extendida ver los valores cifrados de los secretos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3495", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27623.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27623.json index d204f27078f..438d0095de4 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27623.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27623.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27623", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-03-05T23:15:14.097", - "lastModified": "2025-03-05T23:15:14.097", + "lastModified": "2025-03-06T17:15:23.647", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission to view encrypted values of secrets." + }, + { + "lang": "es", + "value": "Jenkins 2.499 y anteriores, LTS 2.492.1 y anteriores no redactan los valores cifrados de los secretos al acceder a `config.xml` de las vistas a trav\u00e9s de la API REST o CLI, lo que permite a los atacantes con permiso de Ver/Leer ver los valores cifrados de los secretos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3496", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27624.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27624.json index aaa662ad926..aee9df5f941 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27624.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27624.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27624", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-03-05T23:15:14.197", - "lastModified": "2025-03-05T23:15:14.197", + "lastModified": "2025-03-06T17:15:23.797", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets)." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Request Forgery (CSRF) en Jenkins 2.499 y anteriores, LTS 2.492.1 y anteriores permite a los atacantes hacer que los usuarios alternen el estado contra\u00eddo/expandido de los widgets del panel lateral (por ejemplo, los widgets Cola de compilaci\u00f3n y Estado del ejecutor de compilaci\u00f3n)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3498", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27625.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27625.json index bf064bd567e..0e14d831c9c 100644 --- a/CVE-2025/CVE-2025-276xx/CVE-2025-27625.json +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27625.json @@ -2,16 +2,55 @@ "id": "CVE-2025-27625", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-03-05T23:15:14.297", - "lastModified": "2025-03-05T23:15:14.297", + "lastModified": "2025-03-06T17:15:23.960", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects." + }, + { + "lang": "es", + "value": "En Jenkins 2.499 y anteriores, LTS 2.492.1 y anteriores, las redirecciones que comienzan con caracteres de barra invertida (`\\`) se consideran seguras, lo que permite a los atacantes realizar ataques de phishing haciendo que los usuarios accedan a una URL de Jenkins que los reenviar\u00e1 a un sitio diferente, porque los navegadores interpretan estos caracteres como parte de redirecciones relativas al esquema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3501", diff --git a/README.md b/README.md index bf7d3480be7..753595ad38d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-06T17:00:20.693536+00:00 +2025-03-06T19:00:21.526423+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-06T16:36:34.470000+00:00 +2025-03-06T18:15:43.457000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284351 +284377 ``` ### CVEs added in the last Commit -Recently added CVEs: `37` +Recently added CVEs: `26` -- [CVE-2024-58061](CVE-2024/CVE-2024-580xx/CVE-2024-58061.json) (`2025-03-06T16:15:52.390`) -- [CVE-2024-58062](CVE-2024/CVE-2024-580xx/CVE-2024-58062.json) (`2025-03-06T16:15:52.490`) -- [CVE-2024-58063](CVE-2024/CVE-2024-580xx/CVE-2024-58063.json) (`2025-03-06T16:15:52.583`) -- [CVE-2024-58064](CVE-2024/CVE-2024-580xx/CVE-2024-58064.json) (`2025-03-06T16:15:52.733`) -- [CVE-2024-58065](CVE-2024/CVE-2024-580xx/CVE-2024-58065.json) (`2025-03-06T16:15:52.830`) -- [CVE-2024-58066](CVE-2024/CVE-2024-580xx/CVE-2024-58066.json) (`2025-03-06T16:15:52.997`) -- [CVE-2024-58067](CVE-2024/CVE-2024-580xx/CVE-2024-58067.json) (`2025-03-06T16:15:53.150`) -- [CVE-2024-58068](CVE-2024/CVE-2024-580xx/CVE-2024-58068.json) (`2025-03-06T16:15:53.257`) -- [CVE-2024-58069](CVE-2024/CVE-2024-580xx/CVE-2024-58069.json) (`2025-03-06T16:15:53.373`) -- [CVE-2024-58070](CVE-2024/CVE-2024-580xx/CVE-2024-58070.json) (`2025-03-06T16:15:53.480`) -- [CVE-2024-58071](CVE-2024/CVE-2024-580xx/CVE-2024-58071.json) (`2025-03-06T16:15:53.593`) -- [CVE-2024-58072](CVE-2024/CVE-2024-580xx/CVE-2024-58072.json) (`2025-03-06T16:15:53.703`) -- [CVE-2024-58073](CVE-2024/CVE-2024-580xx/CVE-2024-58073.json) (`2025-03-06T16:15:53.833`) -- [CVE-2024-58074](CVE-2024/CVE-2024-580xx/CVE-2024-58074.json) (`2025-03-06T16:15:53.943`) -- [CVE-2024-58075](CVE-2024/CVE-2024-580xx/CVE-2024-58075.json) (`2025-03-06T16:15:54.040`) -- [CVE-2025-2029](CVE-2025/CVE-2025-20xx/CVE-2025-2029.json) (`2025-03-06T15:15:17.943`) -- [CVE-2025-2030](CVE-2025/CVE-2025-20xx/CVE-2025-2030.json) (`2025-03-06T15:15:18.127`) -- [CVE-2025-2031](CVE-2025/CVE-2025-20xx/CVE-2025-2031.json) (`2025-03-06T16:15:55.727`) -- [CVE-2025-21825](CVE-2025/CVE-2025-218xx/CVE-2025-21825.json) (`2025-03-06T16:15:54.753`) -- [CVE-2025-21826](CVE-2025/CVE-2025-218xx/CVE-2025-21826.json) (`2025-03-06T16:15:54.863`) -- [CVE-2025-21827](CVE-2025/CVE-2025-218xx/CVE-2025-21827.json) (`2025-03-06T16:15:54.967`) -- [CVE-2025-21828](CVE-2025/CVE-2025-218xx/CVE-2025-21828.json) (`2025-03-06T16:15:55.070`) -- [CVE-2025-25450](CVE-2025/CVE-2025-254xx/CVE-2025-25450.json) (`2025-03-06T15:15:17.443`) -- [CVE-2025-25451](CVE-2025/CVE-2025-254xx/CVE-2025-25451.json) (`2025-03-06T15:15:17.553`) -- [CVE-2025-25452](CVE-2025/CVE-2025-254xx/CVE-2025-25452.json) (`2025-03-06T15:15:17.667`) +- [CVE-2024-51476](CVE-2024/CVE-2024-514xx/CVE-2024-51476.json) (`2025-03-06T17:15:19.763`) +- [CVE-2024-52923](CVE-2024/CVE-2024-529xx/CVE-2024-52923.json) (`2025-03-06T18:15:41.160`) +- [CVE-2024-52924](CVE-2024/CVE-2024-529xx/CVE-2024-52924.json) (`2025-03-06T18:15:41.320`) +- [CVE-2024-58076](CVE-2024/CVE-2024-580xx/CVE-2024-58076.json) (`2025-03-06T17:15:20.997`) +- [CVE-2024-58077](CVE-2024/CVE-2024-580xx/CVE-2024-58077.json) (`2025-03-06T17:15:21.123`) +- [CVE-2024-58078](CVE-2024/CVE-2024-580xx/CVE-2024-58078.json) (`2025-03-06T17:15:21.250`) +- [CVE-2024-58079](CVE-2024/CVE-2024-580xx/CVE-2024-58079.json) (`2025-03-06T17:15:21.360`) +- [CVE-2024-58080](CVE-2024/CVE-2024-580xx/CVE-2024-58080.json) (`2025-03-06T17:15:21.473`) +- [CVE-2024-58081](CVE-2024/CVE-2024-580xx/CVE-2024-58081.json) (`2025-03-06T17:15:21.577`) +- [CVE-2024-58082](CVE-2024/CVE-2024-580xx/CVE-2024-58082.json) (`2025-03-06T17:15:21.677`) +- [CVE-2024-58083](CVE-2024/CVE-2024-580xx/CVE-2024-58083.json) (`2025-03-06T17:15:21.773`) +- [CVE-2024-58084](CVE-2024/CVE-2024-580xx/CVE-2024-58084.json) (`2025-03-06T17:15:21.890`) +- [CVE-2024-58085](CVE-2024/CVE-2024-580xx/CVE-2024-58085.json) (`2025-03-06T17:15:21.993`) +- [CVE-2024-58086](CVE-2024/CVE-2024-580xx/CVE-2024-58086.json) (`2025-03-06T17:15:22.117`) +- [CVE-2025-0337](CVE-2025/CVE-2025-03xx/CVE-2025-0337.json) (`2025-03-06T17:15:22.303`) +- [CVE-2025-2032](CVE-2025/CVE-2025-20xx/CVE-2025-2032.json) (`2025-03-06T17:15:24.297`) +- [CVE-2025-2033](CVE-2025/CVE-2025-20xx/CVE-2025-2033.json) (`2025-03-06T17:15:24.490`) +- [CVE-2025-2034](CVE-2025/CVE-2025-20xx/CVE-2025-2034.json) (`2025-03-06T18:15:43.230`) +- [CVE-2025-2035](CVE-2025/CVE-2025-20xx/CVE-2025-2035.json) (`2025-03-06T18:15:43.457`) +- [CVE-2025-21829](CVE-2025/CVE-2025-218xx/CVE-2025-21829.json) (`2025-03-06T17:15:22.820`) +- [CVE-2025-21830](CVE-2025/CVE-2025-218xx/CVE-2025-21830.json) (`2025-03-06T17:15:22.943`) +- [CVE-2025-21831](CVE-2025/CVE-2025-218xx/CVE-2025-21831.json) (`2025-03-06T17:15:23.060`) +- [CVE-2025-21832](CVE-2025/CVE-2025-218xx/CVE-2025-21832.json) (`2025-03-06T17:15:23.177`) +- [CVE-2025-21833](CVE-2025/CVE-2025-218xx/CVE-2025-21833.json) (`2025-03-06T17:15:23.293`) +- [CVE-2025-21834](CVE-2025/CVE-2025-218xx/CVE-2025-21834.json) (`2025-03-06T17:15:23.397`) ### CVEs modified in the last Commit -Recently modified CVEs: `105` +Recently modified CVEs: `83` -- [CVE-2024-38674](CVE-2024/CVE-2024-386xx/CVE-2024-38674.json) (`2025-03-06T14:25:09.843`) -- [CVE-2024-38687](CVE-2024/CVE-2024-386xx/CVE-2024-38687.json) (`2025-03-06T14:24:40.890`) -- [CVE-2024-3874](CVE-2024/CVE-2024-38xx/CVE-2024-3874.json) (`2025-03-06T15:00:11.560`) -- [CVE-2024-4020](CVE-2024/CVE-2024-40xx/CVE-2024-4020.json) (`2025-03-06T15:00:11.560`) -- [CVE-2024-4236](CVE-2024/CVE-2024-42xx/CVE-2024-4236.json) (`2025-03-06T15:00:11.560`) -- [CVE-2024-43051](CVE-2024/CVE-2024-430xx/CVE-2024-43051.json) (`2025-03-06T15:21:24.387`) -- [CVE-2024-48246](CVE-2024/CVE-2024-482xx/CVE-2024-48246.json) (`2025-03-06T15:15:15.917`) -- [CVE-2024-4862](CVE-2024/CVE-2024-48xx/CVE-2024-4862.json) (`2025-03-06T14:24:40.890`) -- [CVE-2024-49292](CVE-2024/CVE-2024-492xx/CVE-2024-49292.json) (`2025-03-06T14:25:09.843`) -- [CVE-2024-51144](CVE-2024/CVE-2024-511xx/CVE-2024-51144.json) (`2025-03-06T15:15:16.080`) -- [CVE-2024-5427](CVE-2024/CVE-2024-54xx/CVE-2024-5427.json) (`2025-03-06T14:25:09.843`) -- [CVE-2024-5431](CVE-2024/CVE-2024-54xx/CVE-2024-5431.json) (`2025-03-06T14:25:09.843`) -- [CVE-2024-56063](CVE-2024/CVE-2024-560xx/CVE-2024-56063.json) (`2025-03-06T14:25:09.843`) -- [CVE-2024-56195](CVE-2024/CVE-2024-561xx/CVE-2024-56195.json) (`2025-03-06T16:15:49.230`) -- [CVE-2024-56196](CVE-2024/CVE-2024-561xx/CVE-2024-56196.json) (`2025-03-06T16:15:49.637`) -- [CVE-2024-56202](CVE-2024/CVE-2024-562xx/CVE-2024-56202.json) (`2025-03-06T16:15:50.053`) -- [CVE-2024-7150](CVE-2024/CVE-2024-71xx/CVE-2024-7150.json) (`2025-03-06T16:24:25.053`) -- [CVE-2024-8420](CVE-2024/CVE-2024-84xx/CVE-2024-8420.json) (`2025-03-06T16:36:34.470`) -- [CVE-2025-1319](CVE-2025/CVE-2025-13xx/CVE-2025-1319.json) (`2025-03-06T15:00:16.447`) -- [CVE-2025-1560](CVE-2025/CVE-2025-15xx/CVE-2025-1560.json) (`2025-03-06T15:00:16.447`) -- [CVE-2025-1570](CVE-2025/CVE-2025-15xx/CVE-2025-1570.json) (`2025-03-06T15:00:16.447`) -- [CVE-2025-1662](CVE-2025/CVE-2025-16xx/CVE-2025-1662.json) (`2025-03-06T15:00:16.447`) -- [CVE-2025-1979](CVE-2025/CVE-2025-19xx/CVE-2025-1979.json) (`2025-03-06T16:15:54.187`) -- [CVE-2025-25362](CVE-2025/CVE-2025-253xx/CVE-2025-25362.json) (`2025-03-06T15:15:17.277`) -- [CVE-2025-25632](CVE-2025/CVE-2025-256xx/CVE-2025-25632.json) (`2025-03-06T15:15:17.770`) +- [CVE-2024-53068](CVE-2024/CVE-2024-530xx/CVE-2024-53068.json) (`2025-03-06T17:15:19.957`) +- [CVE-2024-53182](CVE-2024/CVE-2024-531xx/CVE-2024-53182.json) (`2025-03-06T17:15:20.157`) +- [CVE-2024-53208](CVE-2024/CVE-2024-532xx/CVE-2024-53208.json) (`2025-03-06T17:15:20.330`) +- [CVE-2024-56551](CVE-2024/CVE-2024-565xx/CVE-2024-56551.json) (`2025-03-06T17:15:20.590`) +- [CVE-2024-56658](CVE-2024/CVE-2024-566xx/CVE-2024-56658.json) (`2025-03-06T17:15:20.783`) +- [CVE-2024-8425](CVE-2024/CVE-2024-84xx/CVE-2024-8425.json) (`2025-03-06T16:36:34.470`) +- [CVE-2024-9019](CVE-2024/CVE-2024-90xx/CVE-2024-9019.json) (`2025-03-06T16:36:34.470`) +- [CVE-2024-9888](CVE-2024/CVE-2024-98xx/CVE-2024-9888.json) (`2025-03-06T18:13:11.800`) +- [CVE-2025-0764](CVE-2025/CVE-2025-07xx/CVE-2025-0764.json) (`2025-03-06T17:52:55.370`) +- [CVE-2025-1405](CVE-2025/CVE-2025-14xx/CVE-2025-1405.json) (`2025-03-06T17:52:55.370`) +- [CVE-2025-1511](CVE-2025/CVE-2025-15xx/CVE-2025-1511.json) (`2025-03-06T17:52:55.370`) +- [CVE-2025-1513](CVE-2025/CVE-2025-15xx/CVE-2025-1513.json) (`2025-03-06T17:52:55.370`) +- [CVE-2025-1572](CVE-2025/CVE-2025-15xx/CVE-2025-1572.json) (`2025-03-06T16:36:54.387`) +- [CVE-2025-2031](CVE-2025/CVE-2025-20xx/CVE-2025-2031.json) (`2025-03-06T17:15:24.153`) +- [CVE-2025-25793](CVE-2025/CVE-2025-257xx/CVE-2025-25793.json) (`2025-03-06T18:15:41.480`) +- [CVE-2025-25794](CVE-2025/CVE-2025-257xx/CVE-2025-25794.json) (`2025-03-06T18:15:41.883`) +- [CVE-2025-25796](CVE-2025/CVE-2025-257xx/CVE-2025-25796.json) (`2025-03-06T18:15:42.103`) +- [CVE-2025-25797](CVE-2025/CVE-2025-257xx/CVE-2025-25797.json) (`2025-03-06T18:15:42.377`) +- [CVE-2025-25799](CVE-2025/CVE-2025-257xx/CVE-2025-25799.json) (`2025-03-06T18:15:42.587`) +- [CVE-2025-25802](CVE-2025/CVE-2025-258xx/CVE-2025-25802.json) (`2025-03-06T18:15:42.800`) +- [CVE-2025-25813](CVE-2025/CVE-2025-258xx/CVE-2025-25813.json) (`2025-03-06T18:15:43.027`) +- [CVE-2025-27622](CVE-2025/CVE-2025-276xx/CVE-2025-27622.json) (`2025-03-06T17:15:23.497`) +- [CVE-2025-27623](CVE-2025/CVE-2025-276xx/CVE-2025-27623.json) (`2025-03-06T17:15:23.647`) +- [CVE-2025-27624](CVE-2025/CVE-2025-276xx/CVE-2025-27624.json) (`2025-03-06T17:15:23.797`) +- [CVE-2025-27625](CVE-2025/CVE-2025-276xx/CVE-2025-27625.json) (`2025-03-06T17:15:23.960`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b2a1704ffcb..c1afd339696 100644 --- a/_state.csv +++ b/_state.csv @@ -179422,7 +179422,7 @@ CVE-2021-36389,0,0,439d8865d3aae753b0e301277dc1b5d8d07a9c31cab481f39569dc536ad3f CVE-2021-3639,0,0,1ce8a21aa5d2f7a4fbba33cd1aacb053a5a2e631eae436d4bc981dfeaa50aa0a,2024-11-21T06:22:02.930000 CVE-2021-36392,0,0,dafd751fb751532ca183faaa5cd9eadb25113ee95568ca182dc17715f2843d28,2024-11-21T06:13:40.217000 CVE-2021-36393,0,0,7c4cb40fb09fbe4f7555a9fb60d5a806cdc3977ab2056f27668df9f629175a62,2024-11-21T06:13:40.337000 -CVE-2021-36394,0,1,3dd2f32e9013df7c84fbf1b1a38cc9e20375b98be27d21d6545c1c2363939d6d,2025-03-06T16:15:37.300000 +CVE-2021-36394,0,0,3dd2f32e9013df7c84fbf1b1a38cc9e20375b98be27d21d6545c1c2363939d6d,2025-03-06T16:15:37.300000 CVE-2021-36395,0,0,ebbeb40a22f1fdca47a6c286ffed449443ec2f8803ffaeb3607548db5bc6295c,2024-11-21T06:13:40.557000 CVE-2021-36396,0,0,88ae47709a6bbde66b382959dcb20b2fde2250fbd13c3746271df62eebc3151e,2025-03-05T16:15:35.433000 CVE-2021-36397,0,0,eebf3717bb6d7a75919581e9690ded27175cc43d0e0ae84aad7e9fc635cccd2c,2024-11-21T06:13:40.793000 @@ -185598,7 +185598,7 @@ CVE-2021-44446,0,0,25d803c7497c23932606314044802f4bad9cbd810fb1fb92bc1b945101709 CVE-2021-44447,0,0,4a7186cd010739c789d7d14b149161b66fbefc37a56001c97a4349bee982928b,2024-11-21T06:31:00.043000 CVE-2021-44448,0,0,a76546b0ddd2373705c50c9e1ee26958c89c4d9aecf415c1f47fae38cc01abc7,2024-11-21T06:31:00.193000 CVE-2021-44449,0,0,e4a921b6ed77ec7d0c979e1c8cbca6b4ad31b1371beb3a5ef88b620f2bb9ad31,2024-11-21T06:31:00.317000 -CVE-2021-4445,0,0,6f561823c66fbce3cf66994c050c9dcb3a5357e0568141b73c44d2aef45a02dc,2024-10-16T16:38:14.557000 +CVE-2021-4445,0,1,1f13ec78eb553a7f2fdf4326d2dca5ab40cb37c6571166a813b8d5370ab6bd59,2025-03-06T18:13:11.800000 CVE-2021-44450,0,0,9aaa14f8820be0af77790b7bde6886c33d1052567e15b863f83df8f41b2499ea,2024-11-21T06:31:00.447000 CVE-2021-44451,0,0,1c84a549f4c7a0b5e257185c51135142c4e10920542577090af02c3338d6b4e4,2024-11-21T06:31:00.580000 CVE-2021-44453,0,0,98781018fb7a6ea34a51aaee9c7be9f56f6b423c6fc32a990178e2f1e1dedbb8,2024-11-21T06:31:00.720000 @@ -208238,7 +208238,7 @@ CVE-2022-42243,0,0,27fb3d1c60a5ad9e260fac234cf4eb2a2513452b4a9d94db8b2d2807bece5 CVE-2022-42245,0,0,13128a38952324280b1251be3c0c1aa747213f6961720c71b231154ad488bf53,2024-11-21T07:24:34.413000 CVE-2022-42246,0,0,6ffd0701b1a9f70d34d149d4f3fefc55ca101a6d92bf866854eb8443148f27ce,2024-11-21T07:24:34.563000 CVE-2022-42247,0,0,ce691da6b43684d6268c7a450b7394840a313fab761f7a09cb49e78e92f6ce0e,2024-11-21T07:24:34.707000 -CVE-2022-42248,0,0,087c83a4555865e36241ccf168bb0c55c7edae722f9f7d5fd4d08c2411dcd7a1,2024-11-21T07:24:34.857000 +CVE-2022-42248,0,1,494d0437dea3033497e7f52509f358146015c5089867416938c3f5e97c481952,2025-03-06T17:15:13.097000 CVE-2022-42249,0,0,22d5e907a3a80e0b4fef45033eaea19cea3b2289c8397eaf4662c46564297eb0,2024-11-21T07:24:35.007000 CVE-2022-42250,0,0,83140be693f5218650c4b3e40d3ff7d39f5e45add96f70c6710150256f648587,2024-11-21T07:24:35.230000 CVE-2022-42252,0,0,bf4c39c5777eea3e439c532149f266ccb232c5681bedb7ef736a577734e82055,2024-11-21T07:24:35.377000 @@ -208544,7 +208544,7 @@ CVE-2022-4260,0,0,ee8f096f0d8a3355b542d1fe42358cf53426cf0f9c74e35e21145446363f1a CVE-2022-4261,0,0,f3ea8fa04a826c810d7c11a81d1a2eb57dc66ca87dd7fa34d25ba3d72ca65991,2024-11-21T07:34:53.797000 CVE-2022-4262,0,0,3f46ff2abe5e3a6b173bc24940053d39599d67a394f29911490dc411d2a895fd,2025-02-19T19:39:42.963000 CVE-2022-4264,0,0,6e9c9191bcb2e4227a9683fd2ad7545762b7af98bacbcf085a177a7b291032dc,2024-11-21T07:34:54.050000 -CVE-2022-4265,0,1,e0665014eaf02201aa094a0af673fce18d7eb49f51d02402ffa0b4a8e103ea38,2025-03-06T16:15:39.280000 +CVE-2022-4265,0,0,e0665014eaf02201aa094a0af673fce18d7eb49f51d02402ffa0b4a8e103ea38,2025-03-06T16:15:39.280000 CVE-2022-4266,0,0,e93286bb1d277696fa139681d8d5b6a89c7a738e871d31529d0a1ed21cc63007,2024-11-21T07:34:54.307000 CVE-2022-4267,0,0,49b1995577721f848edd800036b41f8cb432ceecbfc076e67b6aa8a1394a170e,2024-11-21T07:34:54.420000 CVE-2022-4268,0,0,3035ab9381654c059b335789faac47f434be3715828f3135b4a7ef2721562826,2024-11-21T07:34:54.530000 @@ -209606,7 +209606,7 @@ CVE-2022-43970,0,0,557fbcda71ab38a32691a688b2fa0218fea9d7602613214e96c011ed7448f CVE-2022-43971,0,0,7add645eff71d088604788c474912242b919c9f4249701a23d0ee76a0a0cdbe5,2024-11-21T07:27:27.293000 CVE-2022-43972,0,0,b1fcc1938d467344bfe6f3d21bd18c4b131f134ffa2cb5cba9f3d77b9d458aca,2024-11-21T07:27:27.420000 CVE-2022-43973,0,0,fbf58f67e6150c85f77a8fcc0dbe067db0cf425d405092d33943297cca1f90ca,2024-11-21T07:27:27.560000 -CVE-2022-43974,0,1,69919e0e7167905137470b42346d9514d9f5ad392ebade71b415f92da98d24ae,2025-03-06T16:15:37.880000 +CVE-2022-43974,0,0,69919e0e7167905137470b42346d9514d9f5ad392ebade71b415f92da98d24ae,2025-03-06T16:15:37.880000 CVE-2022-43975,0,0,3d47110113cc8a54459debf524756efecc6e5af214bc607c4e9ee754675e7855,2024-11-21T07:27:27.873000 CVE-2022-43976,0,0,3dcd63badba8d833fad00134b91979ce3707af51148a8968ea2cdd5a4d8bce95,2024-11-21T07:27:28.013000 CVE-2022-43977,0,0,871f20691e0f649b27fa670416d3aae8731f054d31e24a163c764cf222e1609e,2024-11-21T07:27:28.160000 @@ -211985,12 +211985,12 @@ CVE-2022-47470,0,0,3a8fdd214f63e68ec87a63f525c2fdb0dc5cc3b7b715cee87fc3205f38d5b CVE-2022-47471,0,0,2bb1b295ba61b19da4df18a957858b0159037151bf82e7e4ccd434160cf98d54,2025-03-05T18:15:34.123000 CVE-2022-47472,0,0,9fedf2ddd34ef86d1b864027fd832881ccf70fced06accfd8af23ca518fa7feb,2024-11-21T07:32:01.983000 CVE-2022-47473,0,0,3335e5f0084985a2959a6836570a809e2a4bc068ee73d7232407f36e7fb1f62e,2024-11-21T07:32:02.103000 -CVE-2022-47474,0,0,7cb8d6dc18b68527fd19e5a353ea6129c7ca357436d294fb6ef65adcce5d4099,2024-11-21T07:32:02.217000 -CVE-2022-47475,0,0,d7a94a98d0e9b69247d909283302b483ba39c3209624fade1f3763378b140cc7,2024-11-21T07:32:02.330000 -CVE-2022-47476,0,1,9031e7c2ca06b021bf95e84e341e464b0078e7daa64a9d8e1a43f5244d5cd478,2025-03-06T16:15:38.127000 -CVE-2022-47477,0,0,27c1709db353e72d8574008fc997b3c35461453cd114777eee1f13d9902b68a9,2024-11-21T07:32:02.597000 -CVE-2022-47478,0,0,aa28bc26cae78f6924e17ded517950cde9059d1b892de98854c670291561d6ba,2024-11-21T07:32:02.717000 -CVE-2022-47479,0,1,71d5e9dafebc972c1236e061fd361e99a4b570f1b8a92d5da491037ea761985c,2025-03-06T16:15:38.340000 +CVE-2022-47474,0,1,de63cf7d11121fa8cd07cabdfd24913341ff42232880ab3180cd159c3738ceab,2025-03-06T17:15:14.250000 +CVE-2022-47475,0,1,7edce48094fa3e0a3faed545bdb4a1c5b7efd5ade9f7288d901e43bc847ee988,2025-03-06T17:15:14.413000 +CVE-2022-47476,0,0,9031e7c2ca06b021bf95e84e341e464b0078e7daa64a9d8e1a43f5244d5cd478,2025-03-06T16:15:38.127000 +CVE-2022-47477,0,1,063f4f37ec0d6f93a8425a2bf8116262d748e9ec217fcf63af2d841e5a3794f5,2025-03-06T17:15:14.580000 +CVE-2022-47478,0,1,9dda97a424de8ed0cd981fa1e3818b5c3500f5662ea6496e50d56fd189541a50,2025-03-06T17:15:14.747000 +CVE-2022-47479,0,0,71d5e9dafebc972c1236e061fd361e99a4b570f1b8a92d5da491037ea761985c,2025-03-06T16:15:38.340000 CVE-2022-4748,0,0,ef3280be296917f093d7b5252769d8875b626bc3bcad498f72668da48999a400,2024-11-21T07:35:51.937000 CVE-2022-47480,0,0,76a40e4c0a09df9bf69b4b9ade9ab4eabfc98c306705734307952abd63fc7c1f,2025-03-05T21:15:14.917000 CVE-2022-47481,0,0,1d68dd0cd9aacffdb0a0015ab0415ef87ad1def43a11f0aea071156b30b36afa,2025-03-05T21:15:15.067000 @@ -213787,7 +213787,7 @@ CVE-2022-49610,0,0,11b5a741a8054dcf8044636dde3381cfa8eac599bbb5ea22242896e6e1679 CVE-2022-49611,0,0,344d38f5eab50eea56caa9422631db07ee9671baffd8abf944c9db4ed0aee250,2025-02-26T07:01:36.553000 CVE-2022-49612,0,0,2304ed49ca77900bbe6ecb264baeb49d9a781e8df8e6bb309cd271ed227476d6,2025-02-26T07:01:36.653000 CVE-2022-49613,0,0,da1a5bf1db738f16b89390b6e2be1b8d2a6beeabebad38e0c4b03ad5c9f896d6,2025-02-26T07:01:36.747000 -CVE-2022-49614,0,1,0c0cc93db34eafc8b46e404b2ade125e91ff81e0ea0c0d87408e17b6f9894992,2025-03-06T16:15:39.210000 +CVE-2022-49614,0,0,0c0cc93db34eafc8b46e404b2ade125e91ff81e0ea0c0d87408e17b6f9894992,2025-03-06T16:15:39.210000 CVE-2022-49615,0,0,a88266d354085e1f96d25159fa3a20937819653dfacffa5ca2d6f580833df806,2025-02-26T07:01:36.927000 CVE-2022-49616,0,0,a4611de63852c409b6a8f685741acf172ec192405385f97e33645e097bc948f7,2025-02-26T07:01:37.017000 CVE-2022-49617,0,0,5b4bf5ee3ce7fea08e636f4ed9b4e7855593e6366c99a2330427ae648aeb3904,2025-02-26T07:01:37.107000 @@ -213980,12 +213980,12 @@ CVE-2023-0059,0,0,44aa447c40fe10be5f3c84b017260c6212db07b8e7d3a1f91b46497cabf97d CVE-2023-0060,0,0,cdd54e8b342a3a1f6f68b7ac47c43777884835e87ed1694141b407ee7c60cc2c,2024-11-21T07:36:28.833000 CVE-2023-0061,0,0,b385224cc61bac2b08e018151dd3d9aa20412462b9c728bb3d0262d3bb260cef,2024-11-21T07:36:28.933000 CVE-2023-0062,0,0,14cb22392ee2e891b0ce9bfe5eecdbff8c91c0f88e0ea8d60be75b771f9ae48f,2024-11-21T07:36:29.033000 -CVE-2023-0063,0,1,e0d8f4ec9f56a5a6ed50547711273383d0479f10d3ef641384e7d7e8508dd506,2025-03-06T15:15:12.663000 -CVE-2023-0064,0,1,32bf06de3e8b09fb1a5c27cce04b2f457d43634b0bad149770f75062d6bbfadb,2025-03-06T15:15:13.337000 +CVE-2023-0063,0,0,e0d8f4ec9f56a5a6ed50547711273383d0479f10d3ef641384e7d7e8508dd506,2025-03-06T15:15:12.663000 +CVE-2023-0064,0,0,32bf06de3e8b09fb1a5c27cce04b2f457d43634b0bad149770f75062d6bbfadb,2025-03-06T15:15:13.337000 CVE-2023-0065,0,0,1af42c9630237adefe532d5e7d6c03134844119157520f1dae4aad3d5003e3ad,2024-11-21T07:36:29.343000 CVE-2023-0066,0,0,66abd1188955921a4f586244d11ac2aed7ba37215a66a107b40ed1984614d870,2025-02-27T21:15:16.620000 CVE-2023-0067,0,0,d9b9c7e73ab578382d2a88b409033e01b0277359a48f063cf20738d009ed0036,2024-11-21T07:36:29.547000 -CVE-2023-0068,0,1,595f7f6244176a72aa33ed40d695e496bc7c9316006716b32c1466cbd00ed810,2025-03-06T15:15:13.520000 +CVE-2023-0068,0,0,595f7f6244176a72aa33ed40d695e496bc7c9316006716b32c1466cbd00ed810,2025-03-06T15:15:13.520000 CVE-2023-0069,0,0,bb4a67e87a89a16e9214b1f062e8f6924eef987d6dc74878eb3573b76c99a092,2025-03-05T20:15:39.917000 CVE-2023-0070,0,0,8af155f487a0101fddbe52c416440c5cd676cf772f8d175d008a6b3bfb7c26c8,2024-11-21T07:36:29.850000 CVE-2023-0071,0,0,63f3711ec31ece4e46d0d19fcee20f3780808fb2036b3c7df3c8e5f5031c035a,2024-11-21T07:36:29.953000 @@ -214082,7 +214082,7 @@ CVE-2023-0161,0,0,2d565afc2a392d75d863e5fdf784db6696b2ebade8f447f4c56c766437755f CVE-2023-0162,0,0,a78adc583dc52703aecf41560a1768c9925a4d13332c5efa0d7d22f56def82e9,2024-11-21T07:36:40.040000 CVE-2023-0163,0,0,92c5c47d0b844d863693b4b0e085adc34334371440bbd95c65e36a0913370428,2024-11-27T16:15:06.757000 CVE-2023-0164,0,0,51c32b819fc67e3646f865fa77c64f2d24aa44508624e04b02c13c4864862d65,2024-11-21T07:36:40.150000 -CVE-2023-0165,0,1,7fcc3d9ed0c5d6428efa2bb074b9f90b7adb08040882994dabf7a3834cb08354,2025-03-06T15:15:13.633000 +CVE-2023-0165,0,0,7fcc3d9ed0c5d6428efa2bb074b9f90b7adb08040882994dabf7a3834cb08354,2025-03-06T15:15:13.633000 CVE-2023-0166,0,0,49b2ded7625387b1a13e7ac4f3c5d2fe1b752791752732fc35601586b7acbb56,2024-11-21T07:36:40.357000 CVE-2023-0167,0,0,459d4943ae7f6093e0c08e93f0df454bd6f8fc1ef44e06359463c8da2022995d,2025-02-26T19:15:14.690000 CVE-2023-0168,0,0,480bb72aebfb6db5bc6de2fc7749a7dfe9ec422fccde53fd6ce097e3e084f78f,2024-11-21T07:36:40.573000 @@ -214128,7 +214128,7 @@ CVE-2023-0207,0,0,64984549e794c8b3345fba50109428e553562795562ca0bd04510cdffc48c7 CVE-2023-0208,0,0,ae541cea65b69ae589a0f27e271ee0c6dee76549a4f88a60062e20220566bb9b,2024-11-21T07:36:45.100000 CVE-2023-0209,0,0,039dcebdd8fffb3c5d912bacd23e44110d548aaad2e45f26cbb39657e1615240,2024-11-21T07:36:45.217000 CVE-2023-0210,0,0,af407103d0c3067664a7aa22418135e8a5c1fe83e72f88d8acc7d63b1caab777,2024-11-21T07:36:45.360000 -CVE-2023-0212,0,1,db350673c120e247fa84fa1aa004d05a0b5c6de187724c33762d8fce777b2f53,2025-03-06T15:15:13.757000 +CVE-2023-0212,0,0,db350673c120e247fa84fa1aa004d05a0b5c6de187724c33762d8fce777b2f53,2025-03-06T15:15:13.757000 CVE-2023-0213,0,0,6150d16f15a42b48c31fa66dbd1387e2099a15d634c77c2d4f4accc62568835c,2024-11-21T07:36:45.587000 CVE-2023-0214,0,0,0a3cfa34ea51b3dc5d3d80ad4db72f9e7b5d75a78a5c14804c8a714e4761871d,2024-11-21T07:36:45.717000 CVE-2023-0215,0,0,d9a4101a729f368df1ac05268f8b987a45a4c78941f2543af10ea2a9cefed8b4,2025-02-13T17:15:53.690000 @@ -214239,7 +214239,7 @@ CVE-2023-0324,0,0,d5cfbe02e3dc2b4bae0ea4621f6f505deade1c4d5f4bd77648f3c6c8283c52 CVE-2023-0325,0,0,4ff7aa7922b1e7be70db8422a95e14fde29f06c593783cf6534d24eaf04c7c04,2025-02-13T17:15:54.513000 CVE-2023-0326,0,0,10b56521dc7550d5d193872219ce775d78cb00c9f93884299a94cbd24907eeb2,2024-11-21T07:36:58.627000 CVE-2023-0327,0,0,6167212aceb2c31f3e634ebdc5e2fe015ef028aba2344b99409195bff6437f26,2024-11-21T07:36:58.747000 -CVE-2023-0328,0,1,60a5e418def05aeec452bb62d499808225e4c06d3b621376c68675e29c3adf28,2025-03-06T16:15:39.403000 +CVE-2023-0328,0,0,60a5e418def05aeec452bb62d499808225e4c06d3b621376c68675e29c3adf28,2025-03-06T16:15:39.403000 CVE-2023-0329,0,0,af8a57f60cebf22d5e961642189108c9b03a601bdcdaac0ddd34e75b44e97c27,2024-11-21T07:36:58.970000 CVE-2023-0330,0,0,0597b42289577da5a8502854ac2fe29c28b08c8707968cf90382e1363234f929,2024-11-21T07:36:59.077000 CVE-2023-0331,0,0,6bc9688deeae710cbf744fa07feeea2933d7392453d27f8553fbe1cb355de2dc,2024-11-21T07:36:59.217000 @@ -215075,7 +215075,7 @@ CVE-2023-1198,0,0,007352a77f8be86abc9014a5228157699faa100b2d96c0aa11fbfdebb3b2fd CVE-2023-1200,0,0,cb5805db4a921d68bdf953c1e086ad953a942ed94e0e68ad6b2ae124e1cf6cd7,2024-11-21T07:38:39.437000 CVE-2023-1201,0,0,f4764263a23a32d0db12c78e0cf32f66698f52de21b5dd3f805ae2d534552a96,2024-11-21T07:38:39.553000 CVE-2023-1202,0,0,e995e212ebe63e7f0467b64e16d67f68aa9e5461a685e3b0d682958b41fe5915,2025-02-20T21:15:24.633000 -CVE-2023-1203,0,1,0752c09acbf68ed55484643ac2059b5bac4dfd013639f567a2ed14b433a38598,2025-03-06T15:15:13.977000 +CVE-2023-1203,0,0,0752c09acbf68ed55484643ac2059b5bac4dfd013639f567a2ed14b433a38598,2025-03-06T15:15:13.977000 CVE-2023-1204,0,0,c2aa540d011907285fafc8b079b7b56473284d8f0c49ffb1b78642f39b244f98,2025-01-30T16:15:28.937000 CVE-2023-1205,0,0,7664848268797b770afb2d9857c52c62b388924b546ea4cdebbf8dc8b5f1f08f,2025-02-28T17:15:13.583000 CVE-2023-1206,0,0,61a6d8638c87f97f2726781e2179014defc8f0359aad79a22aeca86d4eb775a3,2024-11-21T07:38:40.070000 @@ -216240,28 +216240,28 @@ CVE-2023-20619,0,0,a99172c725199c26d1ac611c126431876f6a08c48274d4e6188670672f9c5 CVE-2023-2062,0,0,1b0cdbca534dee328f629d36f463ebda9984813ae4ee691e21873be1b8e874d7,2024-11-21T07:57:51.857000 CVE-2023-20620,0,0,69b44fbb0e1221386a9c0b6299ccbc6f24c3da0896dbdc75497d1c96bf66ceeb,2024-11-21T07:41:14.413000 CVE-2023-20621,0,0,a5f7461406513cc11dcf09408d4fc68bfd785df2fb5f1fd56c9dacd068217084,2024-11-21T07:41:14.520000 -CVE-2023-20623,0,0,0f4b101158b5d22625c1c8fec883357daa1dfacb215806db47a7a0b4a8044f25,2024-11-21T07:41:14.633000 -CVE-2023-20624,0,0,e47a264375b13e017fe5366d70086802e9ceccccc26e33fa7308b00b95afffa3,2024-11-21T07:41:14.757000 -CVE-2023-20625,0,0,e30f7cae43d7c99f52a9f3eaa98ebc9690730ea46f3f31fe7a005dbb756bf8c1,2024-11-21T07:41:14.870000 -CVE-2023-20626,0,0,d6ae1489f257693bb3520b235021ea213311498e9344453b0e2ab8e56fc20917,2024-11-21T07:41:14.990000 -CVE-2023-20627,0,0,1dfbf563926de15415545782801ae81f813aa7c6a71a5ad0d3f3bb578f705c51,2024-11-21T07:41:15.110000 +CVE-2023-20623,0,1,aac55700e33d1669d5e839dd40bb9e7f0053a291ed8ac717d5d3e7d3995777f1,2025-03-06T17:15:15.163000 +CVE-2023-20624,0,1,080fcb6f0c41dd512a48a98419b388b2685ce36591c4933e6211c691f2ee4a75,2025-03-06T17:15:15.370000 +CVE-2023-20625,0,1,fce7c731ba737414271801df9f0de789c6364ed0923806cd9f0a8777531f89ae,2025-03-06T17:15:15.550000 +CVE-2023-20626,0,1,cd876ef76fdab4b1e97b29b0fc6e1ac08d664bcdc8f702625087532244e7daee,2025-03-06T17:15:15.717000 +CVE-2023-20627,0,1,66ac8990bf50f6150e1f38d2289f0f8fdc723a6a57ad29a8e5e7f6509cd8b0db,2025-03-06T17:15:15.890000 CVE-2023-20628,0,0,a43f94bc27655b93099f567fd284ae00b065686b39b9054c4862b72cea71753f,2025-03-05T22:15:35.140000 CVE-2023-2063,0,0,0aaf862838d3fc48a28b566a8ceaf8291ae1040d19422d9eb9fde272cb92f0f5,2024-11-21T07:57:51.990000 CVE-2023-20630,0,0,373bf469509103d35ae343d6f2ea99e063d089c4b291ca1aedb51787a3d30c6a,2025-03-05T21:15:16.050000 CVE-2023-20632,0,0,dbf315d861e3e5ca6a2602ca35016bde2eb440a8f2e0b22336c02aeb45f5da3d,2025-03-05T21:15:16.213000 -CVE-2023-20633,0,0,9197731104a2b6109350b0d564f4bb04b2c3792f8862636eb8cc18ce6e5d2d65,2024-11-21T07:41:15.570000 -CVE-2023-20634,0,0,b0b1c5908cb36423248ecc504db659e09cae32845206be6f448f99a3e9062f1f,2024-11-21T07:41:15.690000 +CVE-2023-20633,0,1,55da3ea3b095989eefe2280aa96c75179dec8710dc0e4976f20b04d3bd038656,2025-03-06T18:15:34.393000 +CVE-2023-20634,0,1,f71654de516b329eb0362d47269eca16449eb8c1337c18b5d999607cea867439,2025-03-06T18:15:36.003000 CVE-2023-20635,0,0,6f3b3918088ad0bffc5d893b39efaf6e458d611a6b2d15fad62ccf9b895a622a,2025-03-05T19:15:27.790000 -CVE-2023-20636,0,0,7969ffb97886082c6a56452f4bd27bb421515913b292c77bae030e782a2f8d07,2024-11-21T07:41:15.943000 -CVE-2023-20637,0,0,8f038e57aa78ece48451171f04153fb424960afef9c2b2d699b66084c7dcf21c,2024-11-21T07:41:16.050000 -CVE-2023-20638,0,0,682bb7f5f889f3c8e2845ecb7f3268c10614777581011e1531d7a44568da3706,2024-11-21T07:41:16.160000 -CVE-2023-20639,0,0,fe60201be75b3cd065bd6218c7bef9cf47f8f5bcc8bba89918b8033941906589,2024-11-21T07:41:16.273000 +CVE-2023-20636,0,1,2e070513054d1ccc735fe0de9397c1f830d63571105fcac18a8be6e151d66745,2025-03-06T18:15:36.290000 +CVE-2023-20637,0,1,7a6676bc503c4f1ce77555d98f1e0dc15b975a2127ffae7504c6a4a521e7b459,2025-03-06T18:15:36.527000 +CVE-2023-20638,0,1,8563d171c2a70fa751dc3dfdfed72a80c8f9f90fd5a2a0f365690541c12def8b,2025-03-06T18:15:36.877000 +CVE-2023-20639,0,1,43de608c3376473623b6dc88e3044485798927d3f50b47525a7701c28b39de4b,2025-03-06T18:15:37.287000 CVE-2023-2064,0,0,4259a1b04538f41db500878541515eda1a4c15b7e6d69a2162da1a1035ae3336,2024-11-21T07:57:52.120000 -CVE-2023-20640,0,0,3c88735f6bf73cb26f3cac2eeb46c2948787789c0d752cdc1d8a9c18244e85a5,2024-11-21T07:41:16.397000 -CVE-2023-20641,0,0,66afd76ab5e3cab0364e8ba13a5eff296c3abe942f408ca92dfd55e801388c4d,2024-11-21T07:41:16.507000 -CVE-2023-20642,0,0,ab42154c747b6570707a2a6e302e1d7356412038014a0a3e86e15a95727d6b82,2024-11-21T07:41:16.630000 -CVE-2023-20643,0,0,29baeeea0d83d636cbe7387d2e7a6ff6d1b6ca73019c6a0fa1aaca17b82ecd5e,2024-11-21T07:41:16.737000 -CVE-2023-20644,0,0,47e77d5e6c7673ac7afc319e6bd16df66831e94df9a4c5108b5e1f129213c770,2024-11-21T07:41:16.850000 +CVE-2023-20640,0,1,280a1476622426990856812bfe738eef3711a9c0c1315ba677ec780e02e2bdcd,2025-03-06T18:15:37.700000 +CVE-2023-20641,0,1,7d5f961fb891ea2b347f3de2afc1c7149725f853a3a4fcf9fb672e867499b391,2025-03-06T18:15:38.040000 +CVE-2023-20642,0,1,86a840cfee1683f608316cc70559042fce2ebc5ccf3757fe257ca133605306a7,2025-03-06T18:15:38.883000 +CVE-2023-20643,0,1,83199c4f90ebf95de37affc2c495a78c23ea55f1c07720e95f54d9e4036f83db,2025-03-06T18:15:39.607000 +CVE-2023-20644,0,1,1e13cbd3ad894e861de8c5c2f1115691ac3e26c45da2a6d1bb0a6e4074f81d8c,2025-03-06T18:15:40.043000 CVE-2023-20645,0,0,ed1e23a6fdf450d446ca73727202e97d41960b27d4ec1f99ca645c2083ff5ce1,2025-03-05T20:15:42.957000 CVE-2023-20646,0,0,9377d87b310648ae9645c937d011891b7daeffac896e258c0c187a5cf9686d76,2025-03-05T20:15:43.437000 CVE-2023-20647,0,0,cab7941bcd35fe7279b563ee4a6947c5fe3ad29a6dad0910bbdd50b0284750a6,2025-03-05T19:15:27.987000 @@ -216269,7 +216269,7 @@ CVE-2023-20648,0,0,3b980e78cb172dead3d542036439304cb2c23e7475a12dcf5293329e0cbe6 CVE-2023-20649,0,0,6d049a9ae41c67379592b3e6c0281ec1e7443234682da32d3264c73269e72923,2025-03-05T19:15:28.320000 CVE-2023-2065,0,0,6adc1dc6e5421910a8f66b949b10ddd6e35171e99ee7723b2c415c61326c4780,2024-11-21T07:57:52.227000 CVE-2023-20650,0,0,18438e1319cbd130b93b5945af38cf69973fd9c79425fcf3f888aede36b965fa,2025-03-05T19:15:28.530000 -CVE-2023-20651,0,0,c931350452b735a23e9229b569e270a5f54d60e0e2263fb39c061c2250efc655,2024-11-21T07:41:17.647000 +CVE-2023-20651,0,1,445bbb9f357efada358e42f53b8f28cb4818878fdbd2362fe0914dcf7ac79c35,2025-03-06T17:15:16.063000 CVE-2023-20652,0,0,17cd13e3445ca3b057e9c52c8e29168c960cf6c40ea3e47c6010e04cbf52887f,2025-02-13T16:15:37.597000 CVE-2023-20653,0,0,2e3a6ce1de65ad8fc2ff0f067002d17f6c3e6a50911a4b2bd06bafbd2ec34c83,2025-02-13T16:15:37.793000 CVE-2023-20654,0,0,a248cb21d0ff5aa290e571631f7026712aa2f0e6dc51485f7f3f566b2bea1c25,2024-11-21T07:41:17.990000 @@ -217017,7 +217017,7 @@ CVE-2023-21372,0,0,3a8412fe290becf710e19579f2bfe45ccd28d8f537b7f8099062d083dc0ef CVE-2023-21373,0,0,e1ebb544fbc713bdbdcadd9bce09ba44bb05fe1759525f9f3d3885d22e93526d,2024-11-21T07:42:44.197000 CVE-2023-21374,0,0,abaec44ff0fe59955382519a58b9b4169c1815daa8f7bf22b8d666535dc84ce9,2024-11-21T07:42:44.303000 CVE-2023-21375,0,0,d7271a10c598dffb195fb98c4cd29ccab2da6cb9338cad71c857f09b737e247a,2024-11-21T07:42:44.417000 -CVE-2023-21376,0,1,bdab51ebe2b1848acc2a2be69331b293ff076e475f6775af4c875090b155ed14,2025-03-06T16:15:39.520000 +CVE-2023-21376,0,0,bdab51ebe2b1848acc2a2be69331b293ff076e475f6775af4c875090b155ed14,2025-03-06T16:15:39.520000 CVE-2023-21377,0,0,4b429fea6b1d15a1f7f6be0d023b9ca996fc2c97572e978edfadaf415aea3066,2024-11-21T07:42:44.630000 CVE-2023-21378,0,0,5800f2c7c242d81d1f96f2514358398b134e8b4180c3d82cb936b3682d0b6b7d,2024-11-21T07:42:44.727000 CVE-2023-21379,0,0,360653de5f39e2607554974a1a65bd193e8c598b07c580610ad4cc70d74518b5,2024-11-21T07:42:44.840000 @@ -217724,11 +217724,11 @@ CVE-2023-22065,0,0,77efaa3f24855c6af91ff4b59b7b4b41a08281e54bf2e2232461707e7156f CVE-2023-22066,0,0,686d26684af35b2d91ba5682456197c66a2648fa11707f707629c7ab84bf04a3,2024-11-21T07:44:12.557000 CVE-2023-22067,0,0,bad76f2a48f771ccd8be97c2dd01b5dd0ee037a01e5c8347cca968282b147d4f,2024-11-21T07:44:12.673000 CVE-2023-22068,0,0,149c3090de36a73c71e89bb1f5240fa6123b98197d467ce13b0c5f074b4f7b9f,2024-11-21T07:44:12.793000 -CVE-2023-22069,0,1,30f6b95b38c9b9b197af46276e964c324eef1c8592b69948ec0ea76274a0b6ff,2025-03-06T16:15:39.710000 +CVE-2023-22069,0,0,30f6b95b38c9b9b197af46276e964c324eef1c8592b69948ec0ea76274a0b6ff,2025-03-06T16:15:39.710000 CVE-2023-2207,0,0,9dbef90be58bf8f37463907ffe30bc40a3d7ba2c1bb1dbe6ad3c433cd36118e0,2024-11-21T07:58:09.347000 CVE-2023-22070,0,0,b5a88bcc3ae6222dca14e3ba7afb28546d969444d259916c275bd30fb2818885,2024-11-21T07:44:13.020000 CVE-2023-22071,0,0,e4a7b2aa61e386a2e1cdae3ed62cfee2ecdb729564de41fffd23b7cd1cf8c01d,2024-11-21T07:44:13.133000 -CVE-2023-22072,0,1,3f4df1f6aa288165925734f754f5622366d3b8428ef754add5e6b6d7f71d014a,2025-03-06T16:15:39.877000 +CVE-2023-22072,0,0,3f4df1f6aa288165925734f754f5622366d3b8428ef754add5e6b6d7f71d014a,2025-03-06T16:15:39.877000 CVE-2023-22073,0,0,190e8a6e36e49663c701ad19c0984f28bfe405bf475e6f5584b16bbc05810087,2024-11-21T07:44:13.387000 CVE-2023-22074,0,0,668058e99d278262651a7cd7e95730190a87e651063fdd360a1f456bc30b3049,2024-11-21T07:44:13.507000 CVE-2023-22075,0,0,063c11825a6bfb4ffde745ee57dff2345a545dcbd2b381e7d280f253ebbc6dcf,2024-11-21T07:44:13.637000 @@ -217760,8 +217760,8 @@ CVE-2023-22098,0,0,ab54971307e041767cd762fde9efe9f06170cb6c4e444af8d59bba46d875f CVE-2023-22099,0,0,a0531c62f33b0faa5b51ffe09be0962637e7faa1d6b39061fe737f630219b167,2024-11-21T07:44:16.420000 CVE-2023-2210,0,0,8309fc99c807835c61ab8e059b4b5a0e763661115d2ce03b9eb516471a6f626c,2024-11-21T07:58:09.740000 CVE-2023-22100,0,0,bb07c770ea538f7eb053face39ebabb82178a40c6bd12367b25d8d6f14087355,2024-11-21T07:44:16.543000 -CVE-2023-22101,0,0,70fa062e8f3a73088ca25020f1b080715daf9b0a3faaf5182cbb12ff016fd63e,2024-11-21T07:44:16.653000 -CVE-2023-22102,0,0,ecce1ce0ab6ada0a19752a60a8d70eb5df146319c1c4bccf7737aba6900e1a22,2024-11-21T07:44:16.763000 +CVE-2023-22101,0,1,666806589af0c6e55ac15196c34b0c632bf93945bfeca5110c8ca7c2f6de1e18,2025-03-06T17:15:16.297000 +CVE-2023-22102,0,1,1716c1fb5d193a060754b01e270f609fda0ff9ad5fd7023b5e0850f6dc117d37,2025-03-06T17:15:16.437000 CVE-2023-22103,0,0,540fb0374154836f69250627c813a65ff7d11a0b4baef6cea3cc5a7dac8cbcad,2024-11-21T07:44:16.883000 CVE-2023-22104,0,0,a7b346fe02ceb17c28ea3c299fe4fe06d09bf2c46b2a425e1ed5e0c3b0fc2e71,2024-11-21T07:44:17 CVE-2023-22105,0,0,69363992d9aaffc606bfbd0b8485d542b11892589275e2aa435b193fd771a5b8,2024-11-21T07:44:17.110000 @@ -217915,7 +217915,7 @@ CVE-2023-22331,0,0,975a66678c947c6fd9643dc7b61d657f7c1544ac1f02f7181b9b7b2352404 CVE-2023-22332,0,0,5b53881cc7f561923a7307a21fa724cf6206fbff5ce2eff252fbfaafd93e829c,2024-11-21T07:44:34.840000 CVE-2023-22333,0,0,f8db12d8428f1a8ad7049d32b56eb3660d94221ec6bac9fcf6874edf8c2b1e2d,2024-11-21T07:44:34.950000 CVE-2023-22334,0,0,59460f6c544ae5c2a09037f61f18c7df553834d7cb5bdb8f6cd83508a0355120,2024-11-21T07:44:35.050000 -CVE-2023-22335,0,0,109d8b6cc5014fb63be603887d75dfc5ed851aba6e7f5d9fa7cf24405c7ef91e,2024-11-21T07:44:35.147000 +CVE-2023-22335,0,1,e2cdbe44d7f025f42ed55394ac631a52bcf1b0b793133f5a3a5c8a0edc560d3f,2025-03-06T17:15:16.593000 CVE-2023-22336,0,0,f4a7cab6a1ad5814eee212d8dee5da87605af397c1ab560ff48f1b473d5cec8e,2024-11-21T07:44:35.247000 CVE-2023-22337,0,0,68cdff4a5de2d37748865c4d18c75672713a6de85f16bdea2f3a69aa137a3663,2024-11-21T07:44:35.350000 CVE-2023-22338,0,0,6a898e6ea95789cbd91787962adff9be95cc17c08fb8c6011f49f48c8a42b585,2024-11-21T07:44:35.463000 @@ -218095,7 +218095,7 @@ CVE-2023-22508,0,0,025a8b6686fac397e0be875d3eff08947330e24a2741d8f677d0048a66c88 CVE-2023-2251,0,0,7074e1cc6f181fe6e60c053fdd1b25d246d4630a51626bbe6a34476d29827815,2024-11-21T07:58:14.463000 CVE-2023-22510,0,0,38d30730c5e8469e4213ddc4af4d979fe2b3cf6dc59d9fd49be1de40d36686cc,2024-01-16T18:15:09.080000 CVE-2023-22512,0,0,430067aff48c4477cb1405d1591f95dc9a707765098b5518559b75833a321a4f,2024-01-16T18:15:09.130000 -CVE-2023-22513,0,1,d1d5d1b202ce20d05345e39cea416a9fec7a297999b594a85af13f30835d0912,2025-03-06T16:15:40.103000 +CVE-2023-22513,0,0,d1d5d1b202ce20d05345e39cea416a9fec7a297999b594a85af13f30835d0912,2025-03-06T16:15:40.103000 CVE-2023-22514,0,0,4b9e88e625d812470dbdb870eea97ea4e0882d0b7b1d71ab0068a97e7448e8c4,2024-01-16T18:15:09.170000 CVE-2023-22515,0,0,e1b3a5c24dec069d33c73f20bc1e55691c01a674db9c1c72e0df3398fa55e1d8,2025-02-09T20:49:55.073000 CVE-2023-22516,0,0,001864230f9bc370fdca0f79ab8ffe9d7082f111d6a1d9cf3af59d82a0bf4574,2024-11-21T07:44:58.067000 @@ -218379,7 +218379,7 @@ CVE-2023-22843,0,0,dc94f4b1265240b7ed270eeb504c59f2e8374b2d5a4c5042200809e958e7b CVE-2023-22844,0,0,787a14b65a310549a82f3dbdd1f01916498b8f42be7162fb11044a02fe1bfaf4,2024-11-21T07:45:30.557000 CVE-2023-22845,0,0,b5a8c9562c7fce8da51cdd95f83f5d7edf3993c341da2739448a4ca824e85ef7,2024-11-21T07:45:30.680000 CVE-2023-22846,0,0,4182fcfc80d62a777d200202aaa27ceebaa157e73317e756c4766a80e47f0beb,2024-11-21T07:45:30.803000 -CVE-2023-22847,0,0,e5a0d009c67a83d0cca157de90c23acf2baf6d967594e1d189f43184e055a0a1,2024-11-21T07:45:30.923000 +CVE-2023-22847,0,1,e4246a91b107fe35121d0fee0284d23d74653569c27a65d903d65b7088641f37,2025-03-06T17:15:16.783000 CVE-2023-22848,0,0,3f961db3a5863de2ea6f2808366686b131b7c82f64d6f20a39867776a1a6317b,2024-11-21T07:45:31.037000 CVE-2023-22849,0,0,64d5df5a24d384078fde691f204b71945da421970f2d9c69c21d5729de0cdbeb,2024-11-21T07:45:31.163000 CVE-2023-2285,0,0,429610ee7b9031eadcf24b669b6be2efc2d895f5ad52396c22959801e4441d14,2024-11-21T07:58:18.600000 @@ -218832,7 +218832,7 @@ CVE-2023-23550,0,0,d536d881c69c4fc2ee36bde32a4e777d709d4a376bd8b90100e22fa21725e CVE-2023-23551,0,0,d2a330092fbace6a9eeb31a46bdb453c4c64d137eefba00c2e8aa548be3d2349,2024-11-21T07:46:24.247000 CVE-2023-23552,0,0,a58eaae02053549fd1cb717e43d94c5953ea0937dbd36a072ef7b28dca47add2,2024-11-21T07:46:24.367000 CVE-2023-23553,0,0,41cded4a1482a0786080eab0481338f108027ab66f80124dfb6babb83584e00e,2024-11-21T07:46:24.490000 -CVE-2023-23554,0,0,cdeeea6fa8a39bb19ef3ac9abcdae90c7ce3d8ab9b32c36d105840857787e9d4,2024-11-21T07:46:24.613000 +CVE-2023-23554,0,1,d2f4c86a724cfbf05bafbbaaf6e994b973ccd00d1182c614809e0fa13232f5b3,2025-03-06T17:15:16.980000 CVE-2023-23555,0,0,e30d8f18c2d1a132d0df67f1b70fedf2fdf02ee2d11321d043b7f29747bdcc77,2024-11-21T07:46:24.737000 CVE-2023-23556,0,0,503b06a1aaa56659575f9dd82d5ace1280a0ef2eacc1b1c261cbb1016e608859,2025-01-31T14:15:29.200000 CVE-2023-23557,0,0,965eacda3f7071dc643df400155fecca58ae64b391e9f8b1c0621ee7e1d2c780,2025-01-21T22:15:09.520000 @@ -219848,11 +219848,11 @@ CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc CVE-2023-24773,0,0,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000 CVE-2023-24774,0,0,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000 CVE-2023-24775,0,0,370e52e17f228ac5b00111d084ae9525ce1a2e22d3eea9b60c4e85f7644c8192,2025-03-05T15:15:12.233000 -CVE-2023-24776,0,1,0a5f5709e205dd9226376644553b486dea56437f189c294a8080391f52998384,2025-03-06T16:15:40.317000 +CVE-2023-24776,0,0,0a5f5709e205dd9226376644553b486dea56437f189c294a8080391f52998384,2025-03-06T16:15:40.317000 CVE-2023-24777,0,0,a00b279e478c451a27881293d2469f6eae0019065247a670b5fb4f948be6bc73,2025-03-05T19:15:29.630000 