diff --git a/CVE-2001/CVE-2001-08xx/CVE-2001-0830.json b/CVE-2001/CVE-2001-08xx/CVE-2001-0830.json
index 11bc954ce40..44542581e0a 100644
--- a/CVE-2001/CVE-2001-08xx/CVE-2001-0830.json
+++ b/CVE-2001/CVE-2001-08xx/CVE-2001-0830.json
@@ -2,8 +2,8 @@
"id": "CVE-2001-0830",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-12-06T05:00:00.000",
- "lastModified": "2017-10-10T01:29:53.627",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:52:21.457",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,6 +11,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-Other"
+ "value": "CWE-772"
}
]
}
@@ -58,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:pld:6tunnel:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:6tunnel_project:6tunnel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.08",
- "matchCriteriaId": "09817A67-3CC0-4014-9592-4C1592E7C17D"
+ "matchCriteriaId": "B58776F5-F89E-456E-8BBF-B081DD979C39"
}
]
}
@@ -70,19 +92,35 @@
"references": [
{
"url": "ftp://213.146.38.146/pub/wojtekka/6tunnel-0.09.tar.gz",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://marc.info/?l=bugtraq&m=100386451702966&w=2",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Mailing List"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/3467",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7337",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2003/CVE-2003-09xx/CVE-2003-0981.json b/CVE-2003/CVE-2003-09xx/CVE-2003-0981.json
index 3c9765c0a3c..a23a8c3f43c 100644
--- a/CVE-2003/CVE-2003-09xx/CVE-2003-0981.json
+++ b/CVE-2003/CVE-2003-09xx/CVE-2003-0981.json
@@ -2,8 +2,8 @@
"id": "CVE-2003-0981",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-01-05T05:00:00.000",
- "lastModified": "2016-10-18T02:38:47.473",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:53:22.383",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,6 +15,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-Other"
+ "value": "CWE-346"
}
]
}
@@ -62,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:freescripts:visitorbook:le:*:*:*:*:*:*:*",
- "matchCriteriaId": "C05BD42A-A99E-4683-A034-BE7CDBA4F289"
+ "criteria": "cpe:2.3:a:freescripts:visitorbook_le:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8641B1D-117C-4913-B66D-48D7768F18FE"
}
]
}
@@ -73,12 +95,16 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=107107840622493&w=2",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.westpoint.ltd.uk/advisories/wp-03-0001.txt",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Patch",
"Vendor Advisory"
]
diff --git a/CVE-2005/CVE-2005-20xx/CVE-2005-2088.json b/CVE-2005/CVE-2005-20xx/CVE-2005-2088.json
index ef03cdac921..31209d83f36 100644
--- a/CVE-2005/CVE-2005-20xx/CVE-2005-2088.json
+++ b/CVE-2005/CVE-2005-20xx/CVE-2005-2088.json
@@ -2,8 +2,8 @@
"id": "CVE-2005-2088",
"sourceIdentifier": "secalert@redhat.com",
"published": "2005-07-05T04:00:00.000",
- "lastModified": "2023-02-13T01:16:07.923",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:40:37.067",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -51,7 +51,7 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-noinfo"
+ "value": "CWE-444"
}
]
}
@@ -67,8 +67,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.35",
- "versionEndIncluding": "2.0.55",
- "matchCriteriaId": "514A6F28-6C2B-495E-9816-C06ADCE3539D"
+ "versionEndExcluding": "2.0.55",
+ "matchCriteriaId": "7B627099-D2E2-4E43-84B7-0C921FAD4156"
}
]
}
@@ -127,6 +127,69 @@
"Third Party Advisory"
]
},
+ {
+ "url": "http://secunia.com/advisories/14530",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/17319",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/17487",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/17813",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/19072",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/19073",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/19185",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/19317",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/23074",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
{
"url": "http://securityreason.com/securityalert/604",
"source": "secalert@redhat.com",
@@ -176,6 +239,7 @@
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=PK13959&apar=only",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory"
]
},
@@ -183,6 +247,7 @@
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory"
]
},
@@ -190,6 +255,7 @@
"url": "http://www.apache.org/dist/httpd/CHANGES_1.3",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Vendor Advisory"
]
},
@@ -197,6 +263,7 @@
"url": "http://www.apache.org/dist/httpd/CHANGES_2.0",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Vendor Advisory"
]
},
@@ -204,6 +271,7 @@
"url": "http://www.debian.org/security/2005/dsa-803",
"source": "secalert@redhat.com",
"tags": [
+ "Mailing List",
"Third Party Advisory"
]
},
@@ -211,6 +279,7 @@
"url": "http://www.debian.org/security/2005/dsa-805",
"source": "secalert@redhat.com",
"tags": [
+ "Mailing List",
"Third Party Advisory"
]
},
@@ -218,7 +287,7 @@
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:130",
"source": "secalert@redhat.com",
"tags": [
- "Broken Link"
+ "Third Party Advisory"
]
},
{
@@ -239,6 +308,7 @@
"url": "http://www.redhat.com/support/errata/RHSA-2005-582.html",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory"
]
},
@@ -254,6 +324,7 @@
"url": "http://www.securityfocus.com/archive/1/428138/100/0/threaded",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@@ -262,6 +333,7 @@
"url": "http://www.securityfocus.com/bid/14106",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@@ -270,6 +342,7 @@