CVE-2023-2478,0,0,e91b233a353d459fe8bdebf4b2ba61948a17e504cd67f12404049ad129f433dc,2025-01-29T18:15:44.907000 -CVE-2023-24780,0,0,a70e6811128672d0ff689b485eeaa75ae829acf7b17513334d6f6cc6f8dadc0a,2024-11-21T07:48:24.097000 -CVE-2023-24781,0,0,7a997d3dc41a9eaad892ecad59650364a4b3147ccd6d11b4f9bafcd21fd34e03,2024-11-21T07:48:24.223000 +CVE-2023-24780,0,1,b9dd2f1fcd3f4b89350b74f229ea1d418203d839d7a2ae180cc7fa5be7783a26,2025-03-06T18:15:40.293000 +CVE-2023-24781,0,1,3894237ed71ca7363e17746687075b44cf97033c92333187795d4139d0b6c65e,2025-03-06T18:15:40.553000 CVE-2023-24782,0,0,57db0d0839e35c2a54e424f4fd7fe928741c422b25adb1d1f016ad1dc9cc09c2,2025-03-05T19:15:29.800000 CVE-2023-24785,0,0,316b9878f5504255dd810089f62d0c938bc918f44d5e8b00a11c8b78f26588e7,2024-11-21T07:48:24.490000 CVE-2023-24787,0,0,1bb160417f56158608d2467445788d315bc974ff3fa7fc414e55d4483c668cc3,2023-11-07T04:08:42.430000 @@ -220205,7 +220205,7 @@ CVE-2023-2514,0,0,c0a74aabdf612338b5c2bbf99973c4dcf772d38ab9efc3bea1b0156e23e965 CVE-2023-25140,0,0,74362372391b31264001eb955c5daf2c2b9c8c748cdabd288baea2cf0557b135,2024-11-21T07:49:11.220000 CVE-2023-25141,0,0,6dc3c22bac02c920d3d25c63074609179b1ea370d4da9ecff5b21b830c61359a,2024-11-21T07:49:11.340000 CVE-2023-25143,0,0,f14793445037582372555d13411197b8aef60ff7d37d181eb93091b88030c258,2025-03-05T15:15:12.443000 -CVE-2023-25144,0,1,31d1251f7c4c1c756ddbd5a92934728af4974392f21d4a2332ac16e23b56cf80,2025-03-06T16:15:40.503000 +CVE-2023-25144,0,0,31d1251f7c4c1c756ddbd5a92934728af4974392f21d4a2332ac16e23b56cf80,2025-03-06T16:15:40.503000 CVE-2023-25145,0,0,71e62e20409077ec917ec9a494564df62e5a03e10fab96fa74817a2db3525c8c,2025-03-05T21:15:16.993000 CVE-2023-25146,0,0,b2d7efa3a19c0ed8ead8336e6b5ebce9a7c3889978c9ca6185fc1f12a51279dc,2025-03-05T21:15:17.160000 CVE-2023-25147,0,0,3f3be06805fca693d13306572db1e19af0d3aa94905d692b5b0da8ba725aecc4,2025-03-05T21:15:17.313000 @@ -221458,7 +221458,7 @@ CVE-2023-26596,0,0,473d756e5fc103c72c25cb52f36d58f77ec5ae61a2a53c9a3dc335fe84d6a CVE-2023-26597,0,0,aacf593fde559d15ce4638d00292bbc24591756418f0523c6654e6c81acd48a7,2024-11-21T07:51:49.657000 CVE-2023-26599,0,0,c5e1c6a4e42725cee36588845ac1a7fc3d032881dab1d5f8abf0c196155e5cc9,2025-02-05T17:15:19.107000 CVE-2023-2660,0,0,7ad14df71bd6f47a8139201861f3abc151d1b6fe342fd8128dd0f1b57656134e,2025-01-24T17:15:13.147000 -CVE-2023-26600,0,1,3837b133a282bf456abacb2fa744d8708012bf9caab68a89a3e7d04483d38643,2025-03-06T16:15:40.740000 +CVE-2023-26600,0,0,3837b133a282bf456abacb2fa744d8708012bf9caab68a89a3e7d04483d38643,2025-03-06T16:15:40.740000 CVE-2023-26601,0,0,a5885f284434b5f08eb9e7edc10d2032bb0cda5c5996581471528822ba1aee62,2024-11-21T07:51:50.100000 CVE-2023-26602,0,0,6b0e3fbb7db010761dc530c451b95f462476cafda0ba70599528d74ebf165b88,2024-11-21T07:51:50.250000 CVE-2023-26603,0,0,da0ea56691af772b0f5dfed4b9a6045657b5ba6cc005f62227c719c99c26200d,2024-11-21T07:51:50.400000 @@ -221609,7 +221609,7 @@ CVE-2023-26950,0,0,db6c38d36c1604a374855dab0dc50986d0667800502993578acb51fb8137a CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000 CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000 CVE-2023-26953,0,0,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000 -CVE-2023-26954,0,0,25be800d2a27b5a2697c9d918f8a2349a547ae4f9a78abb00c6ceaad8c48b070,2024-11-21T07:52:06.593000 +CVE-2023-26954,0,1,b94865c54780c7ba7a79b21a259127affa70ba3b43f0a5bc14f9d7ce32f7327f,2025-03-06T18:15:40.840000 CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000 CVE-2023-26956,0,0,c5b33ec4fa43b617109d236f6bbf1d37ebc8bc0e77d9487798a624e5f0cd4a70,2025-03-05T19:15:32.153000 CVE-2023-26957,0,0,9186fd6b7a0d9f712399075270eb4fab0601187e7a185759478106bd46f6bc40,2025-03-05T19:15:32.410000 @@ -222105,14 +222105,14 @@ CVE-2023-27562,0,0,02aaf69009c5868c27182c47816fc008f7a8a0de1090d6b5ba61af000201d CVE-2023-27563,0,0,67a3d59b5a20d3eb85cf287c56fcd025386cd683108d3a9c95939840486f9c63,2025-01-27T22:15:10.730000 CVE-2023-27564,0,0,2a39219f90001ea5b6f0d4e90096c2619009a5852031e492e1348901c3cc374e,2025-01-27T21:15:09.593000 CVE-2023-27566,0,0,f10ab8e0b7d4d116a52a66dc38e37d7b8d17b6f95eb30a8352a16094944dceb2,2024-11-21T07:53:09.667000 -CVE-2023-27567,0,0,360d050fab4e5c8c22c7fdf0f2e6e7fb5030310ba206a0a9d9dcdfc14aa42f2d,2024-11-21T07:53:09.820000 +CVE-2023-27567,0,1,94668bfbfd880085e80fa7471a835a196739f664f1b422751085c2605049dffe,2025-03-06T17:15:17.347000 CVE-2023-27568,0,0,f5a1403363921ab7fc1cf56bc2c0d0905aeb65a857a163fd7edcf497d05172a0,2025-01-29T21:15:15.063000 CVE-2023-27569,0,0,2ba164fc48bc30437e173646a4df537fcfe9af96c0088975a8abeebb4af24201,2025-02-26T19:15:18.457000 CVE-2023-2757,0,0,a2cd86ad9d8f6d688347ab07eee9989a9090ac17e23e43d191468be0c19893fb,2024-11-21T07:59:13.940000 CVE-2023-27570,0,0,ffffed4a5c2b06d092bfd16ce63e7837d76e279fceaff993a18a505133a896cb,2025-02-26T18:15:12.583000 CVE-2023-27571,0,0,1664d994358801a2e2cc6084d7f67372ed92e7bfc4f7161e3ba1f66590f3a522,2025-02-10T16:15:34.290000 CVE-2023-27572,0,0,13e429f2aaecf4c9aca9a294c0bd171df16f2ce6e26e8cfec3e8388ac5794180,2025-02-10T16:15:34.503000 -CVE-2023-27574,0,0,df567f9b89da09129f0cbae1ad637d6f0f78a62f6df3074318157b9b5b0d8889,2024-11-21T07:53:10.753000 +CVE-2023-27574,0,1,365e860ab89cbceb9e5f99f017f2d220b1632f36ed81b4c4d75cf574f2f2a0c0,2025-03-06T17:15:17.480000 CVE-2023-27576,0,0,df8958a2c7e5597719cf58a7c6fd6b0d8479173cfc9e96e91767543d29a9dbb4,2024-11-21T07:53:10.920000 CVE-2023-27577,0,0,0da2b25e0a1965db86ba365b137153bb2f27399113760640b8e95cd7713c3a3f,2024-11-21T07:53:11.080000 CVE-2023-27578,0,0,988b28a78350e95e49bee99d6d0a6c5d6e46ad44d77272c1b11ed40acd47c2eb,2024-11-21T07:53:11.210000 @@ -224961,7 +224961,7 @@ CVE-2023-31076,0,0,36bac3067e015c0b66ec2372ce6f587ae23e3728a833faffceb614da67fc0 CVE-2023-31077,0,0,e24ced2f70a3032ddc3b2af8f09927d8b3711d6cc86cfafe5375d47b48ffdbc6,2024-11-21T08:01:22.073000 CVE-2023-31078,0,0,fbdf7f7231b8eff5bab359b91c97139c07de6f4e006a1a6ec72fcb6fcac1de06,2024-11-21T08:01:22.183000 CVE-2023-31079,0,0,0ee5e9b842f3db2d32d79ab8fb43a4787f096c8cc6b34af17bbc61bddfad4fbb,2024-11-21T08:01:22.297000 -CVE-2023-3108,0,1,b1558bf7aec6215d0ff14bf10f30306440c255be6f63579c15dfa6828721cd6d,2025-03-06T16:15:42.473000 +CVE-2023-3108,0,0,b1558bf7aec6215d0ff14bf10f30306440c255be6f63579c15dfa6828721cd6d,2025-03-06T16:15:42.473000 CVE-2023-31080,0,0,39a26574f36ed8dd0c9fd3a387a9dd657d7d5ad3d809d3e00a3a74a4b19efbbf,2024-11-21T08:01:22.417000 CVE-2023-31081,0,0,d13875ba401a922862d07e377f4731883ace7ec34bcc115717207fa57c36fae4,2025-02-04T20:15:48.993000 CVE-2023-31082,0,0,622eb9692074f84ebebf1f6ccc63dfc5594b511731b33469e7c3fc69ecbf8e80,2024-11-21T08:01:22.690000 @@ -226119,9 +226119,9 @@ CVE-2023-32557,0,0,4610a54a482f955f3b94e7274db9d879cb2b691166c714fe8994d35b3a462 CVE-2023-32558,0,0,60ad4ddbb1220a3ce9ba4efc190af04be51492e32acf9905e5db2ba6854eb11d,2024-11-21T08:03:35.867000 CVE-2023-32559,0,0,571185391c7054bb4441dd3b65914f2281602e8ca365181a4df6ccb4e42ccb41,2024-11-21T08:03:35.990000 CVE-2023-3256,0,0,a92fa62cf61958d54177c7850dcc03d5b1bc70f5bcd837a496328bc06300fd26,2024-11-21T08:16:48.780000 -CVE-2023-32560,0,1,a5d634658cc7a874df37e91a2b18c36de245a11adc53b0d0146151f1dc0d0df2,2025-03-06T16:15:41.303000 -CVE-2023-32561,0,1,4727ed861abbae007a69386bbac521dc71d40735d6275d13140d4b3dc59f2484,2025-03-06T16:15:41.460000 -CVE-2023-32562,0,1,c5aea3318b67375870339ebb5ae5004ef4b3a21e9c52743d507002866915ccae,2025-03-06T16:15:41.573000 +CVE-2023-32560,0,0,a5d634658cc7a874df37e91a2b18c36de245a11adc53b0d0146151f1dc0d0df2,2025-03-06T16:15:41.303000 +CVE-2023-32561,0,0,4727ed861abbae007a69386bbac521dc71d40735d6275d13140d4b3dc59f2484,2025-03-06T16:15:41.460000 +CVE-2023-32562,0,0,c5aea3318b67375870339ebb5ae5004ef4b3a21e9c52743d507002866915ccae,2025-03-06T16:15:41.573000 CVE-2023-32563,0,0,98690f12b8374208182fb4e4258074214d1a1c7fc365e0fd322088aca2705bdf,2024-11-21T08:03:36.527000 CVE-2023-32564,0,0,0110939bbbb296f8a1f1c00eaf9f1d011e42a76f4d099cf6325379b063f2fae3,2024-11-21T08:03:36.653000 CVE-2023-32565,0,0,c758dc41ed02cd23af8831add347bf021d7a6870c2092336f155e1024b96d95c,2024-11-21T08:03:36.767000 @@ -227335,9 +227335,9 @@ CVE-2023-34053,0,0,5ae81959572b70290db0620248a24971b183da06bcf2b3d45b687f0513f5b CVE-2023-34054,0,0,54500b21f2354894f709d5aaaad6b7ca7d00a2320d0e85a660f187b6a0c1a8ee,2024-11-21T08:06:29.087000 CVE-2023-34055,0,0,63c9b47aea5e3276830467960d55017cc9db53b3e62afce329d8601be1afd12d,2025-02-13T17:16:34.187000 CVE-2023-34056,0,0,14d3c031ca9e7007f761abd8416e245959ae8261bd94404120378234965069d1,2024-11-21T08:06:29.343000 -CVE-2023-34057,0,1,fe13f25a590c897e9278fe1e31233dc8fe31216d2f195ddacf2dbf34bcde92c4,2025-03-06T16:15:41.690000 -CVE-2023-34058,0,1,a0d110aa3005667043c6cc6fda4058edfc29f5aec6a59d90d13839ef54f7715d,2025-03-06T16:15:41.840000 -CVE-2023-34059,0,1,973b3e3aa24fb1da7f85a92d2bb757b23faf3999164d42dd87bb0ae425656feb,2025-03-06T16:15:42.033000 +CVE-2023-34057,0,0,fe13f25a590c897e9278fe1e31233dc8fe31216d2f195ddacf2dbf34bcde92c4,2025-03-06T16:15:41.690000 +CVE-2023-34058,0,0,a0d110aa3005667043c6cc6fda4058edfc29f5aec6a59d90d13839ef54f7715d,2025-03-06T16:15:41.840000 +CVE-2023-34059,0,0,973b3e3aa24fb1da7f85a92d2bb757b23faf3999164d42dd87bb0ae425656feb,2025-03-06T16:15:42.033000 CVE-2023-3406,0,0,932f55ab16fb6316d15d1bcc321abb01d6031539906cd4d55424f8f89bfb1504,2024-11-21T08:17:12.073000 CVE-2023-34060,0,0,3e5a9882e83d81f853f8b71eeb1694bc2ff8ad4f0c10273aaf0873d1d85d02cf,2024-11-21T08:06:29.930000 CVE-2023-34061,0,0,06d7c75de09eb9adcce12a4d4977539a997e0f8c87108057d925c9e02894d369,2024-11-21T08:06:30.063000 @@ -229728,7 +229728,7 @@ CVE-2023-37359,0,0,f02625974ed9354ede7ae2f59a32dda01c9ba2ef82ea5d39f957bfe558268 CVE-2023-3736,0,0,dedafd6877d26f0fd9c122ea355f658fc7c7b4f2ec3e77dacbfc62facc85cd35,2024-11-21T08:17:56.810000 CVE-2023-37360,0,0,a924b07516dea5ea55366c15ee25306723cb158985e96268ee4dc29522a23de4,2024-11-21T08:11:34.787000 CVE-2023-37361,0,0,19f0591a98743be38ef4b9d2856f125450962cad4b2cc4b48619c1779fd7a2e3,2024-11-21T08:11:34.950000 -CVE-2023-37362,0,1,aa44fd3c0258bcc9d876470889224b6128b9eb9d1097bd87fe51f83f770a3c38,2025-03-06T15:15:14.640000 +CVE-2023-37362,0,0,aa44fd3c0258bcc9d876470889224b6128b9eb9d1097bd87fe51f83f770a3c38,2025-03-06T15:15:14.640000 CVE-2023-37364,0,0,d5c55ace2d7cc463ee55d1b0e62f9401dca35cb21f12f6fefd05764cfc3d11ab,2024-11-21T08:11:35.237000 CVE-2023-37365,0,0,9e780399abccdae1564a73b0cf5a6e3def6a18d4d14ee1798d8820edbb0921e4,2024-11-21T08:11:35.397000 CVE-2023-37367,0,0,76359d1f04beb8292d5c3157cf7c1e7dce70d10c2116c1a0d80eba70a20432b6,2024-11-21T08:11:35.543000 @@ -230371,7 +230371,7 @@ CVE-2023-38136,0,0,cc4955f78f48feea52a8ff9bece7ccf895118e79124cbc89767e10212b3e4 CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000 CVE-2023-38138,0,0,265118541aedab6ba410564980d475efb6b1cc3413d9a0d65fd07fdd99402bf9,2024-11-21T08:12:56.123000 CVE-2023-38139,0,0,28ae972bc6c292c9dd7822dd5342d5b1431b1b6fdb4601c453b88cb6d465c678,2025-01-01T02:16:26.357000 -CVE-2023-3814,0,1,50c8b1f6ff11b5c3809021368f87eeb1fa75ea2568cbc65a64c1135349534f2c,2025-03-06T16:15:42.640000 +CVE-2023-3814,0,0,50c8b1f6ff11b5c3809021368f87eeb1fa75ea2568cbc65a64c1135349534f2c,2025-03-06T16:15:42.640000 CVE-2023-38140,0,0,a34a747b89d3dcdfe8ad85324181d3e8f9bab543b4b57dbc3136d213216a9e4a,2025-01-01T02:16:26.500000 CVE-2023-38141,0,0,738a18f3924c7c7a418c243d5f24cf5673e8b3034ee1e019b1313fe7e01db4d6,2025-01-01T02:16:26.637000 CVE-2023-38142,0,0,884787762ba22e2f7aa32255c43142dea70f99b7c3aae4a90b5d62bc3dd70d25,2024-11-21T08:12:56.763000 @@ -230771,8 +230771,8 @@ CVE-2023-38543,0,0,9e3af4531e43f5677526b7f10f6c415eed9d42534cf2e2ec7e7acb1480c04 CVE-2023-38544,0,0,8dbb1a660034a252199bf3aba268cd48e857709594f614422deafbb9308a766a,2024-11-21T08:13:47.867000 CVE-2023-38545,0,0,f9271564da96af86fdebc39a0aa493a80f85ca57e13f2db6b740c24e066529f6,2025-02-13T17:16:47.823000 CVE-2023-38546,0,0,b5df3fb7387fa5c1fb6da642f5327a6a3ec6222b99cff3e506373299769294f8,2025-02-13T17:16:48.027000 -CVE-2023-38547,0,1,2b2d99dc0b12a17e84ec9c9cf2241317051c7fea7f54e71bd1cddbbb60e5297a,2025-03-06T16:15:42.203000 -CVE-2023-38548,0,1,94a619ea0c0739293919cd8abcc38048ec1910e65463718b4b27b4b29ad08636,2025-03-06T16:15:42.350000 +CVE-2023-38547,0,0,2b2d99dc0b12a17e84ec9c9cf2241317051c7fea7f54e71bd1cddbbb60e5297a,2025-03-06T16:15:42.203000 +CVE-2023-38548,0,0,94a619ea0c0739293919cd8abcc38048ec1910e65463718b4b27b4b29ad08636,2025-03-06T16:15:42.350000 CVE-2023-38549,0,0,223f4da3ef138e6118d09094cdb53d07b647a42b8ce5c54b50f75768a9451617,2024-11-21T08:13:48.593000 CVE-2023-3855,0,0,3fa7c2c96667132385f9e93f131c3f823b77b6bf879f2fd372afb1b648775efe,2024-11-21T08:18:13.613000 CVE-2023-38551,0,0,192d3411bb909e5538c7acd67c719431efc5fafe865c7e56d0ec31d44c3f71bc,2024-11-21T08:13:48.717000 @@ -232431,7 +232431,7 @@ CVE-2023-40586,0,0,719c188b1093cc66a5e37b560626e3284e5e1e2069c84dc2c54e12f1a1f25 CVE-2023-40587,0,0,a8761c1922b81175d8185d4bb24db2787e94cd8a2bd28a2696ec2c4903b688d0,2024-11-21T08:19:46.277000 CVE-2023-40588,0,0,edc6f88a1e87c0cad15aea7f7762e660a5fdb7d930a87a7a44eff8430fc6433f,2024-11-21T08:19:46.417000 CVE-2023-40589,0,0,b4fbf3335603108bd816c4828fa7f5c28328a56880c21745c0ded46831b57b92,2024-11-21T08:19:46.583000 -CVE-2023-4059,0,1,9d6db5e26d8986f99a875a3960586af827d7c9368cc33518b177e44a85c063ff,2025-03-06T16:15:43.977000 +CVE-2023-4059,0,0,9d6db5e26d8986f99a875a3960586af827d7c9368cc33518b177e44a85c063ff,2025-03-06T16:15:43.977000 CVE-2023-40590,0,0,a4294d30d7ff66a37ceae3631ba9e1de337caffcdfa33c94063a8f679dd167f1,2024-11-21T08:19:46.723000 CVE-2023-40591,0,0,17decb38b943a307ec65fcbdde09f3634630f51a5c9b9d06c26af7d692c33dcc,2024-11-21T08:19:46.860000 CVE-2023-40592,0,0,ec0809b3ef31f10960945c2239566afeb74a477e1f00d43065ae029f6a1ff61c,2024-11-21T08:19:46.990000 @@ -233120,7 +233120,7 @@ CVE-2023-41505,0,0,542892c6e9a5b11b222cd59017abff36cdf4a98ed7c8639aab3d6766aa874 CVE-2023-41506,0,0,7a8dca2e3366085c44580d19785cad1e729ca5b1f5e59b8a15aaffe2cf84d224,2024-11-21T08:21:15.190000 CVE-2023-41507,0,0,5f979ea0d45c236a90b02e844b6c4cb504d32fcad222700f17481ff17ba4f917,2024-11-21T08:21:15.417000 CVE-2023-41508,0,0,731c1bec0b5200878921d3336877eeddf3b26b9255a8e10ccf110ad9f68effc2,2024-11-21T08:21:15.573000 -CVE-2023-4151,0,1,d1ce01bb4f25f5f2855fe350f38c2808e36f55f2ad09017b6777fcb497165a99,2025-03-06T16:15:44.243000 +CVE-2023-4151,0,0,d1ce01bb4f25f5f2855fe350f38c2808e36f55f2ad09017b6777fcb497165a99,2025-03-06T16:15:44.243000 CVE-2023-4152,0,0,80f83c53fa8ba0d2d947715fa4f40354139cafe3d0bd129ef193f1a40f4e16ad,2024-11-21T08:34:29.573000 CVE-2023-4153,0,0,8a5d6c42cba6526b7c8430f1798da45dace4994dc5f29622c78d5d3374df9fd7,2024-11-21T08:34:29.707000 CVE-2023-41537,0,0,813b26f0a3e3bef990940e4d9e606bc5cc0e0c25abd1bfc7bdf7496a2c6d33cd,2024-11-21T08:21:15.730000 @@ -233463,7 +233463,7 @@ CVE-2023-41923,0,0,6672794e5b086207eaf32ac240d40692a0102f7605db3c52d67f753345487 CVE-2023-41926,0,0,a2e5c0fb14e8850260ec917f93bf6e5b87afca0838bcf3d87b397d60dc731335,2024-11-21T08:21:56.017000 CVE-2023-41927,0,0,e3f34ee931cc1f0f2ef348f96477db51082d1bff326b084042922b7c19afc3e3,2024-11-21T08:21:56.140000 CVE-2023-41928,0,0,4ab999ee652bc20bf103a242dd3775a43abbbf7a8a62dee6498ed9a6c272fbc0,2024-11-21T08:21:56.267000 -CVE-2023-41929,0,1,b97a9d919c638369d466a5b8e924652847cdf4716bc8196e16a745fa52d8eeef,2025-03-06T16:15:42.883000 +CVE-2023-41929,0,0,b97a9d919c638369d466a5b8e924652847cdf4716bc8196e16a745fa52d8eeef,2025-03-06T16:15:42.883000 CVE-2023-4193,0,0,7f2229873156e67d499162dd0a4e3d2ad5a942d8cef3eaa8b94fa0b2a6ef0210,2024-11-21T08:34:35.543000 CVE-2023-41930,0,0,f4c20118c7278e3cd28c6daa90fc4cd8f16f19a26fa6477337a81bf1b5106c90,2024-11-21T08:21:56.547000 CVE-2023-41931,0,0,1a2fca091d3fe986c5ad3ecb1818a2fd61a0c76792713bc99e7f634eb5333a0a,2024-11-21T08:21:56.680000 @@ -233492,7 +233492,7 @@ CVE-2023-41951,0,0,98e70f2472c272eab38b34ff997e9178d05c1c4057e095403658a377d31ee CVE-2023-41952,0,0,28dc140abbdafd809d8605f6c0e6d9c06ca12a6fabb3fdbb96324006875f8e5a,2024-12-13T15:15:26.233000 CVE-2023-41953,0,0,bc4865e668ac127b8f36fcd8e693fc25399960e08a5b85379c7fad016bbbdde4,2024-12-09T14:15:08.710000 CVE-2023-41954,0,0,d8c277806dfc384ce4e926004798dd8109e8f7c434571cd96d044ee59f5e1440,2024-11-21T08:21:59.187000 -CVE-2023-41955,0,1,7872a953650b23f290bfc9b369a025bffb2fc00b36397ce4af4bc717dbc32fdb,2025-03-06T14:25:09.843000 +CVE-2023-41955,0,0,7872a953650b23f290bfc9b369a025bffb2fc00b36397ce4af4bc717dbc32fdb,2025-03-06T14:25:09.843000 CVE-2023-41956,0,0,3282aedd80768b55256122ab701e734c381a5dbdfa9d40baad17e088167db9aa,2024-11-21T08:21:59.407000 CVE-2023-41957,0,0,a29f516d99af407c126a5e7ad417d81ce357dcbef8ae20e5c515d3719d1d6e20,2024-11-21T08:21:59.523000 CVE-2023-4196,0,0,ef9c1646e137c44dab7abcf516cdc093158d8d226c4a6c8193984fb89aad5817,2024-11-21T08:34:36.033000 @@ -233894,9 +233894,9 @@ CVE-2023-42537,0,0,f8c46a51e356e557a2055cbce5cdb7f64e93d05c6ba3b5b8f6282610c02f6 CVE-2023-42538,0,0,a965a3a2bd34db10e5d7a145939a6e3a815398113fe2d90ed39b1bd73c6a052a,2024-11-21T08:22:44.693000 CVE-2023-42539,0,0,90e9b64cc69c53cf02d59065f49db5c198bece6910c4677da9c65fc217a8f6e6,2024-11-21T08:22:44.823000 CVE-2023-4254,0,0,4fbd16f327db8ef3dddf3f9d997f02e67733f6be91aa3b6552b6d17a05a0d34a,2024-11-21T08:34:44.127000 -CVE-2023-42540,0,1,157c1465ad1a11dae33490426110bf3cd340f247258da486cea37205c2bee11c,2025-03-06T16:15:43.070000 -CVE-2023-42541,0,1,a27409519278bbf3b68828e1c3bed0970f8ade9f5c8e68115fdf46911f82456c,2025-03-06T16:15:43.210000 -CVE-2023-42542,0,1,a5532dc0a3a9723a3783c97e275bc878a8a24848d4866110e72fd553c34bb365,2025-03-06T16:15:43.343000 +CVE-2023-42540,0,0,157c1465ad1a11dae33490426110bf3cd340f247258da486cea37205c2bee11c,2025-03-06T16:15:43.070000 +CVE-2023-42541,0,0,a27409519278bbf3b68828e1c3bed0970f8ade9f5c8e68115fdf46911f82456c,2025-03-06T16:15:43.210000 +CVE-2023-42542,0,0,a5532dc0a3a9723a3783c97e275bc878a8a24848d4866110e72fd553c34bb365,2025-03-06T16:15:43.343000 CVE-2023-42543,0,0,a53769c714af0214b1487178b63dcda6e2559f73aa5f625cf02f63a296981d11,2024-11-21T08:22:45.267000 CVE-2023-42544,0,0,76d857404ab8d34c9c09c13101ac377541ffb21a614ee5b54f86c965cba96956,2024-11-21T08:22:45.380000 CVE-2023-42545,0,0,b98421ed2e2e8c61ae4123b1a712c26b1feda452fa409c55a5d046fbb9566d2f,2024-11-21T08:22:45.483000 @@ -233908,8 +233908,8 @@ CVE-2023-4255,0,0,c5b2e40c012cf803cabd84b7778f7dd86ad2fee973518a2094733a22bac3f5 CVE-2023-42550,0,0,f5909b83c66a428df0847de6b9bb4c422f631e9a69ee69bf5794daebceb8471a,2024-11-21T08:22:46.050000 CVE-2023-42551,0,0,3dea46979b28b7f805199c941a7d4b05feb3ca71fbbdef1080eedad13cb820e8,2024-11-21T08:22:46.167000 CVE-2023-42552,0,0,9a4aa8166c46c6ad621f0cd3d3e4be2041a6f974ec08b5f5e1c2d02d5a5abd71,2024-11-21T08:22:46.290000 -CVE-2023-42553,0,1,c5c90c4219ae9f38b33685ebe6bb6227f80bf9646bdd065d1b8cdd1df783cc35,2025-03-06T16:15:43.477000 -CVE-2023-42554,0,1,30761b3bea242bf46791f615e604bc7fea4c361be44f0d58db7ce7d07a498d9c,2025-03-06T16:15:43.610000 +CVE-2023-42553,0,0,c5c90c4219ae9f38b33685ebe6bb6227f80bf9646bdd065d1b8cdd1df783cc35,2025-03-06T16:15:43.477000 +CVE-2023-42554,0,0,30761b3bea242bf46791f615e604bc7fea4c361be44f0d58db7ce7d07a498d9c,2025-03-06T16:15:43.610000 CVE-2023-42555,0,0,d538383024e32be4906c7b35e1115de1a92bf5c6334c56309ebfaab223f9acc9,2024-11-21T08:22:46.673000 CVE-2023-42556,0,0,a8f236b67850056434f98fb83faaf8916d0dca59e2e05c589baf9a06b35c4c7f,2024-11-21T08:22:46.823000 CVE-2023-42557,0,0,d84c5a894c1e0aa60b57cba3ff441d683b8d527d9e9d9815b82a377730b1eb2b,2024-11-21T08:22:46.960000 @@ -234159,7 +234159,7 @@ CVE-2023-42835,0,0,9956dc456ba41773404d8f44ad7b269b3f7a358f4e5a280c805b86e2ebbfd CVE-2023-42836,0,0,41392f6b460b4e057e3bcec26a92d2622dbe2bbf4f90e1b65389263aa691c08d,2024-12-06T13:56:19.023000 CVE-2023-42838,0,0,5f38c10fa599c8161f30883b8dcf218bf82058392e8253a87f2a3eddeca9c76d,2024-12-06T13:51:35.313000 CVE-2023-42839,0,0,39ea04a2699b0f7e4c5dcb0cdb48039dc64ac9c18539c7db4f5ded80049365b0,2024-12-06T13:49:37.623000 -CVE-2023-4284,0,1,15176d46fdb145d510668ccfb2d9ac22595d3aca1f56214b3c6d1631b9dcc24b,2025-03-06T16:15:44.440000 +CVE-2023-4284,0,0,15176d46fdb145d510668ccfb2d9ac22595d3aca1f56214b3c6d1631b9dcc24b,2025-03-06T16:15:44.440000 CVE-2023-42840,0,0,f1f04b9061bdce447f5753f3876abfe458e8bb3d9b95843639858d111f70f4da,2024-12-06T13:28:41.990000 CVE-2023-42841,0,0,65b7e1ad315406896de3c94e87d786f7cf003f4d9bd5ce0d8e6ab6a5e0c24dc0,2024-11-21T08:23:20.427000 CVE-2023-42842,0,0,c8bff024b90962ecc0632c5f07ce14f349a9e38fec2708ad4ebbc5895167d3fd,2024-11-21T08:23:20.637000 @@ -235479,7 +235479,7 @@ CVE-2023-44997,0,0,efbd2633cf4347525166f108807458b201a5cfcefdac55279eb2d650a026e CVE-2023-44998,0,0,50baa0ccce55be5da3f2afc62b780f6cf72c18ddd9a484e733a4e2b5811c8601,2024-11-21T08:26:12.340000 CVE-2023-44999,0,0,444952b9efd04a83fadbe72fa090e1791590098ccae3a889bb1d8154d7d29fa4,2024-11-21T08:26:12.467000 CVE-2023-4500,0,0,e4e876677a323f721a42330b69404f9a5cdfbe31eb40b4ecc2dba9c49b3187ea,2024-11-21T08:35:17.893000 -CVE-2023-45000,0,1,1a50b84c316432a912c8ad314433163a1b43fd68afe89719d2cb955ced2944c6,2025-03-06T15:00:11.560000 +CVE-2023-45000,0,0,1a50b84c316432a912c8ad314433163a1b43fd68afe89719d2cb955ced2944c6,2025-03-06T15:00:11.560000 CVE-2023-45001,0,0,98537898ba3424c877ebf2faa54c0135532a4d94495084e2ad604b6c259509d9,2024-11-21T08:26:12.707000 CVE-2023-45002,0,0,5320798fbd2b6cf53aa78078c115da061d7e65424387effda8ebfea1926eea6b,2025-01-02T12:15:08.213000 CVE-2023-45003,0,0,54c4416fd646a73fb4862704ea1b8aa5b14ca76f6e6a2edddd3ef1a10193f8ae,2024-11-21T08:26:12.900000 @@ -235717,7 +235717,7 @@ CVE-2023-45269,0,0,df30a628c2355b826a0763802258a5717003353b30d77a1d50a39de3f073d CVE-2023-4527,0,0,943afa930acf035675be7abef1ad8853061357478138f6af4a913f2370031464,2024-11-21T08:35:21.017000 CVE-2023-45270,0,0,69d74393fbe2c6d6f764fac8b38d4261442e7ff349a1e5cd07739334d44fa0ca,2024-11-21T08:26:39.900000 CVE-2023-45271,0,0,d75e51b6dd57dcfcce9b03d22ae28c695e096579f540b51970cf4627f049d40f,2025-01-02T12:15:09.087000 -CVE-2023-45272,0,1,bf0988ac9b16569bb134920602736441ec15ed9293fd8a85e018bcc00d15731a,2025-03-06T16:24:25.053000 +CVE-2023-45272,0,0,bf0988ac9b16569bb134920602736441ec15ed9293fd8a85e018bcc00d15731a,2025-03-06T16:24:25.053000 CVE-2023-45273,0,0,880597879d86c39cfc7345a16e74549f291701eac300d25ab5053f72e06e8841,2024-11-21T08:26:40.033000 CVE-2023-45274,0,0,eaccf5088e491ebf40d3565e1cee1a9b753d3967d51ec070419a6f3208b48de9,2024-11-21T08:26:40.177000 CVE-2023-45275,0,0,2901fe4dcd54f92c3f3b84fd16fab2304413d9a095e3291db7ddfa2e35398ca3,2025-01-02T12:15:09.253000 @@ -237223,7 +237223,7 @@ CVE-2023-47229,0,0,3adb994ca6cdcad8eb83b9151b12f156582ee2417351a650229d82f3cb1c5 CVE-2023-4723,0,0,3cad2c4753548cfe0589bb544126de571736ddc4cf1fc44a5e937c6334c989ec,2024-11-21T08:35:49.953000 CVE-2023-47230,0,0,88ff3f363a211b06fe1348d1b61025c40e9925d4d36e5b0fd08ba9cea9a8537c,2024-11-21T08:29:59.890000 CVE-2023-47231,0,0,3520b005dea272031d64804dadf228fdb08af13f48073a2be1c26500bff4965c,2024-11-21T08:30:00.010000 -CVE-2023-47233,0,1,a9a2684cd0785f1a7b9e1e6c8995687395ba6848a967631d2a10efb06008c9f6,2025-03-06T16:15:43.747000 +CVE-2023-47233,0,0,a9a2684cd0785f1a7b9e1e6c8995687395ba6848a967631d2a10efb06008c9f6,2025-03-06T16:15:43.747000 CVE-2023-47234,0,0,11c566f8efd0ad86ac1a32709c15f8ffa1109cc696e21d28fc76ac2a831dad15,2024-11-21T08:30:00.290000 CVE-2023-47235,0,0,421ae36ce22132f02c01ccfd324bb89699c78531f40346aa7a58f1139495c804,2024-11-21T08:30:00.550000 CVE-2023-47236,0,0,2b482540ccea2af6d5776c7a4953d4ea2e9b74d73913ad9d07d970f5783c72d6,2024-11-21T08:30:00.773000 @@ -237637,7 +237637,7 @@ CVE-2023-47803,0,0,c49de6e54ad79301c655a131558ab3ecfd613b8f091c559078a77637e6507 CVE-2023-47804,0,0,6205142f7b14e239ef92fef2b1ac44f9d1e9b48dff0ed3b2e07500fdcf8f815a,2025-02-13T18:15:39.070000 CVE-2023-47805,0,0,a0525de6234d3b1e9bdc7e814d4514ded58e7b5fbeedb2b4ce90abaa3b961354,2024-12-09T13:15:30.923000 CVE-2023-47806,0,0,b0cdbd3a00354474ea134767ba68204fac150af82620653bb81d9b5e16a93e04,2024-11-21T08:30:50.427000 -CVE-2023-47807,0,1,a89a754294e6a18768abc4ebafd8889155ccb0ad11bb4d71b15464a69f9d6967,2025-03-06T16:24:25.053000 +CVE-2023-47807,0,0,a89a754294e6a18768abc4ebafd8889155ccb0ad11bb4d71b15464a69f9d6967,2025-03-06T16:24:25.053000 CVE-2023-47808,0,0,327617dcfd8384900f916ba988789bf4115df1547b61d304fce6a00025e1fde7,2024-11-21T08:30:50.547000 CVE-2023-47809,0,0,59a8f7100bfafe9b654572824ff69d52b6615f04c537336d08143834e2f8bb5d,2024-11-21T08:30:50.663000 CVE-2023-4781,0,0,1dda192eed24f229ea670ca6261d785c282a6441d361d6249e497921f5e00664,2024-11-21T08:35:58.263000 @@ -237726,7 +237726,7 @@ CVE-2023-47994,0,0,2407410d7ded4d367a026e01fddb621dfd45ee7da03ef596706b72aa354b0 CVE-2023-47995,0,0,41535b8005f55226bfe09c7387ca5fca2008636be7e90857db9ae84df1ea6ae9,2024-11-21T08:30:58.580000 CVE-2023-47996,0,0,cbac3b53939e4af700bbf3e8343625bc5dbfa35beae326b063e92331617e7883,2024-11-21T08:30:58.743000 CVE-2023-47997,0,0,12c5b586b678f710d3488c6ea0bce408a7fe54f1116b3c5b1079fafd971845e4,2024-11-21T08:30:58.883000 -CVE-2023-4800,0,1,9219a8d689175c8d23a477f020fd49ec8ed19f426bdc6d7efdfde3cebd54d0c9,2025-03-06T16:15:44.567000 +CVE-2023-4800,0,0,9219a8d689175c8d23a477f020fd49ec8ed19f426bdc6d7efdfde3cebd54d0c9,2025-03-06T16:15:44.567000 CVE-2023-48003,0,0,39e2d8087ac8da7a3c050c642a95f0b99731fa2299f4641ccbdf29b34156ea6a,2024-11-21T08:30:59.023000 CVE-2023-4801,0,0,1612b8ad8a100bd0095834f8cf820b43c1529313117b5922e35f752cf57742d4,2024-11-21T08:35:59.690000 CVE-2023-48010,0,0,e1fe89213ce90a7900e1f6a7994354bf24a589b18d4933ffb40f5731aa4ca2d7,2024-12-11T17:15:13.820000 @@ -240160,7 +240160,7 @@ CVE-2023-51426,0,0,f605e0808f885d471a26c00eccdef9ad580294aad4cf8fef2ddd9f572d5d6 CVE-2023-51427,0,0,1c606009f2dbdb86c1ee3b033970433db07185dc9e5e3e8db3161f3d9e798679,2024-11-21T08:38:05.667000 CVE-2023-51428,0,0,198f747e1368516dcbd419fd1745392ba334ed61d2ca5da116a3d4cfd4df8d80,2024-11-21T08:38:05.783000 CVE-2023-51429,0,0,31f34cc9ea0aec6d96c2e301a373bd9df9cb337bb791cd73e2935dfe221d972b,2024-11-21T08:38:05.910000 -CVE-2023-5143,0,1,2d491a0f3c8a3cfb2336905a4b899d2e815bc61381c705f4a6a0519413961544,2025-03-06T16:15:45.333000 +CVE-2023-5143,0,0,2d491a0f3c8a3cfb2336905a4b899d2e815bc61381c705f4a6a0519413961544,2025-03-06T16:15:45.333000 CVE-2023-51430,0,0,ec8c74d8cbd5c3f9f706b4bab06cf91cfc1c914e7ee0316ee3d90739abc7c00a,2024-11-21T08:38:06.050000 CVE-2023-51431,0,0,25c27e7af7aed5b83e003bcbe13a98f21c332e93ee76fb6d167b264854c2e05d,2024-11-21T08:38:06.160000 CVE-2023-51432,0,0,29febc5eadbecf1ddfecf6cf2a0433c2b3c244ef25eeda84ad87c55157b659d5,2024-11-21T08:38:06.277000 @@ -241235,7 +241235,7 @@ CVE-2023-52686,0,0,78f996d2013a9096341f0d1c834ac1c73fb05606dc6f557d6437920121b61 CVE-2023-52687,0,0,bbc8fc1dedb818bce118b2c7db04aab7b8059594413eb22394ab804738b96713,2024-11-21T08:40:21.700000 CVE-2023-52688,0,0,9dc230fe3db4a9be36210348538add296ace0ab48c31cd4e90194d9bd1a909f0,2024-11-21T08:40:21.923000 CVE-2023-52689,0,0,790089ccb5dbca94271b582a4ae66681f2a34b377a106c082c546248aa1dbe89,2024-11-21T08:40:22.033000 -CVE-2023-5269,0,1,62ef4056afab45d0c95a031eeec681aea89f1a71d3adae5c7cfd3da3f7ee0ed9,2025-03-06T15:15:14.830000 +CVE-2023-5269,0,0,62ef4056afab45d0c95a031eeec681aea89f1a71d3adae5c7cfd3da3f7ee0ed9,2025-03-06T15:15:14.830000 CVE-2023-52690,0,0,aa56fec2ae1f31c32ae4d61e5f7c9e40549ac31b2bf239b1391ddac0420ac0a3,2024-11-21T08:40:22.153000 CVE-2023-52691,0,0,a64baa25fadffa1557a15dc817d7f8c834b516c14cdd512d500df9f6752c0946,2025-01-10T17:59:11.383000 CVE-2023-52692,0,0,35e83f69530051d0eafe3b62cf812c667004e80a63c768d5530a91d5f9405ce5,2024-11-21T08:40:22.410000 @@ -244881,7 +244881,7 @@ CVE-2024-1069,0,0,e0471f0c714f902c31bc433a8b0d70841b0e8ce0fe684171f01f3f7a66ed02 CVE-2024-10690,0,0,921c261c24c74d1d2b944c306e80e222d1c824694456e626aa271c43cca537d1,2024-12-14T06:15:19.057000 CVE-2024-10691,0,0,db2c0688a52bf60c2a1055a856c5f32b6875efacbb339285fcf0094be8a5d17a,2024-11-15T15:15:05.943000 CVE-2024-10692,0,0,5e1146f423cde68a63e7a22493125c7688543e1095f09d080a759f6046e2d5a3,2024-12-06T09:15:05.190000 -CVE-2024-10693,0,1,9c0cf23dec8f5ac933a6156670a623f4dfbdaac0e5e551f7e1c1b7dc926b2e56,2025-03-06T14:25:09.843000 +CVE-2024-10693,0,0,9c0cf23dec8f5ac933a6156670a623f4dfbdaac0e5e551f7e1c1b7dc926b2e56,2025-03-06T14:25:09.843000 CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000 CVE-2024-10695,0,0,35cef9e33246637d49e253b33fc95d5b5806d427aec3c4244d5b26dc1b28de11,2024-11-14T19:44:16.020000 CVE-2024-10696,0,0,2720d210d1520d7ccb05bf778730d93163c6d42c81c74f25ce11c5d9757ea63d,2025-02-05T14:55:34.007000 @@ -245031,7 +245031,7 @@ CVE-2024-10856,0,0,7e9eb9b0320a824a6f22312f21c483e6a20231d2b64419ecd83ac1284ebe6 CVE-2024-10857,0,0,957ae8afb2b021b5a39096260dcb79ccdc7e257258c659d883b9a23a31df5c0b,2024-11-26T07:15:05.003000 CVE-2024-10858,0,0,42b123ba3b0529f7fcd2fe96eb2bcf8b1478b777f663ea90f1bede156318a16a,2024-12-26T20:15:20.080000 CVE-2024-1086,0,0,ed3b4cc9e937086bf7bd2a6eab945784d7bd20c1d6f9c68b6b3e2f0cc3cb68b3,2025-02-13T18:16:21.507000 -CVE-2024-10860,0,1,47867645c49a8cde2f92505e8e41e41148c27753d4c7d1b26dda95cd56506975,2025-03-06T15:00:16.447000 +CVE-2024-10860,0,0,47867645c49a8cde2f92505e8e41e41148c27753d4c7d1b26dda95cd56506975,2025-03-06T15:00:16.447000 CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f88110b,2024-11-18T17:11:17.393000 CVE-2024-10862,0,0,8d0469751c4a45e9a11849af14ded70548f7b3b67c046bcdbd1a895c0f05bb5b,2025-01-17T14:53:51.413000 CVE-2024-10863,0,0,fa750afffd0b392605cdbed30d48a9a358d17d11b122f96d8a7cdff9526b9044,2024-11-22T16:15:21.257000 @@ -246231,7 +246231,7 @@ CVE-2024-1214,0,0,de1b224b633b4f15934a6c113718a0fee219da295a9b4587f21a72c198d9d8 CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 CVE-2024-12142,0,0,082b26a389086f6acfe4cbd0f3b415209a939b071b952054449ce1192c408bcb,2025-01-17T11:15:08.683000 CVE-2024-12144,0,0,cec64ed5df893b36c716ccaa9732f43fe24735c95c202fe96f3362a66870aae7,2025-03-06T14:15:35.297000 -CVE-2024-12146,1,1,512abd5fc04925787d0e14e872b64baa6991ccbf60d90df7c70ff4e2902133ac,2025-03-06T15:15:15.137000 +CVE-2024-12146,0,0,512abd5fc04925787d0e14e872b64baa6991ccbf60d90df7c70ff4e2902133ac,2025-03-06T15:15:15.137000 CVE-2024-12147,0,0,c562efe56e0c0cece525db9ad15e5bc08bd9593dfc976acd1410d7219e1d4e99,2025-01-14T14:15:28.163000 CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000 CVE-2024-12149,0,0,6cea541fb8390eb73924fcce3986b6c54a0134049e02ebc343dd9227319eb6b2,2024-12-05T19:15:07.627000 @@ -246770,6 +246770,7 @@ CVE-2024-12738,0,0,0cee8c1793928a32af812059d0c46039bd10d2c94f791e505cd74a43ef658 CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000 CVE-2024-12740,0,0,e6c4d03a8c2935c7f946e2ddf8fb2efb52eeb4b7b990af277f1511faff48b8c0,2025-01-27T18:15:36.743000 CVE-2024-12741,0,0,8d4c06d6204bde3983a442ab297408366d3d8d84bd77eb948d96a8745c52828f,2024-12-18T20:15:22.390000 +CVE-2024-12742,1,1,b1b5177f24d796a05ba85af261155fd9d40463bd10b9762f91a27ba214cab5e2,2025-03-06T17:15:17.740000 CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000 CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000 CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000 @@ -247428,7 +247429,7 @@ CVE-2024-13465,0,0,ec8251f01c9f88d7585f9bf4822b9e6fe7e3358f78bb52205382957231114 CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000 CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000 CVE-2024-13468,0,0,b48d1fa3d35721ccb47a1fb4394610e679bd03891ed40ec26ea0d83834fe394b,2025-02-19T08:15:16.027000 -CVE-2024-13469,0,0,59dce6c462c5a88a80921bfc05a3a5bb68a1971f53d52b089cd62613870d0a02,2025-02-28T09:15:09.823000 +CVE-2024-13469,0,1,f5f4e039fc9029d34c0aa8afde7e8626db9dde4b5a828e2df2285c49cc2b04d1,2025-03-06T16:36:54.387000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13471,0,0,c2b3475b8b9340ee7eafc3015ca60d311a7a71d13802743276d03f35c7f296e9,2025-03-05T12:15:35.110000 @@ -247585,7 +247586,7 @@ CVE-2024-13632,0,0,7b015e6f72d13589b7d97462ac3bfe30f6a11cf8c1a6af3a853d02e1efd6d CVE-2024-13633,0,0,2deb3debe35674bbdda8b971fff5055affb3f691f2d8ba5d3756a5bf2ffc5b2e,2025-02-26T15:15:22.940000 CVE-2024-13634,0,0,5d8a1f3015a94814647bc0bb3707cb44d4707b2ce8e11e273153be3bca7bdefc,2025-02-26T15:15:23.103000 CVE-2024-13636,0,0,060ea877f973da3e3139131075fc6b65a68ba520ee71166120bdf003d38b6862,2025-02-24T22:15:11.277000 -CVE-2024-13638,0,0,4fbd33032dbdde9da6016e5df748c24187ab44e7250c73361acba382280f65a3,2025-02-28T09:15:10.043000 +CVE-2024-13638,0,1,eb0f7891b8d7544d8603ae647ef33cb2a949acbc2f71d820d25576adb876013a,2025-03-06T16:36:54.387000 CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000 CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000 CVE-2024-13641,0,0,f5ae933978b19eaa8786ac84fc5f20a253f923886108cb6b544c748640981d51,2025-02-25T19:39:47.477000 @@ -247656,7 +247657,7 @@ CVE-2024-13712,0,0,5175bdafe3447afb47dbb7442f9744ca12f1d9f2556123222083243df1a3f CVE-2024-13713,0,0,90954b7583c56b27a881e3e89dac99a8fe4d669edd575847540b2c9eda75eaf1,2025-02-25T03:28:44.207000 CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000 CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000 -CVE-2024-13716,0,0,a730dc60dc22c20ef2e1e6a37f90d5aa74273af9534de5004e3970125a69b204,2025-02-28T09:15:10.223000 +CVE-2024-13716,0,1,081a135d344e341b95895d1b6ec4c3b57f2f922fe4703ef063ddd985ea5ad68d,2025-03-06T16:36:54.387000 CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000 CVE-2024-13718,0,0,2a66de61882126095d3053f4a883ea3530a7a8c40923166079a0a9d06dc8603b,2025-02-21T15:25:03.847000 CVE-2024-13719,0,0,0bd57a765654eeb9e811d1d099eab00bee38dce668b56e8d067bea2502bfa18f,2025-02-19T08:15:20.737000 @@ -247735,8 +247736,8 @@ CVE-2024-13827,0,0,40b9b2f1bee49602bcbc26b5d44dfb98f0e80093153eca031d92ad08d3803 CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,93ff0b2eb9f4abe59909f3b49d94bb9635c166ee2ef0054262af8a40f59e1121,2025-02-13T20:02:55.647000 CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000 -CVE-2024-13831,0,0,dc606325056ecb3af1d0abdf4906087df581d7aaf8a47f4b06428d6e01b13004,2025-02-28T09:15:10.400000 -CVE-2024-13832,0,0,ec5b2acd93db5978e9a901bf338782a10b26bfa5fce10324f0a5b3fac0b88ab1,2025-02-28T09:15:10.570000 +CVE-2024-13831,0,1,4c2b1db0ccfc994ec4b508e4cd77974628a0e7ffbd6d59f8a9682096022eb59a,2025-03-06T16:36:54.387000 +CVE-2024-13832,0,1,7b2f53a85419258936a296c93c771968c75a2af3851abffefcd1775c16b73917,2025-03-06T16:36:54.387000 CVE-2024-13833,0,0,25224aa5db16e2fcf2ffae150064444414666930ac899e8863e3333ed3af74b5,2025-03-01T12:15:33.230000 CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000 CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000 @@ -247750,14 +247751,14 @@ CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78cead CVE-2024-13849,0,0,ff236b733a56083f87d9fda1374c64bc737bce2f85ab541b6c51d8f632de7db5,2025-02-25T20:58:18.983000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000 -CVE-2024-13851,0,0,b398a5e42cb9d7be9c1f996abecf4cac62eb034d55b15397f51759f424614a8a,2025-02-28T09:15:10.733000 +CVE-2024-13851,0,1,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000 CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000 CVE-2024-13854,0,0,b568f01b297c5912b2612b134f4f5250b2d30544244315a9c47edd8900e54042,2025-02-19T08:15:21.440000 CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-13866,0,0,7b6522806f9fda20a87affc69ae1455066ad3672ed7237b6480428aa11037ef9,2025-03-05T09:15:09.587000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 -CVE-2024-13868,0,1,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000 +CVE-2024-13868,0,0,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000 CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 CVE-2024-13873,0,0,ef7d81633c3243b5a662796d38d39a610ff44d855cd436a1a77aa5716496d20c,2025-02-22T04:15:09.567000 @@ -247866,7 +247867,7 @@ CVE-2024-1475,0,0,2943f7a10ccc21b695d339dbb5cd2fa720adddf26c7b6ffd0baab0bd23bdb9 CVE-2024-1476,0,0,e178d9cfb726d4cf00b181cfb25ba5280836c613196cee5eacdfc79e432c1bee,2024-11-21T08:50:39.913000 CVE-2024-1477,0,0,74348eadb6214ad07d05d1e235932a474c51a995984a56d966fc8b6d5d3bb97c,2024-11-21T08:50:40.047000 CVE-2024-1478,0,0,9b2c9ccb149f278f720fe97b0937c0a2f45e9dd8ea2423171dbb0d6662d41386,2025-01-08T17:07:21.747000 -CVE-2024-1479,0,1,c7283f34b845ac740b46bb86e6e9152daa93daf0e50e0fc93e6ca6218c144124,2025-03-06T14:24:40.890000 +CVE-2024-1479,0,0,c7283f34b845ac740b46bb86e6e9152daa93daf0e50e0fc93e6ca6218c144124,2025-03-06T14:24:40.890000 CVE-2024-1480,0,0,03d3f4ccf7da39137b14bb7df631d0ca8dfa9b9937250b5474f8035d12beb0fd,2024-11-21T08:50:40.430000 CVE-2024-1481,0,0,7fd58e745dc38e4d7e47d117d56c6f445eed7fa5191f3735a2692d3de2dee70a,2024-11-21T08:50:40.563000 CVE-2024-1482,0,0,60272768c52b423065e24b6229c88409ec8bdcb6bc81af7dfbe638244c7c7d48,2025-01-23T19:53:54.957000 @@ -248215,7 +248216,7 @@ CVE-2024-1851,0,0,d990844085aa7fa399508e38913b4a91b00ad7673d1acf254c137c16d32111 CVE-2024-1852,0,0,b9d683f5957eff25406d3f28768343d0f941f69d129acd817b869c293ba088f0,2024-11-21T08:51:27.510000 CVE-2024-1853,0,0,6a68689fcd79fefcde169f14e1209eaf1cec9e306cb6544a77f67f77747e937e,2024-11-21T08:51:27.640000 CVE-2024-1854,0,0,2e36222f21a81e0f7467ee7199d8dd61bd94227662e032a1167e453ae3bd3eb4,2025-01-22T20:04:10.890000 -CVE-2024-1855,0,1,16975806cf573393036f77db9914a8bfb65532348dd0ad181a80bcf675440e00,2025-03-06T14:25:09.843000 +CVE-2024-1855,0,0,16975806cf573393036f77db9914a8bfb65532348dd0ad181a80bcf675440e00,2025-03-06T14:25:09.843000 CVE-2024-1856,0,0,e7e84d2ffc2542d366b810418f9a74b608acbb369f4f1196ae3112dfdd4ef3fc,2025-01-16T18:06:29.870000 CVE-2024-1857,0,0,c5708d7f5b9aa52c50a089d9d955a2ad47405cd7286310e3cff153bb8ed9df7a,2024-11-21T08:51:28.163000 CVE-2024-1858,0,0,37ac7b6ae641e6c33c9b784bc122314ccc3244d9e54ac1ed1c1eb9ce9272259b,2024-11-21T08:51:28.283000 @@ -249332,7 +249333,7 @@ CVE-2024-21116,0,0,37f57d56f4a480d238dbb22920cc5d24d95c2d6d67c36c3cddb7272c00327 CVE-2024-21117,0,0,5d43a21324183b9d6abac7bf386e13c102239eb07d87d78b640f0340e813f8d2,2024-11-21T19:15:07.527000 CVE-2024-21118,0,0,ee956c65c0f596bf879ae157a9080e555d70b2a93ec18374492190d05f6c6d59,2025-02-10T23:15:12.130000 CVE-2024-21119,0,0,8adc7d67731590ceb3d3f5e8f1f4a1bfe581882c771a4b0d6d46bb1dee9f759b,2024-12-06T20:26:42.563000 -CVE-2024-2112,0,1,19961ee37e07c6ff50d26af0d7e2149d93883e667bfbf269e3aa40af42147ae0,2025-03-06T15:00:11.560000 +CVE-2024-2112,0,0,19961ee37e07c6ff50d26af0d7e2149d93883e667bfbf269e3aa40af42147ae0,2025-03-06T15:00:11.560000 CVE-2024-21120,0,0,9a17f31ae00741afbe78fe1de8126b80393b2d436777540d9a68aa70b8ecf420,2024-11-21T08:53:49.407000 CVE-2024-21121,0,0,99f79218ae521d437536ca7e6a1fedd9a94c9b20081d485c127c95ae087afb7a,2024-12-05T15:16:24.950000 CVE-2024-21122,0,0,3c119f53f951a34b6f285ab076d3d99b946734b11d0251f0d44ac51ca3fced6e,2024-11-21T20:15:39.223000 @@ -250636,7 +250637,7 @@ CVE-2024-22568,0,0,3880556bf46833b64579e87b398833833f840f929944234dc82abb9760bd1 CVE-2024-22569,0,0,42fd9ca9ed87e62cc25c4850ea2254cb9fad0d6e7965206698b71242faea3c84,2024-11-21T08:56:27.863000 CVE-2024-2257,0,0,6326751678e552f2a5b329ffd28dd832a7b3b3968f1851a84cee129e01bef6d8,2024-11-21T09:09:21.760000 CVE-2024-22570,0,0,65580444980a65a34d69901ad8e01d49f9d506ba9bc8d07492ebc248698a38bb,2024-11-21T08:56:28.010000 -CVE-2024-2258,0,1,16bd9b0d3a00e70b4b0ffe59409b9e43749f7fde6377ea06d3cf811470febc94,2025-03-06T15:00:11.560000 +CVE-2024-2258,0,0,16bd9b0d3a00e70b4b0ffe59409b9e43749f7fde6377ea06d3cf811470febc94,2025-03-06T15:00:11.560000 CVE-2024-22588,0,0,8e2502298f7c6b135485bc5396597a78ea89ffb55c12fc0b95b7b4561f1ece72,2024-11-21T08:56:28.157000 CVE-2024-2259,0,0,a3104431d195b990188b0eaf6770bbdd7744abb2cc67108311ab43825c1510de,2024-08-13T12:58:25.437000 CVE-2024-22590,0,0,c61f02103dabd4fe4ee1e4744aa85defca93b5aa3ffb20a4fea1a1e022feb844,2024-11-21T08:56:28.390000 @@ -250720,7 +250721,7 @@ CVE-2024-2278,0,0,afc218644888ddfdbfc0ee64d2dbcff5719c87ddda676fd55b5f4ebef946ea CVE-2024-22780,0,0,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000 CVE-2024-2279,0,0,15594de242362166ba4fcc677c674c35e566adb6da76d65bb4bb570b8c49add8,2024-12-11T19:29:27.377000 CVE-2024-22795,0,0,4b871fe15d673131e56820fa86db7a52e60ec35118fbfcd9a32eee5736e087d9,2024-11-21T08:56:39.250000 -CVE-2024-2280,0,1,4e060a74cbfe021b52f00d80dfa39c9de5de805ab2c9872e00f673c28121d73c,2025-03-06T14:25:09.843000 +CVE-2024-2280,0,0,4e060a74cbfe021b52f00d80dfa39c9de5de805ab2c9872e00f673c28121d73c,2025-03-06T14:25:09.843000 CVE-2024-22807,0,0,c63e56e80af4c58ae1f7129e86f946e6c72bfda64cfef4929c6ab6ca5fc4096d,2024-11-21T08:56:39.420000 CVE-2024-22808,0,0,b7e1e2d1bde9d89678abdad137c019036d81abaecf559d82e47aac2d5b04907e,2024-11-21T08:56:39.650000 CVE-2024-22809,0,0,e9fe8aef5ac1ba3cd4b969001e1df2ac70f8505d2e7540807c33653fbefe6671,2024-11-21T08:56:39.870000 @@ -250757,7 +250758,7 @@ CVE-2024-22876,0,0,7b64300d77b839c22e56dafc52a8b282c24d807d3e1138deb97774c53ad9e CVE-2024-22877,0,0,869857cd8b9a44e1d528c28503ad46b7c531212f5054c9f21fd2618927c6b492,2024-11-21T08:56:44.530000 CVE-2024-2288,0,0,f6ed54bcc2b3e715f6f7f1bc8122a65aceb675402a6406a77355fa6ec0523110,2024-11-21T09:09:26.250000 CVE-2024-22889,0,0,bc789a72f7d1e24bd814b0b6d2146517cc600e2afe43b498499dda222266b149,2025-01-21T16:53:16.990000 -CVE-2024-2289,0,1,986a6fd61be75d14ea18f9e87b211c832246803f4eb69a4eb088900f9086560b,2025-03-06T14:24:40.890000 +CVE-2024-2289,0,0,986a6fd61be75d14ea18f9e87b211c832246803f4eb69a4eb088900f9086560b,2025-03-06T14:24:40.890000 CVE-2024-22891,0,0,02e131b40d02e30836912251adc1ff415ae3aca9fca1513bfc674a89af8ec37f,2024-11-21T08:56:44.910000 CVE-2024-22892,0,0,990d8f4909c370b6d0d69c8d34e2016866ab32283005a7474e4b7542c3034992,2024-10-01T19:10:13.467000 CVE-2024-22893,0,0,6c6f29a342a1ebb2552ec87422c6d3285e1d93cf37e605a3f0dcdbe25ce58cf6,2024-09-26T14:35:12.920000 @@ -250795,7 +250796,7 @@ CVE-2024-2295,0,0,b1c9b0d97e63019f8386fb1489354d559a699343cfdffce8bb3f3ebff26916 CVE-2024-22955,0,0,368533f40a34e5fae1d8925340aae6f4475eac5e111ca232f404b1633e3b2a3a,2024-11-21T08:56:50.440000 CVE-2024-22956,0,0,8ed39a8e2276e993cad0ea022beb398339ae52c5152920a4fd13b8cd15a5203e,2024-11-21T08:56:50.600000 CVE-2024-22957,0,0,0b4733c79e5e1be4ed27841aeb5f878228f183de770bb18355158b67c6f754fc,2024-11-21T08:56:50.740000 -CVE-2024-2296,0,1,357fc0bce2f54fba9d19eca9fcc8280b06af864193e5facf8300343284b70c1f,2025-03-06T15:00:11.560000 +CVE-2024-2296,0,0,357fc0bce2f54fba9d19eca9fcc8280b06af864193e5facf8300343284b70c1f,2025-03-06T15:00:11.560000 CVE-2024-2297,0,0,2c0ce9dc60f722995ab777c3ae885e64f9470bafeeb11ccc3bdfc66dab79a2f5,2025-02-27T06:15:21.477000 CVE-2024-2298,0,0,a85fa7730d2df572068f0e46cf7b1543a1326e3663c97e6671307d8012f9d6f8,2025-01-15T17:47:00.477000 CVE-2024-22983,0,0,9c2fcbd2cfc36625422e4d63e9b3ecc1d9162ca561feb4a7596e502793ecaf86,2024-11-21T08:56:50.910000 @@ -252702,7 +252703,7 @@ CVE-2024-25594,0,0,d2ca0a5d79da05e44ac2d5acee621099738a48fa55851c803b78b71251be4 CVE-2024-25595,0,0,b4e17d09d0f1dc51f7c33882dcae6e7ef76ef7c8af61e8dfb146895abb475440,2024-11-21T09:01:02.643000 CVE-2024-25596,0,0,b21aaa4b4e1be4dae56ecbc8d75145dfe79b75e6d073c74203ebc0c5ec452b65,2025-01-23T19:35:38.047000 CVE-2024-25597,0,0,66c8d673ba87d9e43a0c47da9503b96d1236c99bf50bc7cb4cba42d46af76999,2025-01-23T19:36:04.150000 -CVE-2024-25598,0,1,2d1c8383ccb797a0e5587f7db43c12ae86556d39ae61e9d0c96764cad5d89e85,2025-03-06T14:25:09.843000 +CVE-2024-25598,0,0,2d1c8383ccb797a0e5587f7db43c12ae86556d39ae61e9d0c96764cad5d89e85,2025-03-06T14:25:09.843000 CVE-2024-25599,0,0,1e405853502d37a32519454e3bbc96a90c793cbcb44778a175a4f144b956282a,2024-11-21T09:01:03.180000 CVE-2024-2560,0,0,43271ba3d968c1299b607dfd85a0caad1fabd1eefbce835e71c67cfc67678a7f,2025-01-22T17:51:20.490000 CVE-2024-25600,0,0,28903babf8e9ad9ce0e5926e98fade9a295a4e34c50bc53f7183dac7a35971aa,2024-11-21T09:01:03.307000 @@ -253050,7 +253051,7 @@ CVE-2024-26036,0,0,c89078d2640557d42002c59b6c23f030456f9cf19ccf42c7bd166a37f62ed CVE-2024-26037,0,0,ee3b187d755281195fea0d34713edfc54bd1e8caad64ffdf4172fb2e73159f5a,2024-11-21T09:01:48.790000 CVE-2024-26038,0,0,99f155613d21632a277dfd118476d120f86467a9f4a5cf62b544fefa8a620499,2024-12-03T14:38:32.390000 CVE-2024-26039,0,0,0758c554d26e899a855564f8b9668eba7e11a31c7d695417bcfe5e8499e97843,2024-11-21T09:01:49.037000 -CVE-2024-2604,0,1,b1c3e4b38324762aea2226ef3be0b0e822b3eb38c22d18e89386b563f0b703c1,2025-03-06T15:00:11.560000 +CVE-2024-2604,0,0,b1c3e4b38324762aea2226ef3be0b0e822b3eb38c22d18e89386b563f0b703c1,2025-03-06T15:00:11.560000 CVE-2024-26040,0,0,ee064050749987ff4e3490a03c514c88e4f33bf4ea6ceebd750b9b5d4a90fc6c,2024-12-03T14:37:58.917000 CVE-2024-26041,0,0,88991b2be8dfad92ffdc3159342033af65617a54b341f1ea4fba1cde1ba2b7e9,2024-12-03T14:35:05.120000 CVE-2024-26042,0,0,901d79a01b4e04fa43772a4abfbf6e0bb650c9e04e0f866ada0dc0dd8fdd36f0,2024-12-03T14:34:28.220000 @@ -255116,7 +255117,7 @@ CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13 CVE-2024-28595,0,0,66c34ce4bde45fe86231be9499209a487847155b52f1ce03ae9c3349832dd0c2,2024-11-21T09:06:41.353000 CVE-2024-2860,0,0,10251222dd61f264c5573f16801b3605bbe75235d60096fd89f14c7bdd2709e8,2025-02-06T17:54:45.057000 CVE-2024-2861,0,0,c2d3624bb2be1c2521a84faa67c026ea9a14975ce99e1b76831fa573f79b5912,2024-11-21T09:10:42.250000 -CVE-2024-28613,0,1,3f853c659da2a93596d569898217fa25c98a37539ae890b9ea26498d83acebdc,2025-03-06T15:00:11.560000 +CVE-2024-28613,0,0,3f853c659da2a93596d569898217fa25c98a37539ae890b9ea26498d83acebdc,2025-03-06T15:00:11.560000 CVE-2024-2862,0,0,14a1762a6c3e20bf3034d91b1b834706f11e22304545cc9e55cbfbe0c8b435d2,2024-11-21T09:10:42.370000 CVE-2024-28623,0,0,6b592373ccc058b15c8f7db49b78bfd3e2635e462da34d22a443dc2b487224fa,2024-11-21T09:06:41.870000 CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000 @@ -256505,7 +256506,7 @@ CVE-2024-3042,0,0,78f0a38bfd2800de1cd5fae87945aee2789e12c3fcbd56c3f22e61830541ad CVE-2024-30420,0,0,403a0bdc356df9601fc5ecf185347c2ed0664384c1bbee678bcce76af9aa6137,2024-11-21T09:11:53.143000 CVE-2024-30421,0,0,7afd28cf0a598ceb77ce8100ff766dd125654c211246f23a4b533003549add26,2024-11-21T09:11:53.343000 CVE-2024-30422,0,0,f01c0a64f32f26d00ebfc1ca76e0b1a2419fd37cf4fbbeb43bb30f715e41b580,2025-02-05T15:44:01.870000 -CVE-2024-30423,0,1,662ed19a2d47aa7b82fc512cebc649a9dd37b18985d70a8829443c4d3dcb7ca7,2025-03-06T14:25:09.843000 +CVE-2024-30423,0,0,662ed19a2d47aa7b82fc512cebc649a9dd37b18985d70a8829443c4d3dcb7ca7,2025-03-06T14:25:09.843000 CVE-2024-30424,0,0,48524e69984a1ed7696a166e148f60ba365f7f7962129b44ff4524ebe85c89bb,2024-11-25T15:07:22.740000 CVE-2024-30425,0,0,d68c222db45dd584e58dce13133847ff4ad6b955db2902ac4a600d2a9429d974,2025-01-31T19:59:44.457000 CVE-2024-30426,0,0,cca737ed45c2f700e4297a282f888b853848134669a65254ac719723adb2bbcf,2025-02-24T12:31:39.620000 @@ -256978,7 +256979,7 @@ CVE-2024-31112,0,0,aed218f78b70f929aad86903ded3145e19f68be2988aed875839fde993f99 CVE-2024-31113,0,0,ba8dd5f2ca619c3121faf694838496be14c42bed4611086e696847636856718c,2025-02-07T02:39:28.647000 CVE-2024-31114,0,0,2bf45ce22b11015c48079df508e179ff057dd898466026ce1d2757f792ffa86d,2024-11-21T09:12:53.057000 CVE-2024-31115,0,0,fd403ed32258bc28edd068a085a1ec4df5de371effb1dc7a7e6b74c9dbc51d65,2024-11-21T09:12:53.177000 -CVE-2024-31116,0,1,1dce1b73d37e0c0ede2eb0f1c3225917f444a19677d5fa11e7d5297f54dd02e3,2025-03-06T15:00:11.560000 +CVE-2024-31116,0,0,1dce1b73d37e0c0ede2eb0f1c3225917f444a19677d5fa11e7d5297f54dd02e3,2025-03-06T15:00:11.560000 CVE-2024-31117,0,0,20fcfdf5571a9b8e10db8556f08e3f52850f5209cc8498efcef92fa09f4d397e,2024-11-21T09:12:53.417000 CVE-2024-3112,0,0,873763eb9a3ffd38098d71a00f2d396f7e01bf16eaa06c0f4b3a9ffa918eff51,2024-11-21T09:28:55.560000 CVE-2024-31120,0,0,481bba7ab21f49f0b4d3fafa7a2609098f374707953692b2edcd4cacb88e64b9,2024-11-21T09:12:53.523000 @@ -257375,7 +257376,7 @@ CVE-2024-31507,0,0,7fbfd817660ab84cf5450aec1201bdeb4a240d71bce8efbbc3c0e4ce8dd7b CVE-2024-3151,0,0,3abd09f3cd2dde51fd5d70c85f62b41db0f3d9e525370488dec5a9bb4eabe907,2024-11-21T09:29:00.680000 CVE-2024-31510,0,0,81886f3ba02f8fa5d2b3f9541ab3b63f18369a591e7028ab4059f6604bc1ef58,2024-11-21T09:13:40.523000 CVE-2024-3152,0,0,232a7ab8a6c5151aba1982b503cbcc7bcb30e91652e2552e7d49e1b5852760ca,2024-11-21T09:29:00.820000 -CVE-2024-31525,0,1,759171032c1bc9cf47a855de87f39514aa78e818ddf68a675edb60a4d95a6e65,2025-03-06T15:15:15.607000 +CVE-2024-31525,0,0,759171032c1bc9cf47a855de87f39514aa78e818ddf68a675edb60a4d95a6e65,2025-03-06T15:15:15.607000 CVE-2024-3153,0,0,9a2bcb2f051678e95973008adc0d482a6778734c6609a6f1cd9e743db5bc63a2,2024-11-21T09:29:00.963000 CVE-2024-3154,0,0,d0e11e707bf549d7b831b8b7a6558cfd09c514bb54bbe90790f96ca21395d852,2024-11-21T09:29:01.100000 CVE-2024-31544,0,0,b0bccc451dcee5903b366441bb39b229e4ec0f92cdbfeddcea663568e3c62a9a,2024-11-21T09:13:40.747000 @@ -257808,15 +257809,15 @@ CVE-2024-3219,0,0,de3f9fd70dd3922206912d5b11848a3b5ec7b145621830b3178421a5ed707f CVE-2024-3220,0,0,732a955e3212f8f0fbbf2ff48ca938d8346e490659a1a4ed992439e5c452d39c,2025-02-14T19:15:13.770000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,82de9fd2512155ee1b039d671013d0c708a38fc533bf235bc5023a60a9960005,2024-11-21T09:14:35.290000 -CVE-2024-3221,0,1,d91fd0461f025fbd8c12f0fca3967b0d10ddfdcca8513eb164c6bde1411d5bbe,2025-03-06T15:00:11.560000 +CVE-2024-3221,0,0,d91fd0461f025fbd8c12f0fca3967b0d10ddfdcca8513eb164c6bde1411d5bbe,2025-03-06T15:00:11.560000 CVE-2024-32210,0,0,175315f9813fd6f2ac4a742dbd54281d7bee9ff41ab24185218217ee2af870be,2024-11-21T09:14:35.530000 CVE-2024-32211,0,0,7aeac149ce230244d2b917a1cbedf2ade22ef2010393663a9a7c7fa147fe421a,2024-11-21T09:14:35.807000 CVE-2024-32212,0,0,7cd205f7167ada2f68e262de4294c6c67108c8ee8cd5d0da8a582987800d41d7,2024-11-21T09:14:36.050000 CVE-2024-32213,0,0,19c43429bb818652ab99bbe37809d02ce3f96c90b91ce1bde49a718b22b44a4a,2024-11-21T09:14:36.277000 -CVE-2024-3222,0,1,ea21da0e0ce8e50c42b5835350addbb630d3c54552cde1b63c19e7b5c0edc047,2025-03-06T15:00:11.560000 +CVE-2024-3222,0,0,ea21da0e0ce8e50c42b5835350addbb630d3c54552cde1b63c19e7b5c0edc047,2025-03-06T15:00:11.560000 CVE-2024-32228,0,0,e57d95e8f71189130c733a36f368f79ef579cdde5db0685584478be60c584dcb,2024-11-21T09:14:36.510000 CVE-2024-32229,0,0,1d4f889ca9079678836d30c226b4e93776fba7e81888461dc8750343cc23771a,2024-11-21T09:14:36.740000 -CVE-2024-3223,0,1,3fa1d78faefd06b2440dc30550305550de903871794e6149d466efed5a6a15cd,2025-03-06T15:00:11.560000 +CVE-2024-3223,0,0,3fa1d78faefd06b2440dc30550305550de903871794e6149d466efed5a6a15cd,2025-03-06T15:00:11.560000 CVE-2024-32230,0,0,3a6294b82cd700b32f94546a71177093b3ea39c8512a95b325e1336833ebc65a,2024-11-21T09:14:36.963000 CVE-2024-32231,0,0,d1de02a20304f8a2541a989359910105e9a5fbaf303edcdd97dc7ff7c4722cb9,2024-11-22T21:15:17.970000 CVE-2024-32236,0,0,fc34b21c4f3444da90a31820b43bcfe52e5dd20b58b8287749526e7c509dae7e,2024-11-21T09:14:37.230000 @@ -258020,7 +258021,7 @@ CVE-2024-32530,0,0,714d8e4b8a2f870b91d467083dc345fa4045c6e5c97e5997870aa400b0c25 CVE-2024-32531,0,0,d6e694dee55e9595143f871a819a45e7418b0ea32f4aef2da1e5eba224dc980d,2024-11-21T09:15:06.883000 CVE-2024-32532,0,0,37ceaff06bae1bab6fd7ad5bf9bbd2c07c5ccf9cabe1bc2255d830c1f345df64,2024-11-21T09:15:07.017000 CVE-2024-32533,0,0,47b3148105196abd5e8ac806a2c046f18cda49e591b6cff94170bfc5212e9c36,2024-11-21T09:15:07.160000 -CVE-2024-32534,0,1,04ce69d9c927363f3e06e47a8e02014f70279a7af426dd61e3b4719f433824a3,2025-03-06T15:00:11.560000 +CVE-2024-32534,0,0,04ce69d9c927363f3e06e47a8e02014f70279a7af426dd61e3b4719f433824a3,2025-03-06T15:00:11.560000 CVE-2024-32535,0,0,990861e75217abb6cf8250bb6dfee907e8edaa819acec12b9879bff2a119a782,2024-11-21T09:15:07.590000 CVE-2024-32536,0,0,39b189ee7670bc04c84733d776f150c31d0b68d542e75be22f2f5dfaf2fa155e,2024-11-21T09:15:07.730000 CVE-2024-32538,0,0,3cdfb9be8cf53704e8b63bc91466b4b95043016997f60cdd45dc13e37e91c430,2024-11-21T09:15:07.870000 @@ -258044,7 +258045,7 @@ CVE-2024-32553,0,0,75731ebafc6623d1310a34a2800e9f80a87ac1b537ecad73da9626a152179 CVE-2024-32554,0,0,d93f4dc49dd5e1eecd69949134cc6162762a6c2eb4110f961a584b3b2139291d,2024-11-21T09:15:10.120000 CVE-2024-32555,0,0,f73833eed7fc01ee0c4ae149905923f02957299bcc93ef594f1b09529337209f,2025-01-21T14:15:07.027000 CVE-2024-32556,0,0,833c498991a81001e8dedc535c7af786b23214181fc8b84190b72772b7e45498,2024-11-21T09:15:10.260000 -CVE-2024-32557,0,1,824654e7418a25ba58925c70614c9aa6ddfd2e711183bebeca2c9f40f078a9d3,2025-03-06T14:25:09.843000 +CVE-2024-32557,0,0,824654e7418a25ba58925c70614c9aa6ddfd2e711183bebeca2c9f40f078a9d3,2025-03-06T14:25:09.843000 CVE-2024-32558,0,0,164493ea9547d065ff20d36c66bda23d26ede0bfb266fb54b0d2b6423e912600,2024-11-21T09:15:10.530000 CVE-2024-32559,0,0,4c6146a0c4965792d4fc2fd5b21f5b18a08c6c8bb1d9c41e92a200cbf920c21d,2024-11-21T09:15:10.700000 CVE-2024-3256,0,0,2b7ce95c09bc0afd565568f4330237441fefea7c4a0659acae56d7d646832bc4,2025-02-10T23:04:39.443000 @@ -258067,13 +258068,13 @@ CVE-2024-32574,0,0,a89670989500cfd40178f80a09a009fb32c147beb8969ca4c49a42decaf90 CVE-2024-32575,0,0,a8bdade79839921d06b06781cd842ffb8d80698bcc05ba62c83fd0e2bfe4e7c6,2025-02-05T15:44:54.393000 CVE-2024-32576,0,0,d926863b95cd6fd7e294900c6c8ad6a7513f5bd75dc7eee94b7cd1476bdf387a,2024-11-21T09:15:13.060000 CVE-2024-32577,0,0,d4cf9274f36efdf9a934f2419d22ac1d14bbabb2233baf7486d9b15702d3fa74,2024-11-21T09:15:13.190000 -CVE-2024-32578,0,1,050d3a1a6f5f9ed3a607d39d5b27181fb1338a157dc472aa47d8ccec36629704,2025-03-06T15:00:11.560000 +CVE-2024-32578,0,0,050d3a1a6f5f9ed3a607d39d5b27181fb1338a157dc472aa47d8ccec36629704,2025-03-06T15:00:11.560000 CVE-2024-32579,0,0,e3e01cbf94c7cd1b2a0a4ad60868ea9eaaec1ad18bc05779a15c1011cbad401d,2024-11-21T09:15:13.507000 CVE-2024-3258,0,0,c893d22ae6ed4d21d85ffb5998dfb0f71d0872539aeaddbe43a52da5c06cfe41,2025-02-10T23:04:14.047000 CVE-2024-32580,0,0,b4e3f6b6496cc625cf77f5b050381f56a7e1c34b1f08ed81b31fb6b20f9509e8,2024-11-21T09:15:13.640000 CVE-2024-32581,0,0,e80522a118298483830242753847ceef7c7bbc962e7cf9d3ddfa998313dfec76,2024-11-21T09:15:13.787000 CVE-2024-32582,0,0,a6084d9b53060aea950cfd3272b979a362bf912dc30a7a48c463ae5c089c04b7,2024-11-21T09:15:13.933000 -CVE-2024-32583,0,1,ed787f64e7a2596ca6770a8bd5045f47009608968aea5d4545866d3d81bfb022,2025-03-06T15:00:11.560000 +CVE-2024-32583,0,0,ed787f64e7a2596ca6770a8bd5045f47009608968aea5d4545866d3d81bfb022,2025-03-06T15:00:11.560000 CVE-2024-32584,0,0,c983708392498545dea5e27cf127ca84e5b54e448421f7cf6922b8454aa37db7,2025-02-05T15:04:03.760000 CVE-2024-32585,0,0,7a32c25ba62b7843c34a892783d46e5a60915dc8c33e023613a205524ac3e78b,2024-11-21T09:15:14.377000 CVE-2024-32586,0,0,320ce37cbc41d52b25d2dad2ca04a73065c0e9196d7ad2be5dea0edbb699bcdd,2024-11-21T09:15:14.513000 @@ -258083,7 +258084,7 @@ CVE-2024-3259,0,0,aa18334e7cab048a2517f3c3c3fa2d9483f78a6b473b61aecac0963f3938e8 CVE-2024-32590,0,0,eb1de886511f18f5af92693e9d7922546488d5a0e5e68f2c3d44b4f386d3185e,2024-11-21T09:15:14.917000 CVE-2024-32591,0,0,f2b620bf7b82384f49bc227192e656f2cba33b772655c5632e2877c1b74ed891,2024-11-21T09:15:15.053000 CVE-2024-32592,0,0,26a5d3630a626b1025b1bb0bd9b6ac445c2ca55c8dd636d7e0e326616d68db26,2024-11-21T09:15:15.187000 -CVE-2024-32593,0,1,45fb50615a8fdc0b2be9e0a6967961b6b85e8f23bc2903ac2e26c3f185ce22d5,2025-03-06T14:24:40.890000 +CVE-2024-32593,0,0,45fb50615a8fdc0b2be9e0a6967961b6b85e8f23bc2903ac2e26c3f185ce22d5,2025-03-06T14:24:40.890000 CVE-2024-32594,0,0,25c202082d83e69c0bde2a0065eaaa5dff2dc026a7d3d96bff487314a0d66e55,2024-11-21T09:15:15.517000 CVE-2024-32595,0,0,2cba5c2778a34acbd481bc4d92fadd07ad009128184c00b0aca19123ae63e96a,2024-11-21T09:15:15.657000 CVE-2024-32596,0,0,81609f727d526bec5ce5c3f408290751982efab4c6fe93a03772ee7275357cea,2024-11-21T09:15:15.830000 @@ -258130,7 +258131,7 @@ CVE-2024-32637,0,0,4b193937fa95691f6dbe0f21f86d9434adf6ade12f9359b09d63b59bf4008 CVE-2024-32638,0,0,b8ac4576abb7155461076b92e8605bcece6ffe42604eb0ad5dcb6a4bda594713,2025-02-13T18:18:02.733000 CVE-2024-32639,0,0,a9abcb78ad2e1a50e469749c677b545600654083fb498f3ca95e4bbd53ca4cd8,2024-11-21T09:15:22.857000 CVE-2024-3264,0,0,2aa7e39affd508257ed5d8cb89fc0bcaed4757ebdebb450a6aba1165ded3813f,2024-11-21T09:29:16.480000 -CVE-2024-32644,0,1,1017b80ca8ee004386ca52b65c52f115e9e53cf7f15be373fd2e1353cb73110d,2025-03-06T15:00:11.560000 +CVE-2024-32644,0,0,1017b80ca8ee004386ca52b65c52f115e9e53cf7f15be373fd2e1353cb73110d,2025-03-06T15:00:11.560000 CVE-2024-32645,0,0,0e7114e8f35e6eb3557a3e702f060f0eee7cb8be400e81f0e66d606a5010d93a,2025-01-02T22:52:27.117000 CVE-2024-32646,0,0,9f068873df996b66427a44035d136924da09d4161054ad330979705c19ebcd27,2025-01-02T22:52:15.927000 CVE-2024-32647,0,0,1186401905d8611219ac7b0ee648ecc84aa4e8c0981d6764995ca4768fd08e82,2025-01-02T22:46:37.853000 @@ -258805,7 +258806,7 @@ CVE-2024-33538,0,0,6031543c1e8f7332b27767ffba7d7f283b2edc0d54e78085e9719185cf928 CVE-2024-33539,0,0,72c3542aa8d8725beca7d8a6e44230a2c468bc762c740741c2c54a91a6f142de,2025-02-03T21:14:03.657000 CVE-2024-3354,0,0,a22aafde8baca50a3a3bb122a67ea285eea8d3013fad8b2d80eb9edfd7ed4447,2025-02-11T14:49:51.667000 CVE-2024-33540,0,0,757c59563d6d7999151106a5d086f394dda6b9ed32a0a12c94f07a25768805ac,2024-11-21T09:17:06.720000 -CVE-2024-33541,0,1,d1e08bfe1af10326ca1866da3861cd9ff740202dc7ab9e12b111c7eb770bfc75,2025-03-06T14:25:09.843000 +CVE-2024-33541,0,0,d1e08bfe1af10326ca1866da3861cd9ff740202dc7ab9e12b111c7eb770bfc75,2025-03-06T14:25:09.843000 CVE-2024-33542,0,0,391f717ab6df439bb5609b749e8072f81847c1c6655f801ed95dec443f3189e8,2025-02-05T22:15:29.690000 CVE-2024-33543,0,0,63797616ab7a39b146f722c6c44190261d0464349f39646ae3b90f2a9366096b,2024-11-21T09:17:07.083000 CVE-2024-33544,0,0,cd39eba8ecbbcada14f1c97935868f46e3ab4c53a2bf0020042c2391bef6eed0,2024-11-21T09:17:07.223000 @@ -258854,7 +258855,7 @@ CVE-2024-33582,0,0,50dd26640975958fc4d7408bd8e774d7953ff921629cdc4c3e467c688b427 CVE-2024-33583,0,0,36fa70679fe4f1c855ece492e630c34adeee209adb44bbec5f4eefb674e8ccdf,2024-11-21T09:17:12.020000 CVE-2024-33584,0,0,24e0d67d3b2016365e849deb059cd84cc573f7709abf5955da24c7d36eaef020,2024-11-21T09:17:12.153000 CVE-2024-33585,0,0,0101c7c78f8068e827533bfe68d8e54801afbe289fa7beaec7c70899882e1b30,2024-11-21T09:17:12.270000 -CVE-2024-33586,0,1,1567b0f8991c0af6102e7e09dcd1592ff7c9df5ea54152ce26923323d13af10d,2025-03-06T15:00:11.560000 +CVE-2024-33586,0,0,1567b0f8991c0af6102e7e09dcd1592ff7c9df5ea54152ce26923323d13af10d,2025-03-06T15:00:11.560000 CVE-2024-33587,0,0,3bd69058b0173f3dc9212fec569e34d362e4b7d65593aeda300ac0d18a6e9bcc,2024-11-21T09:17:12.490000 CVE-2024-33588,0,0,3a081a591381eef53d887b6d98db2d9d458e540c56daf424ac951937d3ee6325,2024-11-21T09:17:12.600000 CVE-2024-33589,0,0,6d5648a78e54d1e42e3d982acc9a16479dbeb81212300323d361c7993a3f96d2,2025-02-10T15:20:25.980000 @@ -259511,7 +259512,7 @@ CVE-2024-34429,0,0,f21839848bcd5931c3a04d267b6e34a68af6c72d880811a24e1f722eab739 CVE-2024-3443,0,0,f807f6b357ffc42a1f0bef94ddcf6780fde3610735714b00c99d031d435a84d0,2025-02-10T16:11:08.587000 CVE-2024-34430,0,0,cb8e123ee870d0ae89dcb364b82927e6d901e132d937011b7ad6ee7e86ab2b4d,2024-11-21T09:18:39.460000 CVE-2024-34431,0,0,66ab1d2dd8d93fb7cee43d9211bad6e473354e479eb13f9021fbfc509b3bf56d,2024-11-21T09:18:39.577000 -CVE-2024-34432,0,1,0da8b72924f5d0664d8341e47be0bd240687d257d29506f56b1c3527ae64a42a,2025-03-06T14:25:09.843000 +CVE-2024-34432,0,0,0da8b72924f5d0664d8341e47be0bd240687d257d29506f56b1c3527ae64a42a,2025-03-06T14:25:09.843000 CVE-2024-34433,0,0,d7e888513ff0c09afdacd9ea2e3a72da4e6d670d8ed55cb7f7dbd78948a08387,2024-11-21T09:18:39.817000 CVE-2024-34434,0,0,24065908aeeb0e3598cd5b17cbecb828decf9d2c1fb786080b8992ae95e57f54,2024-11-21T09:18:39.933000 CVE-2024-34435,0,0,71a1145b72cc4faa12fd4b02c097c9bcc91a4d5d67f8bf5c43e35bc8c1193b38,2024-11-26T15:29:59.840000 @@ -261751,7 +261752,7 @@ CVE-2024-3725,0,0,34d39c7b9693ec8c6efa678fe19062ca5b94e8a7e742349df96826c3edfdb2 CVE-2024-37250,0,0,162a7b18dc3b3934e704845f5211211f8c1a8ee9037e336cce22b77790194428,2024-11-01T20:24:53.730000 CVE-2024-37251,0,0,1a7d74d496329aa3c11ac748d3bbf68a0a379e2b311ff9f219b0aaff96fec426,2024-12-16T15:15:06.970000 CVE-2024-37252,0,0,352abc05f60f2e4fbc6355cda6bac20bf4066a5734bd84d216e40d333c970822,2024-11-21T09:23:28.390000 -CVE-2024-37253,0,1,e400ae595d23e49a12ed799b16c37e9bc0285b919201b7e5b35e9bdb2653c211,2025-03-06T14:24:40.890000 +CVE-2024-37253,0,0,e400ae595d23e49a12ed799b16c37e9bc0285b919201b7e5b35e9bdb2653c211,2025-03-06T14:24:40.890000 CVE-2024-37254,0,0,7d8e71419a3130a86567c36341c002c59c1fc9f1c27411c09dfcb40f68500996,2024-11-01T20:24:53.730000 CVE-2024-37255,0,0,5ff589b9a84d540c2ffa9c796e02489e09def4e6ec66e434f1846217aea9fe9b,2024-11-01T20:24:53.730000 CVE-2024-37256,0,0,c007ad97dd9ccf366101b8df62602e00f8963cfcca3fcb372fc1f3bac3ad769d,2024-11-21T09:23:28.830000 @@ -262029,7 +262030,7 @@ CVE-2024-37513,0,0,d0bdc814a11e9a23902da654b5838b30392488394721377007e11c4ae0194 CVE-2024-37514,0,0,fe2ffa44d7d18f72b116c084c5c19179a8d350b5a958692e6fdf1436e7c5cf82,2024-11-21T09:23:58.753000 CVE-2024-37515,0,0,582164ec1fd25d4ba342bab313332ca8898667a47350909b25f12fec1c53277c,2024-11-21T09:23:58.913000 CVE-2024-37516,0,0,8c4832eee7b3c11fff61b00c167dc198dfe7dae4dc8bdde45e8fcb3088425590,2024-11-01T20:24:53.730000 -CVE-2024-37517,0,1,b628aef6623afe6211019c0f0c05100ed16939a96586bb6a95774f6690bdac66,2025-03-06T14:25:09.843000 +CVE-2024-37517,0,0,b628aef6623afe6211019c0f0c05100ed16939a96586bb6a95774f6690bdac66,2025-03-06T14:25:09.843000 CVE-2024-37518,0,0,ce7c58efe47b9e076492f32e21e638775c6331aac5cd80237af403e7534e367b,2025-01-02T12:15:21.910000 CVE-2024-37519,0,0,0c54d2d985a28e4dc95e6d58ab1b69c81bb80ba8fec548888f5876dbc59874a5,2024-11-21T09:23:59.260000 CVE-2024-3752,0,0,e88ebf8ccceb210daae1e9d6482672b0fa2cb8af7aea3e8caf75e1d55ab2e9c9,2024-11-21T09:30:19.150000 @@ -262664,7 +262665,7 @@ CVE-2024-38308,0,0,1baa56b2e3fdd13244d0b9df4f23464d3904d173da05d6eee250ad40c0e7a CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000 CVE-2024-3831,0,0,5e708a1e6973c6b70cfbb375324ac255e6a5b9f7cfb486bea916fa269c4f84cf,2025-01-28T03:13:30.017000 CVE-2024-38310,0,0,6659b53a28a05a037a22232686eb9e98f1c5c7d893b655725e2374a7009bc039,2025-02-12T22:15:35.630000 -CVE-2024-38311,0,1,4124e712074ee4bd0a37c6fed9149de6efa7f82637bcff38ce418e880a2d1ab8,2025-03-06T16:15:45.760000 +CVE-2024-38311,0,0,4124e712074ee4bd0a37c6fed9149de6efa7f82637bcff38ce418e880a2d1ab8,2025-03-06T16:15:45.760000 CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f709156c,2024-11-21T09:25:21.193000 CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000 CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000 @@ -262761,7 +262762,7 @@ CVE-2024-38422,0,0,bfdba1d938ae37fbdc4aeaa4ca34e4d56d3f71678329a442fe959d2d4aa00 CVE-2024-38423,0,0,e3498351b7b8492cd7d51fadce9265d5c0051da243d515627a591fd74aa6daa7,2024-11-07T19:46:41.697000 CVE-2024-38424,0,0,b20bddb1e41e4ece23219feec728eb8910763624d1ea2621b5bde813700fd52a,2024-11-07T19:51:32.117000 CVE-2024-38425,0,0,e32a925c31eb52f678b53ceda419af6344b1d99e71a719366ec4341ee3e4c249,2024-10-16T17:34:41.633000 -CVE-2024-38426,0,1,079a7f2200cb9496f592e5fe590c864a04bf1a003e2ccb51cb41d591bf0f5995,2025-03-06T15:21:24.387000 +CVE-2024-38426,0,0,079a7f2200cb9496f592e5fe590c864a04bf1a003e2ccb51cb41d591bf0f5995,2025-03-06T15:21:24.387000 CVE-2024-38427,0,0,e03f18230b0965ff85c2447bdfa04160304b37189e7d46e85ccfd347184198b3,2024-11-21T09:25:48.097000 CVE-2024-38428,0,0,ca429ab8620e857c2740a8b8cc185755a533a3afb8ba56ac4468e697f6bb9392,2024-11-21T09:25:48.560000 CVE-2024-38429,0,0,b538fc48e96d9ea292e38fa094ab837d9c16ca39e46b7d2aa04f5879b36ef5a5,2024-11-21T09:25:48.997000 @@ -263015,7 +263016,7 @@ CVE-2024-38670,0,0,11289b1e126db881fff6325a04005fba01d66c0840611a3daa8a2f5fd39b5 CVE-2024-38671,0,0,5d50fd9e1c570917821065504ecb319e8b02e06f223be90658a4cbfafdc35853,2024-11-21T09:26:36.047000 CVE-2024-38672,0,0,32d2514af33a08839da3f6e05aa3d7b746bd3d95cb01082177cd9591d0ff0b37,2024-11-21T09:26:36.183000 CVE-2024-38673,0,0,ecf40623048b1ac82d6d9fd4d148b84fd573742c9b4bd91c953ab236c186d17b,2024-11-21T09:26:36.320000 -CVE-2024-38674,0,1,eda1c857c640c91760139028d67e0ec9bcacda7acaa12f0c800ba6e1f1c5bec1,2025-03-06T14:25:09.843000 +CVE-2024-38674,0,0,eda1c857c640c91760139028d67e0ec9bcacda7acaa12f0c800ba6e1f1c5bec1,2025-03-06T14:25:09.843000 CVE-2024-38675,0,0,fecec25a3945857f61410ccea7577cf558cc75d680ecd09822f4f4f76185e4a9,2024-11-21T09:26:36.593000 CVE-2024-38676,0,0,c46d64340d15411180cdbc104fb65b65494db2caaff121e58204f10be21178e0,2024-11-21T09:26:36.717000 CVE-2024-38677,0,0,9f8da79047970ac5249733e9049507872458c7c7ae1c2369a655da730169cd86,2024-11-21T09:26:36.843000 @@ -263029,7 +263030,7 @@ CVE-2024-38683,0,0,63c6d4e877991e2d6717aa912580ec7ca9f53556f1b0a57bd38c61d64dda8 CVE-2024-38684,0,0,4dc101606cca6227da51b10dcac1d771f7a4e63489c034f8ad02ebacae3dcfe6,2024-11-21T09:26:37.723000 CVE-2024-38685,0,0,5f3f894c35d1d4495ab4dd53f6e5e457a4e1e1ee341464bdf651440f3cfdbeaa,2024-11-21T09:26:37.853000 CVE-2024-38686,0,0,c96b17eac27a682ab4213c517ddf37e22e7d25601c67b123cce362e18a1ac4c9,2024-11-21T09:26:37.983000 -CVE-2024-38687,0,1,488e9bd51c0b31efd30893472a284e54811a587904ff2880a63d57213028cd5b,2025-03-06T14:24:40.890000 +CVE-2024-38687,0,0,488e9bd51c0b31efd30893472a284e54811a587904ff2880a63d57213028cd5b,2025-03-06T14:24:40.890000 CVE-2024-38688,0,0,c5b30a411c671b0fd64a758fbbc25ac95f365e054aa5766ce55f55714b200b96,2024-09-12T07:15:04.813000 CVE-2024-38689,0,0,d3cfe121c75d04c62d411dc78570e6cff30ffbfd7916d881eaeb0ffadd59cccb,2024-11-21T09:26:38.243000 CVE-2024-3869,0,0,b323001a48c948cf28ad984da5ff0468fd820c1c2cd9a50678a4aa352a0f9dfe,2025-02-05T14:42:53.307000 @@ -263087,7 +263088,7 @@ CVE-2024-38736,0,0,a4a0e7551ccf08c40e3a0251d8e9df9d25b16d2ae1e6ea167da7384c83d4a CVE-2024-38737,0,0,272c537e787516228559675125042a32e157f5f7f3dd6bb091a03f651a6b7a05,2024-11-01T20:24:53.730000 CVE-2024-38738,0,0,681a31ac0d890191a94ee0c52633a9f22e2d5d877607012d6f31181e5ba4b648,2024-11-21T09:26:43.407000 CVE-2024-38739,0,0,2f2f06533dc5e0bc7e221f761f7e9f44369c832e49ab26d0480b537cd8224bd1,2024-11-21T09:26:43.520000 -CVE-2024-3874,0,1,857a647a9dd20fedfa070dd9efcbf1724ddeadac2bce8b9e7811926eea055307,2025-03-06T15:00:11.560000 +CVE-2024-3874,0,0,857a647a9dd20fedfa070dd9efcbf1724ddeadac2bce8b9e7811926eea055307,2025-03-06T15:00:11.560000 CVE-2024-38740,0,0,417de0d64318c211f331aaf9cfa23fb87cd5f0eae2f519eb62c599e0b7742d76,2024-11-01T20:24:53.730000 CVE-2024-38741,0,0,4e32c22480717bccd389575637ad581a6957b4cbb2234a3b654d4e5e784fe9d0,2024-11-21T09:26:43.700000 CVE-2024-38742,0,0,cb6819ef3c013026d9db883fe60262ac535b622c3a4f6a88b1a87ce37673afeb,2024-08-13T12:58:25.437000 @@ -264094,7 +264095,7 @@ CVE-2024-4014,0,0,d8dd467295cab371719c2ac00bec372a23c25ce5af28e8afcb8f0ac49be4dc CVE-2024-4017,0,0,f783a50d5ec6473e72572840dca331e1122c5a318b2eddc5c5296323941583be,2024-11-21T09:42:02.240000 CVE-2024-4018,0,0,e93d494ed70b12bf00fdfbf61d8137e8f4288becf4316d18479d4e42d5b1bc41,2024-11-21T09:42:02.410000 CVE-2024-4019,0,0,3aea9791ae6e9b7233884532fbd0a9983fbad081e331a0aa1b6a93ec2e0d9097,2024-11-21T09:42:02.523000 -CVE-2024-4020,0,1,2cb4e57edc63794c4db7aa16de626df786cb786f8465a515b3e0fce24b221f5c,2025-03-06T15:00:11.560000 +CVE-2024-4020,0,0,2cb4e57edc63794c4db7aa16de626df786cb786f8465a515b3e0fce24b221f5c,2025-03-06T15:00:11.560000 CVE-2024-4021,0,0,141a8c3549b72a2e6fc7167017c78fe404ecf5a3430c27e6b0d3092ae59f1574,2024-11-21T09:42:02.813000 CVE-2024-4022,0,0,fc9a26e5d3e5ced31626c5738c88a31e66ac2841e407fae1707db2d65aabbd6c,2024-11-21T09:42:02.967000 CVE-2024-40239,0,0,ae12c56ee9941f755c16494c8dd5bdda020fbac80ab12acdfb5936223e53ed78,2024-11-13T20:04:37.887000 @@ -265681,7 +265682,7 @@ CVE-2024-42355,0,0,80a7bd5f5817bbf415d1aab8ee6950d0339815afbbd84c18d5377d0f843e0 CVE-2024-42356,0,0,22279046f7872ffdac778193c9fd6c031166d742a139782c37ef93d5c77078bc,2024-08-12T15:34:08.190000 CVE-2024-42357,0,0,c5e92ffd59b0e9191971aca64f69a954b24ff944138a6c931d44c0bc25c1d6fb,2024-08-12T15:26:19.520000 CVE-2024-42358,0,0,b5f732816ac1a8939f06ad612c3f8f4d2dda6ece5f4a7fd7b79f1c9550e79f96,2024-08-12T18:50:20.967000 -CVE-2024-4236,0,1,95dec8a41cdbd3dd4d0abf1c44301221637d57daabc3cdb76e21cf3cf7b087f6,2025-03-06T15:00:11.560000 +CVE-2024-4236,0,0,95dec8a41cdbd3dd4d0abf1c44301221637d57daabc3cdb76e21cf3cf7b087f6,2025-03-06T15:00:11.560000 CVE-2024-42360,0,0,390bcd4ba07d0113e5cc1876055cf731e5696a8e10d83f8808c96d256abcdda2,2024-08-16T20:00:10.467000 CVE-2024-42361,0,0,1daa164bd07876aff6fc67538fd666d8eb1a60b0103a2d90bf72f256b951cbf3,2024-08-28T13:49:50.457000 CVE-2024-42362,0,0,e5f7993ae1a555399b9faa1e5dd8167625d216c7bd9fd1aa394a527949190b72,2024-08-28T13:49:47.967000 @@ -266022,7 +266023,7 @@ CVE-2024-42834,0,0,4682a7643f4f1c0d32c2822f9fd1a1c021fa496bbb8846e29948873617922 CVE-2024-42835,0,0,22a6f739b93aacf1745ceb89b53a8f50b01769e067cdb25293fef7ccf249d315,2024-11-01T12:57:03.417000 CVE-2024-4284,0,0,78f6e6bd631db92106983a80d2af17b1ce9aee6f8799b7d845b4a68ba7f16cc6,2024-11-21T09:42:32.463000 CVE-2024-42843,0,0,ff9fe7d40ac7d40e1ac640d2b984df3686e2b8fb167f41b98a9e8430915f9584,2024-08-19T19:35:09.180000 -CVE-2024-42844,1,1,4c47eabbf97cb8a70ae35a02fdd2333479ff33f7d7424c6e0482edf907587daf,2025-03-06T15:15:15.800000 +CVE-2024-42844,0,1,88ed36143d303e407c74e41833d667588b182b1fffad850c1b0fda1be264cc78,2025-03-06T17:15:18.793000 CVE-2024-42845,0,0,9b5c61583f167788abce82e6afb0b505f7db99254d9ef509083483fc304c8d3d,2024-08-28T16:35:23.650000 CVE-2024-42849,0,0,c66070e6231ba1d77eff858a1ed19124639e16c363eab861a1ca84d9d7b0aa3e,2024-08-19T13:00:23.117000 CVE-2024-4285,0,0,d88ae73b3a1728178791a9277a690a4c488f4499a452379ab5fa50a282469f93,2025-02-11T02:15:35.033000 @@ -266127,17 +266128,17 @@ CVE-2024-43048,0,0,aa462510e6501f1c68792d4463cb05868dde51c2c7f830d9a1911363c50be CVE-2024-43049,0,0,396d2f1d473f42654eb07e32ffbaf51737e64004525269d29bf446d276b04cfd,2024-12-12T15:28:13.420000 CVE-2024-4305,0,0,b12513f5175c0f4629b88ab9716e6b0a0f60c8e17fe5755afa78f7b7a5ed53a1,2024-11-21T09:42:35.147000 CVE-2024-43050,0,0,42271ce6ad3806c1a44b603d2bbc55cdacd28a664360bd8e0ae1272488c011f9,2024-12-12T15:28:32.960000 -CVE-2024-43051,0,1,a32eb75159144fc0400f4a3fd843070d06a761b09ec2ffb1df7f4ea71fd6c6a8,2025-03-06T15:21:24.387000 +CVE-2024-43051,0,0,a32eb75159144fc0400f4a3fd843070d06a761b09ec2ffb1df7f4ea71fd6c6a8,2025-03-06T15:21:24.387000 CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b9d5,2024-12-12T15:28:54.787000 CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000 CVE-2024-43055,0,0,f1e527a3020db36b83a4085bce3603ba4821d3466fea47fcc96aa727049dc57a,2025-03-03T11:15:11.637000 -CVE-2024-43056,0,0,ae12730284e55a9b1140f979d0654e52ed26b737b0a37c72d25336a2aa80b594,2025-03-03T11:15:11.787000 -CVE-2024-43057,0,0,a7a7ab2977bd8a8ade10468e318beea5cb23d46b93172db4e776b3dcaa7ae7ca,2025-03-03T11:15:11.970000 -CVE-2024-43059,0,0,05462b939752bf1aa021e6b45bd536bb0f4523c1a8b60f2608dd310527275bcd,2025-03-03T11:15:12.140000 +CVE-2024-43056,0,1,105c5ae07dbf24a96965557708fab371c04681c71723e190b979a744755c3f53,2025-03-06T16:36:34.470000 +CVE-2024-43057,0,1,61adf70e579a5da8c905801d8f413a4e3c5876cc97bcf21d6faca34c1c10eda3,2025-03-06T16:36:34.470000 +CVE-2024-43059,0,1,6795c629bedf24aa03163f66f78d4bf9d586d690d508cb9463c00a7a1799cff4,2025-03-06T16:36:34.470000 CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000 -CVE-2024-43060,0,0,c317dd5ce0de4916fba6a4f2879d32732eca3f3772943ae21f727201875a6ccf,2025-03-03T11:15:12.300000 -CVE-2024-43061,0,0,4957c1c66b8cd7608c44bf9db2197fc4f71b530bed3769ed53d2a3b24a1afbeb,2025-03-03T11:15:12.460000 -CVE-2024-43062,0,0,4088144f2f5057b601e06f365c9bab540e1916724d5f5c35b15f2dccbba3f87f,2025-03-03T11:15:12.617000 +CVE-2024-43060,0,1,73eb1dcf52b735b517c35ff021b6d8818c553272204a3b88e55db7230853db97,2025-03-06T16:36:34.470000 +CVE-2024-43061,0,1,5fd1c22654161125f5b35831faedec49b77a0a2e4eba90e72c514d3e47740d08,2025-03-06T16:36:34.470000 +CVE-2024-43062,0,1,15ec1460cdf056cd63ebe0c0d8881ed0f31442f183fe6dcdb847b814037f0932,2025-03-06T16:36:34.470000 CVE-2024-43063,0,0,8753ed6cced2789acaf67947f81e20495a0bebb4d20a1a7648ba9c44702bfc30,2025-01-10T15:37:33.340000 CVE-2024-43064,0,0,3bca3804c5d22727d53d3aebc24210f9425875c9c0a366159e62b07b6f538d51,2025-01-13T21:50:35.483000 CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000 @@ -268108,7 +268109,7 @@ CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df CVE-2024-45571,0,0,c7f0d89973a00808e2faef19f5c20c56647cadbd6769b20ffdcbb83a50343c42,2025-02-05T16:01:46.163000 CVE-2024-45573,0,0,9a59c58b652198dcc2bdac9416fb5756a5d9c1df6029d3282d02eb5461aa2816,2025-02-05T16:01:49.620000 CVE-2024-4558,0,0,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000 -CVE-2024-45580,0,0,7c9108a52ac022b17ab652602e6c9e98585371bb4a69a39c14a6faa9d83f9cbe,2025-03-03T11:15:12.763000 +CVE-2024-45580,0,1,fa24b0c33eb036de609601c5dd309d71a2ceec7a996e62a5e8ab7732417211d2,2025-03-06T16:36:34.470000 CVE-2024-45582,0,0,00793631d633ec24d1a40beef713f9d423a97e799b35bd6ffc13cd157f29be0d,2025-02-05T16:01:56.140000 CVE-2024-45584,0,0,f0e0d36031c24782c73f581d2df414b44393105ea3cd6d5d26cfa9e14b2899fe,2025-02-05T16:01:23.100000 CVE-2024-45586,0,0,4deeb3aa2260cd51b7800a8653efd1821ed71cf9ac1cbe48f44f9b10b4dcaa22,2024-09-04T12:15:05.320000 @@ -269907,7 +269908,7 @@ CVE-2024-48037,0,0,c9e6e1de12a38761a91128dd7b7093f8be45ac4420071ee22249f7d6576f3 CVE-2024-48038,0,0,f9c82f0773e46b3d6b5d34944d486acf07324058a93dd6789c674bfec9c2db36,2024-10-18T12:52:33.507000 CVE-2024-48039,0,0,fd533117e654782f708ec481788be5b0376656cee4e99ab6cab664ba59707d7a,2024-11-13T01:20:55.087000 CVE-2024-4804,0,0,6afe17d2ae623338e85ed62e051581e10f28a6be240abfbe7ddd19f86bf90a1f,2025-02-11T18:29:40.827000 -CVE-2024-48040,0,0,8d79a9a8b6fc480e19c27f18d7f9ccdf4fc408920b360934ef7ed3bb94b01882,2024-10-15T12:57:46.880000 +CVE-2024-48040,0,1,dfb40e0ffd290a97d6508378a0e9073e64670d21880b5173463365700c990412,2025-03-06T18:13:11.800000 CVE-2024-48041,0,0,7fe5b2c4c4596c36444d450fb013b750556e7b5655ff838480e8c733fcf350b8,2024-10-15T12:57:46.880000 CVE-2024-48042,0,0,4cade6e65f529b89f46c5c3fadfb4d4fb014eea01f57d007e0716bc6213d18e7,2024-10-16T16:38:14.557000 CVE-2024-48043,0,0,97dfa512ab1417089c41cc3aef499a1734e595ce60b4fa2176474eeb4a80221a,2024-10-18T12:52:33.507000 @@ -270013,7 +270014,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000 -CVE-2024-48246,0,1,06e74a25fc7dc4e82f663349598aa6890dc105ce6250318dd386fe2bcf87e56a,2025-03-06T15:15:15.917000 +CVE-2024-48246,0,0,06e74a25fc7dc4e82f663349598aa6890dc105ce6250318dd386fe2bcf87e56a,2025-03-06T15:15:15.917000 CVE-2024-48248,0,0,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 @@ -270145,7 +270146,7 @@ CVE-2024-48594,0,0,d5a52e0d152b31106cf7b89cec0f7550cdb6375f901b4c018ce4b1c02e80a CVE-2024-48597,0,0,dbc3f2eb04f06991684cd7c9c46a9fb0207e1947f5c88a8f399960e50271d80d,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,731d4e23354be097812d72b15d7e6992968e209a4c37edc22419fab0e7ae3b67,2024-11-21T09:43:44.947000 CVE-2024-48605,0,0,5cf16ecb0c12b2d510ecd90565f906c729f66381b22aa58921368411648c90af,2024-10-30T21:19:40.027000 -CVE-2024-4862,0,1,0fb4333c4d8321efd7112105807f24da20cf6282fe6e66dfccaeb99658e04e7c,2025-03-06T14:24:40.890000 +CVE-2024-4862,0,0,0fb4333c4d8321efd7112105807f24da20cf6282fe6e66dfccaeb99658e04e7c,2025-03-06T14:24:40.890000 CVE-2024-48622,0,0,7b5734fdf710218dd18d04eccbe27f1ea32dc572aaf26b2fbfe91cd5543b9021,2024-10-16T16:38:43.170000 CVE-2024-48623,0,0,5cea775385f6ce5ebba2cd449299789230da6b7f1dc9f4a14dddcec3dde7198b,2024-10-16T16:38:43.170000 CVE-2024-48624,0,0,b59b0332a99ebf3cde2350cd4a8321152317b6a93e251b6b8063e9f34ddc5f48,2024-10-16T16:38:43.170000 @@ -270621,7 +270622,7 @@ CVE-2024-49289,0,0,6cb496d659f9f90f3ce5ef368cf9bd61a0afc8abc1a111b8e9264d674e8b4 CVE-2024-4929,0,0,446a90d02b622eb1fd99d257d3325e858c1bfe45905163fda72091124f0a7f2c,2024-12-09T22:46:06.657000 CVE-2024-49290,0,0,96e76b27a181dc096cfd832ba5b2be4d826e178057417e0d837c9408f6a4ca74,2024-10-22T18:35:55.413000 CVE-2024-49291,0,0,249dc671b72ac546a6c5c29c6da882835446fe95844bab5700ec27796ce85169,2024-10-18T12:52:33.507000 -CVE-2024-49292,0,1,af629185d374e4be2800c1bf63b5f2d37841421023ada721633e525a27930b32,2025-03-06T14:25:09.843000 +CVE-2024-49292,0,0,af629185d374e4be2800c1bf63b5f2d37841421023ada721633e525a27930b32,2025-03-06T14:25:09.843000 CVE-2024-49293,0,0,2d53402d532cd283b635562c0a1d47cc207eea6245a05010c9022145b2413c0d,2024-10-29T15:07:39.407000 CVE-2024-49294,0,0,93d4db74b4f77bcd1a4525c7c80b4b37436a519667df0c47a3e499278b0371de,2025-01-07T11:15:07.400000 CVE-2024-49295,0,0,93cf95834b6245279ffc7131566626d99288891705acd63ad80fc783ba87c120,2024-10-18T12:52:33.507000 @@ -271030,7 +271031,7 @@ CVE-2024-4983,0,0,b82ab4bc704d323c7d9f24e0a3641c93b0503dba6a5392acd5923000e9eef0 CVE-2024-49832,0,0,391e39e7c5b3e995146e5c9a1ef83712ccc04ea31043b019d156c859ce3b56e4,2025-02-05T16:01:09.627000 CVE-2024-49833,0,0,329298065bd1bb3d724e94c1deac431743ff5a22858b998a02d9a56030763581,2025-02-05T16:01:01.780000 CVE-2024-49834,0,0,b4f95628a52aac961e7bbe4a6f241fc7f4346fc4867395a783a39604f3de43eb,2025-02-05T16:02:02.183000 -CVE-2024-49836,0,0,28c7d7cad4098d184fe691cd490c44d22c87cc0ae39c3e4ace3ca16ecc068eef,2025-03-03T11:15:12.923000 +CVE-2024-49836,0,1,e2ad87c073f91597b574a8828b67b09bd65056e714f1bc8ac144e9e32c8723b5,2025-03-06T16:36:34.470000 CVE-2024-49837,0,0,44c0adc79a1133ef0cbafd5e3b95fe7c89090e533d5628dee2688fd57953cb25,2025-02-05T16:02:51.587000 CVE-2024-49838,0,0,10eea15eb9bc1e1b66fb4d58e05a766814d469a560b08490c060ef06fde08f69,2025-02-05T16:02:40.720000 CVE-2024-49839,0,0,e4adae2e6a6fd99d4a1ef07f5bb8c358f7fb67c7e6ba84888990afb4dab67568,2025-02-05T16:02:33.117000 @@ -271340,7 +271341,7 @@ CVE-2024-50127,0,0,14e691dcff3be7b44a2e862c8be6dd3b7fb8e12b2bfeba5e6287ff367c903 CVE-2024-50128,0,0,5a6e47cd9b5d69a2eea013f8788e8d5c29dc7ba908f82d447bdc15b8e487da34,2024-11-08T19:39:38.027000 CVE-2024-50129,0,0,4afc9b05928cde60da6fd42289df21085616ed6772331b233c0f07a2117e1699,2024-11-07T21:49:14.723000 CVE-2024-5013,0,0,e1e7f2f15abd8b5ddce78bb3bfd5b29ef2a6e608e2ff5c6e5a25699ed1c42a03,2024-11-21T09:46:46.933000 -CVE-2024-50130,0,0,dd40331b3be39e4c66c021e22fcadb15bd359a711660a9ff11b713a39b68acc5,2024-11-07T21:49:00.380000 +CVE-2024-50130,0,1,867ecc421755f7acb8f90988d6ccc46c36f7f28a62c306f6761fb741eb230c58,2025-03-06T17:15:18.953000 CVE-2024-50131,0,0,4b8634159d9971aa4f0325d50bab72d0427a17886a1825f5db2c04b9486f25d1,2024-11-08T16:15:47.497000 CVE-2024-50132,0,0,4b1fa138e51daf4ff55e3f4defb4236c0e429e261e7e7b7431dbd58c7ea1da8d,2024-11-07T21:32:37.433000 CVE-2024-50133,0,0,13c1cd7465b48aa25814a39632f462a103df89235e5513a5a7e914dc44df913d,2024-11-07T21:17:35.673000 @@ -271362,7 +271363,7 @@ CVE-2024-50147,0,0,b3b71bdc694c103dbc53ae8dd319728eabf98a5d7ef19dbedccdab8d20522 CVE-2024-50148,0,0,29eee073fa03f15b890aa5c0bce0077794c99acb699f53407212567151a1a25f,2024-11-18T21:24:05.020000 CVE-2024-50149,0,0,c787490f93b85be8fc6ccda6ac0403d02734503c1dbcd49a6038dc27a90e3da9,2024-12-11T15:15:13.170000 CVE-2024-5015,0,0,9218c0d4680ce7feac4e690eef9de38e90fbacbd010584a684598c56ec66e8b1,2024-11-21T09:46:47.193000 -CVE-2024-50150,0,0,6fc0633d9b5e0ad5c9c0b065153f7c86cc55af52abb1a12e91f4325ef83db286,2024-11-22T17:29:00.880000 +CVE-2024-50150,0,1,c614755499802c490e0967d91adbf3882b59c12152f29569662f92ce37a75d09,2025-03-06T17:15:19.133000 CVE-2024-50151,0,0,62ad275354c7f8426638d9d3cf6ac2c18d4f6587fc81c2e836120fca0d5f264a,2024-11-22T17:30:55.633000 CVE-2024-50152,0,0,ce260ef40b16562745980e81801229188ab0549d552df6e6dfd81c947dab4664,2024-11-19T02:16:17.787000 CVE-2024-50153,0,0,4390df0987d50d0c03cb92674634c76add54a8ab8f3c4746ec3bb9e53e9c8704,2024-11-13T15:23:49.717000 @@ -271506,10 +271507,10 @@ CVE-2024-5028,0,0,dd1dfc08c8c4ad0249eff6068a8953d40d7e70c3ce4697c65d3cb70a1f48c4 CVE-2024-50280,0,0,b6a13b4a1bf730cfee2fa214d3a5f3f7f9268a884bdb652dd0a2e1369ec157e6,2024-12-11T15:15:14.733000 CVE-2024-50281,0,0,9089d0de95391a0377f6af8be3fbc8b5c88017f220930e10bade7b480247946e,2024-11-21T19:27:19.097000 CVE-2024-50282,0,0,a18aaa4d9c56a7b792aa668609a3693693842b73f1319cca3f63e3a5b5584f28,2025-02-18T16:15:17.927000 -CVE-2024-50283,0,0,f017f793453930cb04082ccfcfbd81c76f41fa2bfe137a71097ab2aa218aa805,2024-12-14T21:15:34.663000 +CVE-2024-50283,0,1,f4898d4d5ef8e3025a7388e60aebfcef54608ef3b201be10bb8572c893d7d72a,2025-03-06T17:15:19.347000 CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000 CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000 -CVE-2024-50286,0,0,2b8ca5dff09b2fe669487098ff00ac0b3e302e5f74f9565b4570086803d72e17,2024-11-21T21:12:17.143000 +CVE-2024-50286,0,1,5618c077e6152816a4221f2d5f5b9427749abb7e34e3ade2f03b1805e0717cc1,2025-03-06T17:15:19.563000 CVE-2024-50287,0,0,038cac0a3eba1e418017a1bff5b13ba3a2ab69d5204a1dae8a6971bef21ae4b7,2024-11-21T21:11:54.510000 CVE-2024-50288,0,0,6e2039ce756a6b1a292181b98f184f82f5cbcaecd4e1ac460ee0f3a4ece05c7c,2024-11-27T15:32:45.147000 CVE-2024-50289,0,0,cbe890f5c9d4c6f76920eb8ce53083b1779519960db0d61cf86dba6e738923f2,2024-11-19T21:57:32.967000 @@ -272087,7 +272088,7 @@ CVE-2024-51139,0,0,3b86e869f5ecb53ca24ff4fbeb657240c1119cc435967f16a049b12c38655 CVE-2024-5114,0,0,a53116e5e8fe86fcce70c98ac21ade21bff509be03067f69ee971c3f0fde0f62,2025-02-21T21:10:08.983000 CVE-2024-51141,0,0,5382dd00ba9b2f385fa6fd2013258c1bdfe06c898acc0f9612f7d27a92e2f8b2,2024-11-18T17:11:56.587000 CVE-2024-51142,0,0,0966095e36208a7f8cbe7da74b14de21dba15e2b1fd23a5e1fde16bca38e370e,2024-11-18T17:11:56.587000 -CVE-2024-51144,0,1,bbc8b5010821098c4b5b6514582c7652728a7ebda8207c1cb336b76ff774cdc5,2025-03-06T15:15:16.080000 +CVE-2024-51144,0,0,bbc8b5010821098c4b5b6514582c7652728a7ebda8207c1cb336b76ff774cdc5,2025-03-06T15:15:16.080000 CVE-2024-5115,0,0,63ee4189b26772fc1ce56914807ff994899a5055d7b3d38de495f2ee77931e2d,2025-02-21T20:51:40.910000 CVE-2024-51151,0,0,6043d48b8e54694a9f5dd0791c6e07ebb911ecfc7547aac1163aaf1a70efd3d4,2024-11-22T17:15:09.190000 CVE-2024-51152,0,0,967cbcfc73dbc16287d55b13cbb722195fe5f82a6511062fdf0ca56b7f9037d5,2024-11-13T20:03:06.083000 @@ -272221,6 +272222,7 @@ CVE-2024-5147,0,0,8fbafca2fdd8f848d9909cb6aba93924ff1b404381295f27635bce00c52eaa CVE-2024-51470,0,0,e89d5ef183a7d29ac11af41a2499db74df261ac8afb07d8bd5315410d8114abd,2024-12-18T20:15:23.233000 CVE-2024-51471,0,0,124b7b8875d261820d9fc9a3eefcc2e273bec0e6de9ec2bd5f9981a02008418a,2024-12-19T18:15:23.153000 CVE-2024-51472,0,0,f3c11cd77c7846a44169144fd921c2c0e0db8174944eee5fd716f8b0395e6de7,2025-01-06T17:15:38.517000 +CVE-2024-51476,1,1,38ce9c6359aee1035e09906170ed0e5c54174e877be664b5033f8187be6372ff,2025-03-06T17:15:19.763000 CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000 CVE-2024-51479,0,0,cb129c5fa9252110468d8449b172cda17bf48af7dcff3fe804fa3e07241cca0d,2024-12-17T19:15:06.697000 CVE-2024-5148,0,0,f40c04de71d66c8857441b50b10a14db507d29d1691198e2bceac6bdc772cfd5,2024-09-03T12:59:02.453000 @@ -273332,6 +273334,8 @@ CVE-2024-5292,0,0,1452aec2e6f1e5f02e53c45b3ee750a7e5d33f92b8e7382e2bc21f3b08b3e5 CVE-2024-52920,0,0,d51c19b029322a73c74b6821f9cbcbea373837a9a5ff27d72ff8adc9e86cc1bc,2024-11-18T17:11:17.393000 CVE-2024-52921,0,0,25b2bda62d23ac11ec224824331b7110da2b691d46f1f7381cfaabb403afcc15,2024-11-18T17:11:17.393000 CVE-2024-52922,0,0,6a8e09d1bf0adb255aa582ae6b8ef0e4e406447b917ba92ca194beb3eadfb929,2024-11-18T17:35:09.720000 +CVE-2024-52923,1,1,19635c127148f2f5585537a1b159c866b6c63f244ac62def1347dce2496757b3,2025-03-06T18:15:41.160000 +CVE-2024-52924,1,1,2ee33df823a805b8cfcc43621d2727535e520e4b1b88d5691a0601715e6c1c58,2025-03-06T18:15:41.320000 CVE-2024-52925,0,0,94495667e9e08fa1d0d119d4faf0b9b5f1ca27514fe32d58631c29811775f341,2025-02-26T15:15:23.867000 CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000 CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000 @@ -273396,13 +273400,13 @@ CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce69664128 CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000 CVE-2024-53011,0,0,6541fabf7a5e7d0669e1f4c44e5c4716c7ec9d8cf2120ac219f149b9e79ccc2a,2025-03-03T13:15:10.853000 CVE-2024-53012,0,0,f829f2be2897b05770fba117015cdc095129f5aca857f32e3d3e206b67416909,2025-03-03T11:15:13.280000 -CVE-2024-53014,0,0,1b100e7b4bb4a47bbbd893ecd270a4054f52891759d07cd8648a6711e2de741f,2025-03-03T11:15:13.450000 +CVE-2024-53014,0,1,9c1edb228a5b8cc996160851a8b343e3ab0752f1faf2a9a0b97b21596a7476c1,2025-03-06T17:52:55.370000 CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000 -CVE-2024-53022,0,0,f177c41324eff2bf482aabc50e6cf5d35ee757fb36103415c50085efff600024,2025-03-03T11:15:13.630000 +CVE-2024-53022,0,1,bf37234b3029621977db8a6eb910eaacbdefe222a51ee4b1dd0e6bc99734b38b,2025-03-06T17:52:55.370000 CVE-2024-53023,0,0,612b784a0b4449dafe1a79ca5c35a38d27ba32c15da36d51b12329ef573d438f,2025-03-03T11:15:13.777000 -CVE-2024-53024,0,0,d72f9e9501c8eb18133dacda279514c4b5f0a02c7d6a31cb29a2032a20014a83,2025-03-03T11:15:13.943000 -CVE-2024-53025,0,0,9e2989e8573602fe84f2753811873e25e43e802c66d4a994bccf008d19a04b11,2025-03-03T11:15:14.120000 -CVE-2024-53027,0,0,c8e44b28ea654bc7c92442d8f98564f498be31e1c6ff7586fe41363c0f0891b1,2025-03-03T11:15:14.290000 +CVE-2024-53024,0,1,dee384a56a392bb5c68af003e0565435d517937d0c855508efc39ab47a26479c,2025-03-06T17:52:41.783000 +CVE-2024-53025,0,1,16c1f10a9e32146258f0298653aa7c8d9aa99a8093c702b0136a087cb12cc311,2025-03-06T17:52:41.783000 +CVE-2024-53027,0,1,7e26db2b11e78988a639ecdb6205eabd88644f64d5e4e6ee02565356b8b93b25,2025-03-06T17:52:41.783000 CVE-2024-53028,0,0,1adb2bc3a9fffb0f3270ec1a52d1282da84ff633e0579fcb5f081c5602eab4bf,2025-03-03T11:15:14.460000 CVE-2024-53029,0,0,6b15739cda1fd16dc50d37e7b0bac1f5ddb8ebcde19352cac213a642e632c56b,2025-03-03T11:15:14.617000 CVE-2024-5303,0,0,3ed489db17064b2aff86e9a31b51d53d757813a529fdb6ed7379a772174cd7ec,2024-11-21T09:47:23.590000 @@ -273441,7 +273445,7 @@ CVE-2024-53064,0,0,49b7807eb411df809f5f195d068c447b8770736f74653af5c13ce45d1d5ba CVE-2024-53065,0,0,c5c6de1dc34956135702b6505991c2e7ff92bc704a59b87713633a300daa61a4,2024-11-25T21:04:38.343000 CVE-2024-53066,0,0,0c86d7ce5fb53df5464e6f073cc19a2aa67ae25292a1f6583a1478ef90016ea3,2024-11-25T21:03:09.620000 CVE-2024-53067,0,0,d8942bf1aa909e21d0b48cd870079e0183034b36b3a36833f5334c885e8856cb,2024-11-25T21:00:06.237000 -CVE-2024-53068,0,0,4ab6280b59054b784b4a026e38a5c053cadb44a0b32e126d892e030fe63241fc,2024-11-25T13:43:00.467000 +CVE-2024-53068,0,1,d5cdc1fd5d7fb0c7952a4dc84ce274e8dc2accbd15fa1ffb9e28901e55263200,2025-03-06T17:15:19.957000 CVE-2024-53069,0,0,2f8d2bb328ae06bfbd9a5aaf3e45bed4d90c0f43106ef8f4e009f680b4cec49c,2024-11-22T22:26:20.310000 CVE-2024-5307,0,0,5865308c4abde936d7b931374475ba3a6f8b899b5f443fa0d8a4411dbf222652,2024-11-21T09:47:24.087000 CVE-2024-53070,0,0,6d00bd640e3dc3b5147d89af6cc648368bd0287a01dd8943781ce8ead40fb1de,2024-11-25T20:53:55.200000 @@ -273566,7 +273570,7 @@ CVE-2024-53179,0,0,10b7cbbae319b5ce0332616aac783eb28b0511713459dbbe639dd971af2be CVE-2024-5318,0,0,87e97b53a33051fc1fa3c078212ad6afb68bf37151bd321e62e233d7b2989703,2024-12-13T17:04:31.133000 CVE-2024-53180,0,0,dbcd148eb4ee7c09b8edc88493ea339c7cb556753e766db6e76ec0f2696918d2,2025-01-16T16:44:59.437000 CVE-2024-53181,0,0,75b064e17895b9f277789ad64fcd6ed5a3980c88dfbac5e82d8241bbd1116758,2024-12-27T14:15:25.530000 -CVE-2024-53182,0,0,276da6acd8b3e7662cb4c37221891d60d43b389e6f704002e7f31e4daedb306f,2024-12-27T14:15:25.643000 +CVE-2024-53182,0,1,0d5ee53895fb547dfa0d8f8cfcc2b23e2c938a4528ed98426f8f9dd397c17bf8,2025-03-06T17:15:20.157000 CVE-2024-53183,0,0,654d7facdcdf21d8448703d0aca76dbb4f82fcf4dcd5a0bcb5fcec43860cb2c1,2024-12-27T14:15:25.743000 CVE-2024-53184,0,0,2a27b94391b5bbab80d359ad179ae46b2fc322eea3533f3c18f42b154d4e7c8c,2024-12-27T14:15:25.853000 CVE-2024-53185,0,0,7946a8c98e0b3bfe8696da8f83553787644c42dde2be9ce431db8174b7e07a89,2025-02-10T18:15:28.080000 @@ -273592,7 +273596,7 @@ CVE-2024-53204,0,0,253a86a67cc86d83f5b45b7081fcaef8f54aea697a0bb5732c9f1f31c626c CVE-2024-53205,0,0,aad40af383a0fae2dfd165489485b38af4279f086ab2ffc2acc584ef6f7715e5,2025-01-14T15:51:28.677000 CVE-2024-53206,0,0,2f6a2fc7adb42267dc8ee97a338aa8c24c6fa9462fbe1480b8392e4aae94186c,2025-02-11T16:15:41.840000 CVE-2024-53207,0,0,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000 -CVE-2024-53208,0,0,bc7e68ca2f003cd79ddc6d7ce610dc12e11f263a6b66fec26ebcb92d92485dc8,2025-01-16T16:46:38.657000 +CVE-2024-53208,0,1,86c96edbd92ca06a52f16f5b9645a95fa806a309a3f4ff9028c19f867167bdda,2025-03-06T17:15:20.330000 CVE-2024-53209,0,0,fbdb0aa91991e41bb2553cc9ad5cfedb1ff21c2c3efb53602bcaf5363e2b2b68,2025-03-06T12:42:52.363000 CVE-2024-5321,0,0,0f218b8b6fcc3fc0b4ccef7040ede5ee801dc8e00258e6450bd3f123b6e73ca4,2024-11-21T09:47:25.283000 CVE-2024-53210,0,0,edb6f6743b39b3d9aaae84e10ec98f8816051f339f526267a629d8a9b382a055,2025-01-14T15:50:32.413000 @@ -274307,7 +274311,7 @@ CVE-2024-54266,0,0,d444be4e1ee22dd451822fabc010f4ef86c2b038c294a565a8a8c51aef896 CVE-2024-54267,0,0,76f7008cb7e3a38e8545f73bbc644c092c440137c92b5ce9caceadf7f166993c,2024-12-13T15:15:30.923000 CVE-2024-54268,0,0,2ce0a46606ea8570aabcf0f5ef556af89297e04399b9637bbdfc8644e181a39a,2024-12-13T15:15:31.080000 CVE-2024-54269,0,0,80ac095d31433aafabf7debefee962a6f6c2eac87daa457c3fe90f17fcc9678f,2024-12-11T10:15:07.790000 -CVE-2024-5427,0,1,44911ea7ed1c88304a9767aca8126a7830013da7597a25ddf702b109f92ab924,2025-03-06T14:25:09.843000 +CVE-2024-5427,0,0,44911ea7ed1c88304a9767aca8126a7830013da7597a25ddf702b109f92ab924,2025-03-06T14:25:09.843000 CVE-2024-54270,0,0,4ff2a32fb0b8766616f6de47e9eb91a9703be9f024b88fd7ec9559d6b3384e5b,2024-12-18T12:15:10.570000 CVE-2024-54271,0,0,c27662fb9968b9725bc778a9d9144b52ef438a3ce319f321fd17e81c32f1277a,2024-12-13T15:15:31.230000 CVE-2024-54272,0,0,f5a3261052d9bdef13af95bafcaf81a95248149d03f918ded2479469dd46cf4b,2024-12-13T15:15:31.367000 @@ -274349,7 +274353,7 @@ CVE-2024-54306,0,0,48683bd2c710a44bffe7e8451e473462910ffacefecb9bc4333588398f856 CVE-2024-54307,0,0,dc693bb275745794b58e99ee9aacf2eb31a3a335e7a9f1bd965e0c1a695d4f8d,2024-12-13T15:15:35.313000 CVE-2024-54308,0,0,93acb47da6c89852056fa481b260a065439831599dc83b02db9b901f9f23159f,2024-12-13T15:15:35.470000 CVE-2024-54309,0,0,cf9f58b5557f17ebec587419bd79b391398e088a671792c51d132749158d2320,2024-12-13T15:15:35.663000 -CVE-2024-5431,0,1,acc34c060591ffeb1c88b3b0c033eafa92c98e0e8c5894a39af5ad3771fe0ffe,2025-03-06T14:25:09.843000 +CVE-2024-5431,0,0,acc34c060591ffeb1c88b3b0c033eafa92c98e0e8c5894a39af5ad3771fe0ffe,2025-03-06T14:25:09.843000 CVE-2024-54310,0,0,655cfcdbd31640390fa19d4d2aa88102cde1596774c1eace9c6a217792cb7872,2024-12-13T15:15:36.820000 CVE-2024-54311,0,0,23e18809018d617173c3e7133cbacbabfa3b93e6c408d127bc955e1b7887eee0,2024-12-13T15:15:37.580000 CVE-2024-54312,0,0,8aa5c0b192af992ddb207253021c55edb5df573bd13889e3493f5bc52128fbe3,2024-12-13T15:15:37.713000 @@ -275118,7 +275122,7 @@ CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366 CVE-2024-56060,0,0,d52c48295d0dbb3abfdc5dccd1daa1a43773049add0bc86c3cdd22c212f008f3,2025-01-02T10:15:08.643000 CVE-2024-56061,0,0,a028e486e70270644a1996649c2c3b8450478b85bb5ddc1825cc066d2525f2f5,2024-12-31T14:15:24.970000 CVE-2024-56062,0,0,0710d5a9eeb90721a35932b9d93096a40330ad3819456d48d0db54e95031a5c0,2024-12-31T23:15:41.237000 -CVE-2024-56063,0,1,81a7b7a2d78bc29a5f5fcce3a74b9d8a0b1c655402262c170b63dcca2ef85513,2025-03-06T14:25:09.843000 +CVE-2024-56063,0,0,81a7b7a2d78bc29a5f5fcce3a74b9d8a0b1c655402262c170b63dcca2ef85513,2025-03-06T14:25:09.843000 CVE-2024-56064,0,0,0d85e693a6ee180923e3bd9bf5f6c4beff2647e62cc73ae1ee472d7fcb52494b,2024-12-31T13:15:08.157000 CVE-2024-56065,0,0,1e7e79ad901a249cf3b84fdd4f95f74b4dc3e18729cca8dceb16fa0af04fe16f,2025-01-13T14:15:09.117000 CVE-2024-56066,0,0,4b41a7e13e2d31a70f1527d8d2fafeb73707725a422cde8f675c73ee0c2f217a,2024-12-31T14:15:25.117000 @@ -275177,15 +275181,15 @@ CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 -CVE-2024-56195,0,1,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000 -CVE-2024-56196,0,1,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000 +CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000 +CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000 CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 CVE-2024-56198,0,0,3b67ef470891f025afa6af0da137e788f43839b85f759fed43bf437c7d57fc06,2024-12-31T16:15:27.247000 CVE-2024-56199,0,0,b62df53baa8d4848a6f31e2b0b1f49a9a24a4405c740c5c1ac552cd60e35a283,2025-01-02T18:15:20.427000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 CVE-2024-56201,0,0,fcf381b194171b51a5229bbac53f5e329fb502829416a1a37abaece0e20f4002,2025-02-18T22:15:12.910000 -CVE-2024-56202,0,1,f3e5c2e821f482d33cfcbcb7036987bf3a680947a5b32918fe42e63be16b5439,2025-03-06T16:15:50.053000 +CVE-2024-56202,0,0,f3e5c2e821f482d33cfcbcb7036987bf3a680947a5b32918fe42e63be16b5439,2025-03-06T16:15:50.053000 CVE-2024-56203,0,0,e99e9de74c83a36dbb17a843377a1378f7cef98ac1909cf2366fcf78cc18f19f,2024-12-31T14:15:25.400000 CVE-2024-56204,0,0,6a6e8f022625febdb1ce3a481d0a8e2bb1f1902592ae6e2bfa4e06cd41426aed,2024-12-31T14:15:25.547000 CVE-2024-56205,0,0,8369f1bc37e0dcf8f712f3109d50a2811210639fc84cb65dbb5b1dd98af12e24,2024-12-31T13:15:08.803000 @@ -275452,7 +275456,7 @@ CVE-2024-56548,0,0,0c74a7d90e7eef20610734f63deefd7089991371ee9a9bdcec249a4eb0b73 CVE-2024-56549,0,0,f06d0249fff07a351b0adb594ef910674acea63172f8ea331235c7c1107d08ec,2025-02-21T14:15:50.947000 CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000 CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000 -CVE-2024-56551,0,0,36f204fddaadc42f9861b127270dda6a10a23445438a767cc28684d21a76f523,2025-01-23T17:15:15.510000 +CVE-2024-56551,0,1,d1f20def6278634dae6e074c624470264118e96aaf74555b9b48cbbe6905534c,2025-03-06T17:15:20.590000 CVE-2024-56552,0,0,a3c48da8b466f06a1443e801f2355b958e7309a0c2bd86f0bd0c1f10746499ed,2024-12-27T15:15:13.970000 CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030fb6,2025-01-15T18:35:51.337000 CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000 @@ -275569,7 +275573,7 @@ CVE-2024-56654,0,0,9e61aaa697592ea74d94ab060d486564b3c917c417bf5745395edd40f490b CVE-2024-56655,0,0,15370a8c8802791631374c1b398d205e6228e13f4d3acf29761181b2fe76f053,2025-01-06T19:39:02.183000 CVE-2024-56656,0,0,c45608fb96c1d9d3ec6fdafc60038556053690b8422a06c9b78c70da4adc48cc,2025-01-06T19:27:40.187000 CVE-2024-56657,0,0,24b7a2608e29205998c248ed91c6d0279f60b2603ab2a2945b2346a131e1b818,2025-01-06T19:28:49.760000 -CVE-2024-56658,0,0,ad34ff86df174734dee855ffa70fb309cf68cefe9738bf73854001c5cdfcded1,2025-01-06T19:29:49.770000 +CVE-2024-56658,0,1,d0e4e2b9c31e906ba20770ff150734c04340f4fd2623d09971e8f8ac49651053,2025-03-06T17:15:20.783000 CVE-2024-56659,0,0,5af48fbfd500475e97f794efbfd7019c9d1e6ea37e201e41e887360f28ef3a74,2025-01-06T19:30:32.403000 CVE-2024-5666,0,0,8139975e898ee1091802fa011bf50726a9ce2f054b4cff2fd9267df5d7986a48,2024-11-21T09:48:07.360000 CVE-2024-56660,0,0,cfed4a787333c42a3454657a06f0d3b7a6226ccb05b4cc27e3c9f4d563a87d98,2025-01-06T18:43:45.897000 @@ -276371,34 +276375,45 @@ CVE-2024-58048,0,0,25e6d05d2f9c2c4ba042691b58c9f3e9065aaf46adac4143fd8a3d39edf19 CVE-2024-58049,0,0,531a2aeb3dcb148691f97d407abd92031eaaab2d4984c8e46b10cde9f4a78f8c,2025-03-04T08:15:35.593000 CVE-2024-5805,0,0,fce2cd9169116102e5375089f5975fe2795253d6c4b763ab35cc7d32ac26b7a6,2024-11-21T09:48:21.803000 CVE-2024-58050,0,0,60d665e6d95162cbf269cc1b75f990da5ff91503a4492b952e5f609a234ef33e,2025-03-04T08:15:35.767000 -CVE-2024-58051,1,1,2cafa3538f5782d14f7a6c4c30044d26afd61b54039234039199c15f43d17921,2025-03-06T16:15:51.247000 -CVE-2024-58052,1,1,8a11e0d4b9d9c8bd5a90f8715a8d4a8e062e314e07d857c92a7cd7c02f80adc5,2025-03-06T16:15:51.367000 -CVE-2024-58053,1,1,1e6728899803d01331497875cf6ddbf3e95fc62f1d01597d611fcdf32c586a87,2025-03-06T16:15:51.490000 -CVE-2024-58054,1,1,22ab24f419023ba44f6ff97c84cbf401afb50a6b1598b274e44dcc7c356ef215,2025-03-06T16:15:51.600000 -CVE-2024-58055,1,1,e3a96e3ea7e4131281b56e3139a5d181bb664b1ba32bd80fec7368349ece3ee0,2025-03-06T16:15:51.730000 -CVE-2024-58056,1,1,86fb9d3ea1708b10267c022b9fa8df899fa4cc401f71403a759c2316424eceea,2025-03-06T16:15:51.837000 -CVE-2024-58057,1,1,cca7e05d64ab673ef86829ca3c15e2c9223dd80c3436e89f6cfe56cfa836f67c,2025-03-06T16:15:51.940000 -CVE-2024-58058,1,1,8e0ce81daf5893833bafcc9b8b09339f9532a057cc65cf9b31e2003e9944c78e,2025-03-06T16:15:52.037000 -CVE-2024-58059,1,1,40160e71985a337acefb34ce5c5702e0f63950ff0118dc40fa8161a328890384,2025-03-06T16:15:52.140000 +CVE-2024-58051,0,0,2cafa3538f5782d14f7a6c4c30044d26afd61b54039234039199c15f43d17921,2025-03-06T16:15:51.247000 +CVE-2024-58052,0,0,8a11e0d4b9d9c8bd5a90f8715a8d4a8e062e314e07d857c92a7cd7c02f80adc5,2025-03-06T16:15:51.367000 +CVE-2024-58053,0,0,1e6728899803d01331497875cf6ddbf3e95fc62f1d01597d611fcdf32c586a87,2025-03-06T16:15:51.490000 +CVE-2024-58054,0,0,22ab24f419023ba44f6ff97c84cbf401afb50a6b1598b274e44dcc7c356ef215,2025-03-06T16:15:51.600000 +CVE-2024-58055,0,0,e3a96e3ea7e4131281b56e3139a5d181bb664b1ba32bd80fec7368349ece3ee0,2025-03-06T16:15:51.730000 +CVE-2024-58056,0,0,86fb9d3ea1708b10267c022b9fa8df899fa4cc401f71403a759c2316424eceea,2025-03-06T16:15:51.837000 +CVE-2024-58057,0,0,cca7e05d64ab673ef86829ca3c15e2c9223dd80c3436e89f6cfe56cfa836f67c,2025-03-06T16:15:51.940000 +CVE-2024-58058,0,0,8e0ce81daf5893833bafcc9b8b09339f9532a057cc65cf9b31e2003e9944c78e,2025-03-06T16:15:52.037000 +CVE-2024-58059,0,0,40160e71985a337acefb34ce5c5702e0f63950ff0118dc40fa8161a328890384,2025-03-06T16:15:52.140000 CVE-2024-5806,0,0,5ac9637d8c764ba881b38672e3b3265f75ae0c44c191480b6554928fc9eb1283,2025-01-16T16:57:19.660000 -CVE-2024-58060,1,1,b6c2623ac2f1f69028a55e8bdffbf555ad1ff84f1780a805cdc81c9f0d84eec7,2025-03-06T16:15:52.230000 -CVE-2024-58061,1,1,168f37efb41f94c7bd3667ba879d8c3814558375cf700a08ca6b07aa9f32a13a,2025-03-06T16:15:52.390000 -CVE-2024-58062,1,1,01d9003a7d1b91faf0bd7090d4198f86dbdd96c5b2193d63d848996ca3a9ad42,2025-03-06T16:15:52.490000 -CVE-2024-58063,1,1,ba32b1beaf14f4724437d0a976de0bce2c42efeac678196663123a9f63a1028f,2025-03-06T16:15:52.583000 -CVE-2024-58064,1,1,72b8fa96a79b2382a3c37624697e92848ecb20a8956da290497772b8c4904b74,2025-03-06T16:15:52.733000 -CVE-2024-58065,1,1,66ced7b7adee37b8356e0226335230bd17e9d3878d7c1fe032451829bf324b6f,2025-03-06T16:15:52.830000 -CVE-2024-58066,1,1,27e9283377d7bad95517767530204bfb4b58b39aa1bbc6f576fe83352c152683,2025-03-06T16:15:52.997000 -CVE-2024-58067,1,1,4ca3b0f67931e81284dc1e243a4e189cc599b000ce83375fd7daa528fd5838d9,2025-03-06T16:15:53.150000 -CVE-2024-58068,1,1,8ea6ab314c3b17c7e4a14c9aad5d2e0082daad6a1ba7d268cad8c0d1a14f0f6a,2025-03-06T16:15:53.257000 -CVE-2024-58069,1,1,1d9a02b4d03e870fd2b8b9f894c9f2805c870ad01ccc12c490bff6faaf689da3,2025-03-06T16:15:53.373000 +CVE-2024-58060,0,0,b6c2623ac2f1f69028a55e8bdffbf555ad1ff84f1780a805cdc81c9f0d84eec7,2025-03-06T16:15:52.230000 +CVE-2024-58061,0,0,168f37efb41f94c7bd3667ba879d8c3814558375cf700a08ca6b07aa9f32a13a,2025-03-06T16:15:52.390000 +CVE-2024-58062,0,0,01d9003a7d1b91faf0bd7090d4198f86dbdd96c5b2193d63d848996ca3a9ad42,2025-03-06T16:15:52.490000 +CVE-2024-58063,0,0,ba32b1beaf14f4724437d0a976de0bce2c42efeac678196663123a9f63a1028f,2025-03-06T16:15:52.583000 +CVE-2024-58064,0,0,72b8fa96a79b2382a3c37624697e92848ecb20a8956da290497772b8c4904b74,2025-03-06T16:15:52.733000 +CVE-2024-58065,0,0,66ced7b7adee37b8356e0226335230bd17e9d3878d7c1fe032451829bf324b6f,2025-03-06T16:15:52.830000 +CVE-2024-58066,0,0,27e9283377d7bad95517767530204bfb4b58b39aa1bbc6f576fe83352c152683,2025-03-06T16:15:52.997000 +CVE-2024-58067,0,0,4ca3b0f67931e81284dc1e243a4e189cc599b000ce83375fd7daa528fd5838d9,2025-03-06T16:15:53.150000 +CVE-2024-58068,0,0,8ea6ab314c3b17c7e4a14c9aad5d2e0082daad6a1ba7d268cad8c0d1a14f0f6a,2025-03-06T16:15:53.257000 +CVE-2024-58069,0,0,1d9a02b4d03e870fd2b8b9f894c9f2805c870ad01ccc12c490bff6faaf689da3,2025-03-06T16:15:53.373000 CVE-2024-5807,0,0,bcd7f1773756c308216942ed74fe8b63dad936ebebf2c4e22c08a44714f2e7fd,2024-11-21T09:48:22.057000 -CVE-2024-58070,1,1,4e96941870f19160ee0abf4a8dc11f2d652ccb3f2fd2e07c00c4f60da545bfc1,2025-03-06T16:15:53.480000 -CVE-2024-58071,1,1,e2187308a3c54651be755875a9cfa8feb71b8649c44e0baeb126c8142553f3bb,2025-03-06T16:15:53.593000 -CVE-2024-58072,1,1,24d89844d6f1493212431ad264fcbbbb1973872706eac6c214cfaf903e3d1cc3,2025-03-06T16:15:53.703000 -CVE-2024-58073,1,1,109fadd3201cf47ca89f9a569fc60b9a69b2ee83d751aa8631e712ab45aeb7f0,2025-03-06T16:15:53.833000 -CVE-2024-58074,1,1,883e6ff7932d7cffafc87fdaad452ce3afa9cc5ba5a81459b9802774df1ecc0c,2025-03-06T16:15:53.943000 -CVE-2024-58075,1,1,a06e38c607e2bc80efcf58b48a2e1ae65450ec85e29b0d8b484a5f78766e8877,2025-03-06T16:15:54.040000 +CVE-2024-58070,0,0,4e96941870f19160ee0abf4a8dc11f2d652ccb3f2fd2e07c00c4f60da545bfc1,2025-03-06T16:15:53.480000 +CVE-2024-58071,0,0,e2187308a3c54651be755875a9cfa8feb71b8649c44e0baeb126c8142553f3bb,2025-03-06T16:15:53.593000 +CVE-2024-58072,0,0,24d89844d6f1493212431ad264fcbbbb1973872706eac6c214cfaf903e3d1cc3,2025-03-06T16:15:53.703000 +CVE-2024-58073,0,0,109fadd3201cf47ca89f9a569fc60b9a69b2ee83d751aa8631e712ab45aeb7f0,2025-03-06T16:15:53.833000 +CVE-2024-58074,0,0,883e6ff7932d7cffafc87fdaad452ce3afa9cc5ba5a81459b9802774df1ecc0c,2025-03-06T16:15:53.943000 +CVE-2024-58075,0,0,a06e38c607e2bc80efcf58b48a2e1ae65450ec85e29b0d8b484a5f78766e8877,2025-03-06T16:15:54.040000 +CVE-2024-58076,1,1,7085da638c21ca57990fd7c37bd4707567fcadc2cee7aa8033606eff4d8d979a,2025-03-06T17:15:20.997000 +CVE-2024-58077,1,1,98f4ab5e1f94781a6de11323b83c21351e0d2042ab3e0bbabbc98a9c21201fac,2025-03-06T17:15:21.123000 +CVE-2024-58078,1,1,f56d136ab34ab9a5d07b8e02a923dee03d8b53e371c69bec309ed43ea32faa2e,2025-03-06T17:15:21.250000 +CVE-2024-58079,1,1,579d9d645c94a89400ca687a17c00a8eeebf4813296e5c52f584eb6e27eeb15c,2025-03-06T17:15:21.360000 CVE-2024-5808,0,0,8544bff4c0ab9040235b040d590c0013468843f3e678f1770e3c92d0e5bbd73b,2024-11-21T09:48:22.213000 +CVE-2024-58080,1,1,e0e7489b58abb5b7e54d34d0b4dd4274b92c6df50b99fb34b4758a6a68d90d60,2025-03-06T17:15:21.473000 +CVE-2024-58081,1,1,80dd2b309c1430de6d6e28a7ef0ef223d643d27fd579373dc5640d3f3d6fad7a,2025-03-06T17:15:21.577000 +CVE-2024-58082,1,1,499452ad0355aa6c904b9df7b6880d14ce8265474f0b29ab42bb87143a85ba14,2025-03-06T17:15:21.677000 +CVE-2024-58083,1,1,bd7cfb950a2c169e6423eab96cbba45b1cde4a4295ee7100f509f98188eaf827,2025-03-06T17:15:21.773000 +CVE-2024-58084,1,1,a41bf7a6804b945971730ab63f6618961e5bea4f9ad3567be6339142dc5c7265,2025-03-06T17:15:21.890000 +CVE-2024-58085,1,1,47b3e6ef1fbef3749b81ec4e1f9f1f251d5e9c39cca48b3d54a6db21ff814257,2025-03-06T17:15:21.993000 +CVE-2024-58086,1,1,31e9af0e84acc2b9ad39f5b34fbb6206a8e2c6a4b156a4c24852e0249fb9ac4c,2025-03-06T17:15:22.117000 CVE-2024-5809,0,0,d3a3cb96d02b3d9c2efd17f0531d777c80fde692d386c7f6a56c47f2ca5601d8,2024-11-21T09:48:22.387000 CVE-2024-5810,0,0,1cfa1d347c98633461d8a7b5c70e7a88c8da42418f63ef991acf03eb3681102e,2024-11-21T09:48:22.557000 CVE-2024-5811,0,0,0c5a0ebde16bcb77e73a53dccf7ebf134980e586a889ff63137b1e7e940a0edc,2024-11-21T09:48:22.670000 @@ -277606,7 +277621,7 @@ CVE-2024-7145,0,0,073fb8bd11ab6d990bf0288270f3cedbc70b03e2b8ff14d66dd5aab6d49885 CVE-2024-7146,0,0,8f6ca05a9fea983190c8addbeaa39313a66f259ac7953d365b6f9189d7b6dba6,2024-08-19T13:00:23.117000 CVE-2024-7147,0,0,94abc8269d5a4f00fc784c28fd49cb9b2fbe37ba41a15dd2c74e76e3a1853b87,2024-08-19T13:00:23.117000 CVE-2024-7149,0,0,c86cfa919d57d34d7626da5ae14ef34b0edf743fc6f1819ce7d81f44917bfb16,2024-10-04T18:23:09.863000 -CVE-2024-7150,0,1,826b1f3434ee584fd91b81b0b0a1a657ee613a55b9e843861dedac81c273e91a,2025-03-06T16:24:25.053000 +CVE-2024-7150,0,0,826b1f3434ee584fd91b81b0b0a1a657ee613a55b9e843861dedac81c273e91a,2025-03-06T16:24:25.053000 CVE-2024-7151,0,0,a39066a22f3ca2691a8f1f3869bdd777155eb7d16b87d37d779f96c76e45afc0,2024-11-21T09:50:56.890000 CVE-2024-7152,0,0,2c79e5cedce115553f9a68c452426c0aa90911e85b8a061e8e743b0ba30283de,2024-11-21T09:50:57.067000 CVE-2024-7153,0,0,f685cba3a1683f23a92455bb0f61b078efcb65f29dfc887aab4fbaaf76350a76,2024-11-21T09:50:57.230000 @@ -278726,11 +278741,11 @@ CVE-2024-8415,0,0,a3f2afcdb21ce0b2fec98fcdaaedb1ab2896ee674056c7b38a39175cf31ca9 CVE-2024-8416,0,0,ed361759131ec3ab2e5148127fe9616f5a5b0a2edff3c1fd1a11d8ddfbdb5947,2024-09-06T16:38:44.053000 CVE-2024-8417,0,0,4eb083c52357c79e9c6a91150d505026d09535b3fb55042da1248e6dd7a6adbb,2024-11-21T09:53:11.207000 CVE-2024-8418,0,0,13014cb10bf2076fdd98d7e7307a7de55e2e6a5c70285579360946d216816d18,2024-09-17T20:15:06.710000 -CVE-2024-8420,0,1,e5b34eba9759f64190d5368c0038dd88344afb756085f618381e7952d1be6f07,2025-03-06T16:36:34.470000 +CVE-2024-8420,0,0,e5b34eba9759f64190d5368c0038dd88344afb756085f618381e7952d1be6f07,2025-03-06T16:36:34.470000 CVE-2024-8421,0,0,6800675b8d580f62fefe249f14070dd1be7b0d76f26f1a650e36706f5d41a8e4,2024-10-30T22:15:03.503000 CVE-2024-8422,0,0,595c3a4c4569e5d22b76db5956453d2a1a1a701b00065efde8acf9a79c387cf0,2024-10-16T18:00:10.507000 CVE-2024-8424,0,0,70e0efba1b7474fd71ae798ee933fd249d2e6d2cb69d7469e257caaac30ab429,2024-11-08T19:01:03.880000 -CVE-2024-8425,0,0,fc73b4c2c260fe21b5bc2fab7f3679ac5cb884a24671e36c961f5bb842707523,2025-02-28T09:15:11.083000 +CVE-2024-8425,0,1,8578acc89b2c74a945f63151fb9b4780a5d6bb1dca81911192e21bd3d88f3265,2025-03-06T16:36:34.470000 CVE-2024-8427,0,0,b84207915031e0f3fd8ae31fc1649578b63ca815fcdfb9b3c22054b4863be5e4,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,16614a0b61f86dd0b83d47d6c77d8385fb4c68c4d0f570f88f7c5094d2f7b53a,2024-09-26T21:58:45.393000 CVE-2024-8429,0,0,7d7adc19f31eabcda933830e1386025bcbab9119931c58d61657c8ea833e8e43,2024-12-17T12:15:20.853000 @@ -279239,7 +279254,7 @@ CVE-2024-9011,0,0,24ced7d06552bc9d1dd30636af61f2f64e910b6c47eefac677c31a4765d5a4 CVE-2024-9014,0,0,220003038e0ed1cc49a0befe3090135c41cd16a5f829c2d65bd6cc8f984c0497,2024-09-26T13:32:55.343000 CVE-2024-9015,0,0,70610f66e2554a4ae6806b1835adece9ecbb77c46846bbc910eff47baf4dabd3,2025-02-11T02:15:36.640000 CVE-2024-9018,0,0,9d5f9a71065cb5737c3eb97e3b8fce2545d7a7505edc442df3224ec9cdcd8b15,2024-10-07T19:20:48.293000 -CVE-2024-9019,0,0,b0e5ef09bc954fd45f762ba11289b323f0e5567e0b4c42b4e45e1e94cd6e6eeb,2025-02-28T09:15:11.270000 +CVE-2024-9019,0,1,43802e19726442119cda3a15e8bb288e02463bb359c959714418efb58e791166,2025-03-06T16:36:34.470000 CVE-2024-9020,0,0,13f7d55260c3dda01ac88411af938bbf50d791e8c741bac69665223f77a450e5,2025-01-22T15:15:14.407000 CVE-2024-9021,0,0,38ce15408413883ac2962e131e46ff98aae3d8ba8d1d410ba95b4f315f4dd5ce,2024-10-10T12:57:21.987000 CVE-2024-9022,0,0,b97de3f37f13459888a48b84864cef3e3e6492a34af924d2e6bb02f8326a41fe,2024-10-15T14:34:12.063000 @@ -279975,7 +279990,7 @@ CVE-2024-9884,0,0,4a0a77563fc4e06c8296a47a1c8635fcfa8e5f69be4a2d7e1096bd71ca362f CVE-2024-9885,0,0,b21445718b93ae656c78bfcfeb3bf6e8a2777208198bab62cb8e54c1d6ea88a9,2024-11-01T12:57:03.417000 CVE-2024-9886,0,0,04ce6f029ebf112e409af5e292567f14dcda7336912ff68f33d70d3ca5fdf4fb,2024-11-01T12:57:03.417000 CVE-2024-9887,0,0,a57bb96d7f5d03d33f9ea1b06c833521402094a65a8335751f2160d8f17c9a14,2024-11-18T17:11:17.393000 -CVE-2024-9888,0,0,a090ee59c5ad9d65171c16cb05f96086be9a644416f445deaebb7e1f4ce6b684,2024-10-16T16:38:14.557000 +CVE-2024-9888,0,1,ed3e67c9269e016b58aaa245366e12d42e3eb929376a6f7d519cfa91bd57288e,2025-03-06T18:13:11.800000 CVE-2024-9889,0,0,7a64698fdf3298a7b4d684626a6830e5a5b785a9e26986bee7406f479d860681,2024-11-01T15:27:23.777000 CVE-2024-9890,0,0,b0e8bda7f7d806e933d15bb3145a9edb8c134858dbfd5a95388bc8af05629f9f,2024-10-28T13:58:09.230000 CVE-2024-9891,0,0,4d46692b8a9a483c19484401ddd06b53b7467e4ccf0ce5f92f7bde6fae1d0eb4,2024-10-16T16:38:14.557000 @@ -280220,6 +280235,7 @@ CVE-2025-0333,0,0,81e4cc439859af53c1b986765c85b9db6681ddfd15355f617bb0f4d13181d4 CVE-2025-0334,0,0,a2752894f0956fdde9f25172948b20b0ef85e697939129012141ceedb1b495bc,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,d5fa0c487675ca616e7ff135ad8a970ffdd4ae08b32ac07ee07443b3a83ed665,2025-02-26T18:25:29.120000 CVE-2025-0336,0,0,795ad1de1d64b863b23a9ee9f1f8e965a4f5ae1458793c278520d16970dab18d,2025-01-09T07:15:27.860000 +CVE-2025-0337,1,1,e1c87c19f3cc4ac741cd664509844da009a4879547ec0484afa3b36eca0f697b,2025-03-06T17:15:22.303000 CVE-2025-0339,0,0,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000 CVE-2025-0340,0,0,d2643790c5408b8656f83d48122b2edd0443b492b102add5cec114f36ec3d251,2025-02-27T02:05:55.703000 CVE-2025-0341,0,0,b0cebaf9b276af573888ac34520a7b93ce4fdf91461ce7b89f083d81a4f7efff,2025-03-04T19:30:24.047000 @@ -280507,7 +280523,7 @@ CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49 CVE-2025-0759,0,0,3950068b51270dbe7575a23dc385c472189e9c3ef0131c0ca8aebf6982e5189c,2025-02-27T15:15:40.603000 CVE-2025-0760,0,0,4ca9ac99fb9336a13e4c0593cd94e546cc82a4636817a6aff90106a98c22e8a6,2025-02-26T00:15:10.890000 CVE-2025-0762,0,0,e4f54e0a8112ca4bbd93833150136d658b70b741ccb351b92cec93e89ce75210,2025-01-29T15:15:17.687000 -CVE-2025-0764,0,0,c361408dc8341f519ad818deefae08734344056ea08640e21b6d8307fed6f9af,2025-02-28T07:15:33.863000 +CVE-2025-0764,0,1,05565ab00dd47478df6fddf826fcaa677cc4cff7c4d3d296c1f19709af483840,2025-03-06T17:52:55.370000 CVE-2025-0767,0,0,ebaf8c1290fdf05b5e391e352659acacd8062a3880fa35ea591d863dd24a3d46,2025-02-27T19:15:49.350000 CVE-2025-0769,0,0,b581b08d9ccf53eafac9a57a886485fd542a058d854e1408644a5ca22deab911,2025-02-28T20:15:46.440000 CVE-2025-0781,0,0,b187217e5320659130c2f954520571f906b51edbf3680129182cf06170507db1,2025-01-29T22:15:30.187000 @@ -280836,7 +280852,7 @@ CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b CVE-2025-1306,0,0,1ee42c9c738fb719918d183e21eaf97d7c5ffad4c1efdf287d4d8d62c7af94e4,2025-03-05T16:39:32.083000 CVE-2025-1307,0,0,772431524fea13dc6d4f62c6ce6ee7e302de8db818ceb219340d02b934bfb44b,2025-03-04T05:15:14.233000 CVE-2025-1316,0,0,f932f98d5a32b1e0c223e88762610c5952375892982b9e178aa7ca013cbd0ec3,2025-03-05T00:15:35.057000 -CVE-2025-1319,0,1,33bda93fd3980ba7b6a91272d6a6ae7036010f8fa7bdd3f4dc099ca7b24e3ab8,2025-03-06T15:00:16.447000 +CVE-2025-1319,0,0,33bda93fd3980ba7b6a91272d6a6ae7036010f8fa7bdd3f4dc099ca7b24e3ab8,2025-03-06T15:00:16.447000 CVE-2025-1321,0,0,fe193fa44353594440aac216be48f78f1d1914788baa79c358bb03fb8eb369f9,2025-03-04T04:15:11.547000 CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000 CVE-2025-1332,0,0,04253da72e8edd91cac77b4f2ad8533b669f4d496d09ec3f2573f85295be125b,2025-02-16T01:15:20.440000 @@ -280885,7 +280901,7 @@ CVE-2025-1393,0,0,7e67ea62469d5decfffee901208f62ab89eaada4966e37e0b8373112ec3c53 CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000 CVE-2025-1403,0,0,d98767ffbbabf7b703d6464c4760704cf18c9952a200d902dfdc98a149c5818d,2025-02-21T18:15:20.550000 CVE-2025-1404,0,0,206798e10794776f5070bd90971934cac6d858de29398b0cd87fe60644cffca8,2025-03-01T12:15:34.310000 -CVE-2025-1405,0,0,f79a249eed6f1df2e72b69769faa924709e9a914f91232fbbc17335baa300615,2025-02-28T07:15:34.063000 +CVE-2025-1405,0,1,016e0a2d9c49bef945de3d88454b1b089cb01529a46c8d393d534fcf1fc43e82,2025-03-06T17:52:55.370000 CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000 CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b475037,2025-02-25T03:37:32.347000 CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000 @@ -280918,8 +280934,8 @@ CVE-2025-1505,0,0,f07d028c0b1afb5f694ef937c5c5c28e5a39031e094947035ed6a198be4666 CVE-2025-1506,0,0,3f7cdcccb4278d311606b0b4c7fc8dc6a6db82f7eaadf4061c1d5cb0a4181211,2025-02-28T06:15:25.557000 CVE-2025-1509,0,0,96513da0fa9cb03c336b83bf5bddf52acacdda9db2e967b5f8ef0dc0a4de0f27,2025-02-22T04:15:09.883000 CVE-2025-1510,0,0,5e7f4e908d48e1455cf18a81d8dfff338614746cef18c3315cc85b0c64b8c8df,2025-02-22T04:15:10.040000 -CVE-2025-1511,0,0,92d16ec9cdb5f4e3f37d1ead50a4ecde4e869b1ac9e9b474b39bd9ef65a37b75,2025-02-28T06:15:25.750000 -CVE-2025-1513,0,0,49686153eb93c741adb1d6d7e23372a0773d0f92ceeb66d85a64053bd21ac0c5,2025-02-28T06:15:25.937000 +CVE-2025-1511,0,1,b1b588667a5e649574877e42702a5753176a9b5bb63efe10313a554d2504ba09,2025-03-06T17:52:55.370000 +CVE-2025-1513,0,1,3e83881e26d14d0e87001b4c3ba5dc79f7552c69b46afe7ea910cd8458998dde,2025-03-06T17:52:55.370000 CVE-2025-1515,0,0,40fb5af3561fa8566133f431829f949e2515107ad298d86ca1e6887d1d266212,2025-03-05T10:15:19.850000 CVE-2025-1517,0,0,f77151ae5031cf639b38b016ea952fb6438aadc87174ef04eae6ee15efb2dd99,2025-02-26T13:15:41.193000 CVE-2025-1535,0,0,6080c0c0968f3ab3c5259d9031c93f6d6c93dcaef1c71aa8b7e3b62645a6a84e,2025-02-21T12:15:30.877000 @@ -280936,11 +280952,11 @@ CVE-2025-1553,0,0,d96596568d35a79921cd22eb566581d3e14afd9146a9b30f63868f25354407 CVE-2025-1555,0,0,cf4f7ec4c7f22b94f8768d59c9ac2dc8d623655b78ea6887e44ed58b3a34f68a,2025-02-24T15:15:12.810000 CVE-2025-1556,0,0,49cf967daea174b937b57c499bcc0c58b27409b32832009c453b7af5b3d38409,2025-02-22T13:15:12.010000 CVE-2025-1557,0,0,3e42539e3278629613c7b2eda2c607604ec0199542e2ce94bd1310750af51221,2025-02-22T13:15:12.247000 -CVE-2025-1560,0,1,ba11227614899d3056761ea4c890190d97fc89170a767994ef7607faca65ce17,2025-03-06T15:00:16.447000 +CVE-2025-1560,0,0,ba11227614899d3056761ea4c890190d97fc89170a767994ef7607faca65ce17,2025-03-06T15:00:16.447000 CVE-2025-1564,0,0,645d5d3c72d90d98c848dad749bda526f296bef655490c72ec6d985301cb81b4,2025-03-01T08:15:34.007000 -CVE-2025-1570,0,1,9c53718a1eed240e02a569965a467342bf3a80fb8b884074af55a034defd9df2,2025-03-06T15:00:16.447000 +CVE-2025-1570,0,0,9c53718a1eed240e02a569965a467342bf3a80fb8b884074af55a034defd9df2,2025-03-06T15:00:16.447000 CVE-2025-1571,0,0,2ff9d1871ce4b294af235897d1f180d1853e1f37cf780d6e8da053f8773e82c8,2025-02-28T07:15:34.227000 -CVE-2025-1572,0,0,1320b2f727383676da6c73261af1868478cf6dd12bf50e5bdd5ba7a431e21124,2025-02-28T08:15:35.810000 +CVE-2025-1572,0,1,4624d62075f2625515018b130359f28dc2ef1b58e0a085f5d23b7995a7032a3a,2025-03-06T16:36:54.387000 CVE-2025-1575,0,0,295612ec0ffb6cc1f5a98b01cca7e60e463451cd2e098b1e5038c15250f15467,2025-02-23T04:15:24.980000 CVE-2025-1576,0,0,aeb190ff01707b8d12dded28d81e8d078211363f2b351bee055762ff93e0203e,2025-03-03T16:25:24.627000 CVE-2025-1577,0,0,4d8fa583e71372f21db5fe2ef87d702b5d584f75eb8697a695605f1072d59f24,2025-03-03T16:25:24.627000 @@ -280992,7 +281008,7 @@ CVE-2025-1644,0,0,11dc7631b000d67798bd397f7a51f560854b084da5ab0dd69b1cdb2c0ab76f CVE-2025-1645,0,0,04ec87d98beb60cc953f9d19acf54f139fb80161a3db0460324c4b28ab5996d3,2025-02-25T02:15:16.123000 CVE-2025-1646,0,0,82269c59d8fff978173814c505cbeb09d268e21305971283c38395c7897fc304,2025-02-25T14:15:31.320000 CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000 -CVE-2025-1662,0,1,f747ba4edfe81f2cc6bd228a54a69ac8ef31e80bbf16aa2517aaed153638e887,2025-03-06T15:00:16.447000 +CVE-2025-1662,0,0,f747ba4edfe81f2cc6bd228a54a69ac8ef31e80bbf16aa2517aaed153638e887,2025-03-06T15:00:16.447000 CVE-2025-1666,0,0,ea2a7fe153b3bd999a528b5a5c12f9cc09134d2f6112f43b8b3a66a17753fd12,2025-03-06T12:15:36.117000 CVE-2025-1671,0,0,dfe1ff393d446d4a55c0e76e273c07a93a52c6ac6df15c5814731fbc40a9a1ea,2025-03-01T08:15:34.320000 CVE-2025-1672,0,0,7a20675a12af4d2fa4d4625b3c2a44c55632de2b78981cd05f1c08d4059e6b7d,2025-03-06T10:15:11.897000 @@ -281169,7 +281185,7 @@ CVE-2025-1965,0,0,72705674a561d6056f4e54dfd5d2fda7d9f6e486812e38d2b199633b788552 CVE-2025-1966,0,0,6ccd782fa14c79bfb085da504344a1de6f9901dce1ffefcf87ba1c9f56a60487,2025-03-05T15:15:17.260000 CVE-2025-1967,0,0,42e655fe49f6762d0d9e1e0fe0e87e8caffe391f86ae92c278c36c149b534595,2025-03-05T15:15:17.410000 CVE-2025-1969,0,0,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000 -CVE-2025-1979,0,1,019eff2dd7a8f2f66ae0ab75abcd57bcffb91213915f9f59c4cd22328ef04c34,2025-03-06T16:15:54.187000 +CVE-2025-1979,0,0,019eff2dd7a8f2f66ae0ab75abcd57bcffb91213915f9f59c4cd22328ef04c34,2025-03-06T16:15:54.187000 CVE-2025-20002,0,0,2bccd9ef008596859abc4b0349462cb16836a7cb045dcda2e77e2e2faea7a70c,2025-03-05T00:15:37.910000 CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 @@ -281234,9 +281250,13 @@ CVE-2025-20206,0,0,8f347189fdbb6b6be2d99d03467464262d7ee95d567831fc25e6871bb3686 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 CVE-2025-20208,0,0,1dec4a67abad93b4e30bff99a42e85d57a7d0f10ed0df9df2a04fceabe83cdcb,2025-03-05T17:15:14.610000 CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000 -CVE-2025-2029,1,1,93023c22912987564123e39309d24758527c12f0e9ccb8c0c3ff604f1965ea96,2025-03-06T15:15:17.943000 -CVE-2025-2030,1,1,45c9009752edf05edc8391d031a81451ba0bee5f88f8e7315cd270279d6ba239,2025-03-06T16:15:55.593000 -CVE-2025-2031,1,1,cb856a144a364b791dd0b09a5ac0e0bef2d2dbf1de9f7793206b24aca3365494,2025-03-06T16:15:55.727000 +CVE-2025-2029,0,0,93023c22912987564123e39309d24758527c12f0e9ccb8c0c3ff604f1965ea96,2025-03-06T15:15:17.943000 +CVE-2025-2030,0,0,45c9009752edf05edc8391d031a81451ba0bee5f88f8e7315cd270279d6ba239,2025-03-06T16:15:55.593000 +CVE-2025-2031,0,1,5d7168f995fac2cab500af0410060e80ff271f06a0fc111270c45267a1b51cb4,2025-03-06T17:15:24.153000 +CVE-2025-2032,1,1,87651d4114c21c653ae66312bcfd16b6cc53059907a14bac1fe2bfc7cef78ab9,2025-03-06T17:15:24.297000 +CVE-2025-2033,1,1,f8953d527a8dd7fa2ec425e0e1a8988a67e5617e7fb84176b06f18b159bf60ed,2025-03-06T17:15:24.490000 +CVE-2025-2034,1,1,7e09b40d8d5a9b9e58f6982b85a86c374e9be1daceb370522cd6b32725c7f889,2025-03-06T18:15:43.230000 +CVE-2025-2035,1,1,b0efa60056ad785ecb86b50f239ca2d1bd151941c88e0523d6aaad336bc0b51b,2025-03-06T18:15:43.457000 CVE-2025-2045,0,0,5f954a149cde3c0670007c2686ef3ff487d6b9cfe276e63999bff89b33566b76,2025-03-06T13:15:12.553000 CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8805,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000 @@ -281901,10 +281921,16 @@ CVE-2025-21821,0,0,fd6efc5d1ffad2a00aa09e345a704277d9daeb9e6fddc1a42c293b6132b6a CVE-2025-21822,0,0,20ef27da51fd71ed1bc2f3085ac0746fabc8aa34de630fd5cf985e239376c55c,2025-02-27T20:16:04.707000 CVE-2025-21823,0,0,3efea7bac95b4dbad864718b239ff2d7650371b6562540e3b6bd50e2065204cc,2025-02-27T20:16:04.793000 CVE-2025-21824,0,0,33d9372ff5aeb8119ad7223eccd8dac7a53a751809ee1b0f1514d0ff91718cbe,2025-03-05T14:05:15.387000 -CVE-2025-21825,1,1,8870dfd89a416f2d4819ebc7dda8e31caac49b07c149c21ec32a3a7d987beda7,2025-03-06T16:15:54.753000 -CVE-2025-21826,1,1,d8d55921ef1e36df7091e5de134407839b84b0822bba50536183d3f97f7ce0cf,2025-03-06T16:15:54.863000 -CVE-2025-21827,1,1,798ad67445b56cee9d7e2654d461c72d1706e81ca338689a6a6b575e66e62661,2025-03-06T16:15:54.967000 -CVE-2025-21828,1,1,1d423c38cfc3b27519324f42fcfede2fa1caf4961cb465a838aa6e06d0f9b7b8,2025-03-06T16:15:55.070000 +CVE-2025-21825,0,0,8870dfd89a416f2d4819ebc7dda8e31caac49b07c149c21ec32a3a7d987beda7,2025-03-06T16:15:54.753000 +CVE-2025-21826,0,0,d8d55921ef1e36df7091e5de134407839b84b0822bba50536183d3f97f7ce0cf,2025-03-06T16:15:54.863000 +CVE-2025-21827,0,0,798ad67445b56cee9d7e2654d461c72d1706e81ca338689a6a6b575e66e62661,2025-03-06T16:15:54.967000 +CVE-2025-21828,0,0,1d423c38cfc3b27519324f42fcfede2fa1caf4961cb465a838aa6e06d0f9b7b8,2025-03-06T16:15:55.070000 +CVE-2025-21829,1,1,565eb8245bf46ec2e8aea4da181586644cadcf072d0e6c514e0c828dc274ac61,2025-03-06T17:15:22.820000 +CVE-2025-21830,1,1,305117e9f901262e313c4c6a00e95c29dffd65f2d4dc9ad7dbea30d015c9cfc8,2025-03-06T17:15:22.943000 +CVE-2025-21831,1,1,02e7212ed4caf03d5b4e694a67d7e4c69f77a56f55cdaa5770166dd4f4d6bdd9,2025-03-06T17:15:23.060000 +CVE-2025-21832,1,1,e0629aa46decd0ab7966c3eb122fc42ab87700e1c595ae30430876b531e02ab0,2025-03-06T17:15:23.177000 +CVE-2025-21833,1,1,06865424bb811f3a4d3c7108ae185516bc9999aacbe2f3e2364847e7bebe4c01,2025-03-06T17:15:23.293000 +CVE-2025-21834,1,1,88b8e4410246a3f9f8e9a91872d4e127cbe716c34bcd9a96cadc63e87a32cb76,2025-03-06T17:15:23.397000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000 @@ -283726,7 +283752,7 @@ CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6 CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000 CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000 CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000 -CVE-2025-25362,0,1,42d98817ecbf18ddccabd4b792aadf3e08587d530c768960c95c682806a1813b,2025-03-06T15:15:17.277000 +CVE-2025-25362,0,0,42d98817ecbf18ddccabd4b792aadf3e08587d530c768960c95c682806a1813b,2025-03-06T15:15:17.277000 CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000 @@ -283736,9 +283762,9 @@ CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0ed CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000 CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 CVE-2025-25431,0,0,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000 -CVE-2025-25450,1,1,aa4833b6644c3dd5960a0ce2b32c1809568594c111878547965e7753c3a3e64d,2025-03-06T15:15:17.443000 -CVE-2025-25451,1,1,9a00d9588ff78fdad113f032ac06c8c05ea1e58a9277ce3535667ac0c4e0fc27,2025-03-06T15:15:17.553000 -CVE-2025-25452,1,1,7cbb267f940e24fd6826e8276f8a69f8095a90b9586be4c674267b8cf033d3b6,2025-03-06T15:15:17.667000 +CVE-2025-25450,0,0,aa4833b6644c3dd5960a0ce2b32c1809568594c111878547965e7753c3a3e64d,2025-03-06T15:15:17.443000 +CVE-2025-25451,0,0,9a00d9588ff78fdad113f032ac06c8c05ea1e58a9277ce3535667ac0c4e0fc27,2025-03-06T15:15:17.553000 +CVE-2025-25452,0,0,7cbb267f940e24fd6826e8276f8a69f8095a90b9586be4c674267b8cf033d3b6,2025-03-06T15:15:17.667000 CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000 CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000 CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000 @@ -283778,7 +283804,7 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 -CVE-2025-25632,0,1,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000 +CVE-2025-25632,0,0,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,ba7c6e4c7202e5cc51c3a3e35603315845cc8c4c900719372b556ce21832c21b,2025-03-05T21:15:19.980000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000 @@ -283823,14 +283849,14 @@ CVE-2025-25789,0,0,0f14c3f4531a98890710e1a14e26e29c794c8daab8f347fb89e415279f670 CVE-2025-25790,0,0,7f4ba42ac1fa0ded64af2d9c6fa1b05caa67d4b689df7ce81d6f0841ed6a91ca,2025-03-05T15:15:18.287000 CVE-2025-25791,0,0,8f427a5814c6955913fad1f85d24fb9e4344b742b4f09e2e17f073d51f11daaf,2025-03-03T18:15:40.030000 CVE-2025-25792,0,0,8ed8e898e77ccb511a21f5618850617bafb38b135aa1ceeb89c7273480778843,2025-03-03T21:15:18.863000 -CVE-2025-25793,0,0,98717c3b4b6e47ee955ffb5711c27dc13e1eae9c4a0dc0d8e895a7e87452c379,2025-02-26T15:15:27.367000 -CVE-2025-25794,0,0,840e75473343391737e0fadf999c877fd1cc5969682f29cbdbea6ef77281a08d,2025-02-26T15:15:27.490000 -CVE-2025-25796,0,0,006d6a42a9a7818b26ff6241ecbb7bd82307f51414857029ab2e6869e7b485e4,2025-02-26T15:15:27.620000 -CVE-2025-25797,0,0,3e09cec5d7b9ea6a46fe23480fd5f04462802a0d7961bd933a11792debf944b0,2025-02-26T15:15:27.743000 -CVE-2025-25799,0,0,86ded328c5a870afb5c08e55c199b1e60f378edae7fd31d2a0dd4d36b5493f74,2025-02-26T15:15:27.870000 +CVE-2025-25793,0,1,06fda905cb5d366b2dea7114751b25efc66045f1d1efc5dda933bb838933dcab,2025-03-06T18:15:41.480000 +CVE-2025-25794,0,1,0998585ca8b4d1c33b7e8f931090b2805dd26430daee7449f23e43ab4da36dc0,2025-03-06T18:15:41.883000 +CVE-2025-25796,0,1,55b92943226ba1df7d1079492bfa786eeb07d68abd2ff61cb507b6fe778a3f45,2025-03-06T18:15:42.103000 +CVE-2025-25797,0,1,f1c9d0289c48d14cd4761a88c42f5574d41d53f72261c5d690874bbdc19cbc26,2025-03-06T18:15:42.377000 +CVE-2025-25799,0,1,7e0e2b34e97de373b74e8a2a2d7160b9193cc9608515f6e42c488533a534cf1c,2025-03-06T18:15:42.587000 CVE-2025-25800,0,0,522fb65d58ed245411f19820e000d842e65fe1759af2fa4ffd4c03c8bb5f4592,2025-02-26T16:15:17.053000 -CVE-2025-25802,0,0,8203a907b733e39a56b3d605d1fe9c4a4172c043db07dde7f4be6b7fa6a69f66,2025-02-26T15:15:28.127000 -CVE-2025-25813,0,0,0d3675aeb7cf7fedde0d08c01c9ceb08309fdff7b32b3ab8adcd2ec8b434b303,2025-02-26T15:15:28.250000 +CVE-2025-25802,0,1,d97088e007851ab933ca944783447ce692cfbd40d40b16934f0a6aa482cb1db0,2025-03-06T18:15:42.800000 +CVE-2025-25813,0,1,29785da07b8f111218d1b9b58c66081665210db526a21defc9e5491fcec4ad0a,2025-03-06T18:15:43.027000 CVE-2025-25818,0,0,bb1057156f76c0ba13313437f2d9a42516b0d209ee43b6f684c1131ad31b9b9f,2025-03-03T17:15:15.230000 CVE-2025-25823,0,0,b4ac477f9ed173d267e81d0f4893b0290a15dbbbbe65cdc4bb9bf3c2ae71bff2,2025-02-26T15:15:28.497000 CVE-2025-25825,0,0,ce66997893510daddbe1bb264e5808f6942b14e7fc8599212cadc079ecb5ab46,2025-02-26T15:15:28.620000 @@ -284297,10 +284323,10 @@ CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17 CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000 CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000 CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000 -CVE-2025-27622,0,0,310bca8ff23eba1b3ce493d4d0521f4bc9812daf73d2ee1797237efc2bb8d766,2025-03-05T23:15:13.990000 -CVE-2025-27623,0,0,7c05f84ec655e4469c327806b5a2dc844dd4e25ea6cb8656ac5bd8dc2433e0fe,2025-03-05T23:15:14.097000 -CVE-2025-27624,0,0,784f00da354466bfbb658241e9fd63d59febd5884ce66f1059122dfbd45c76af,2025-03-05T23:15:14.197000 -CVE-2025-27625,0,0,6b0f20d9eea8e4d3c53a9f5ae84c939070a7fcfa9e570af3824fb586b7b5dbdf,2025-03-05T23:15:14.297000 +CVE-2025-27622,0,1,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000 +CVE-2025-27623,0,1,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000 +CVE-2025-27624,0,1,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000 +CVE-2025-27625,0,1,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000 CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000 CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000 CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000