"url": "http://www.securityfocus.com/bid/15647",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@@ -285,6 +358,7 @@
"url": "http://www.vupen.com/english/advisories/2005/2140",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Permissions Required"
]
},
@@ -292,6 +366,7 @@
"url": "http://www.vupen.com/english/advisories/2005/2659",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Permissions Required"
]
},
@@ -299,6 +374,7 @@
"url": "http://www.vupen.com/english/advisories/2006/0789",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Permissions Required"
]
},
@@ -306,6 +382,7 @@
"url": "http://www.vupen.com/english/advisories/2006/1018",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Permissions Required"
]
},
@@ -313,6 +390,7 @@
"url": "http://www.vupen.com/english/advisories/2006/4680",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Permissions Required"
]
},
@@ -332,56 +410,105 @@
},
{
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11452",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory"
]
},
@@ -389,6 +516,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1237",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory"
]
},
@@ -396,6 +524,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1526",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory"
]
},
@@ -403,6 +532,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1629",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory"
]
},
@@ -410,6 +540,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A840",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Third Party Advisory"
]
},
diff --git a/CVE-2005/CVE-2005-20xx/CVE-2005-2089.json b/CVE-2005/CVE-2005-20xx/CVE-2005-2089.json
index bdd420b7f44..d6817da18c5 100644
--- a/CVE-2005/CVE-2005-20xx/CVE-2005-2089.json
+++ b/CVE-2005/CVE-2005-20xx/CVE-2005-2089.json
@@ -2,8 +2,8 @@
"id": "CVE-2005-2089",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-07-05T04:00:00.000",
- "lastModified": "2018-10-30T16:25:10.357",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:29:29.420",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -44,7 +44,7 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-Other"
+ "value": "CWE-444"
}
]
}
@@ -58,13 +58,13 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "F7C954A7-FF84-4DEB-8728-5B207F374ECC"
+ "criteria": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "413C07EA-139F-4B7D-A58B-835BD2591FA0"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "413C07EA-139F-4B7D-A58B-835BD2591FA0"
+ "criteria": "cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9B4DF95D-B4B1-4FB6-9D27-A6D359EEACFA"
}
]
}
@@ -74,19 +74,33 @@
"references": [
{
"url": "http://seclists.org/lists/bugtraq/2005/Jun/0025.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.securiteam.com/securityreviews/5GP0220G0U.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42899",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json b/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json
index 94954c9cb05..a8af86b5d9e 100644
--- a/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json
+++ b/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json
@@ -2,8 +2,8 @@
"id": "CVE-2005-4206",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-13T11:03:00.000",
- "lastModified": "2017-07-20T01:29:12.003",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:28:08.810",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,6 +11,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-Other"
+ "value": "CWE-601"
}
]
}
@@ -58,13 +80,19 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:blackboard:blackboard_learning_and_community_post_systems:6.2.3.23:*:*:*:*:*:*:*",
- "matchCriteriaId": "3F3D9504-565E-4A64-AEAA-C226FB1B1B86"
+ "criteria": "cpe:2.3:a:blackboard:academic_suite:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "6.0.0.0",
+ "matchCriteriaId": "1E586786-3A7D-4F69-A800-A0D6B280E63A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:blackboard:blackboard_learning_and_community_post_systems:6.3.1.424:*:*:*:*:*:*:*",
- "matchCriteriaId": "397937CE-A799-452F-9079-7A026A4BD490"
+ "criteria": "cpe:2.3:a:blackboard:academic_suite:6.2.3.23:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51932C51-CCCC-419F-9655-C71B01D24336"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:blackboard:academic_suite:6.3.1.424:*:*:*:*:*:*:*",
+ "matchCriteriaId": "535D86A9-D28E-4356-AE5C-1018C1645942"
}
]
}
@@ -72,20 +100,46 @@
}
],
"references": [
+ {
+ "url": "http://secunia.com/advisories/17991",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Exploit",
+ "Vendor Advisory"
+ ]
+ },
{
"url": "http://www.ipomonis.com/advisories/Bb_6.zip",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
+ },
+ {
+ "url": "http://www.osvdb.org/21618",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/15814",
"source": "cve@mitre.org",
"tags": [
- "Exploit"
+ "Broken Link",
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23558",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2006/CVE-2006-62xx/CVE-2006-6276.json b/CVE-2006/CVE-2006-62xx/CVE-2006-6276.json
index 57f3a7cff04..00cf7b89709 100644
--- a/CVE-2006/CVE-2006-62xx/CVE-2006-6276.json
+++ b/CVE-2006/CVE-2006-62xx/CVE-2006-6276.json
@@ -2,8 +2,8 @@
"id": "CVE-2006-6276",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-12-04T11:28:00.000",
- "lastModified": "2017-07-29T01:29:26.530",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:34:42.803",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-Other"
+ "value": "CWE-444"
}
]
}
@@ -67,94 +67,19 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur1:enterprise:*:*:*:*:*",
- "matchCriteriaId": "2F40832C-EA2D-4AEF-9C98-36795D36BA06"
+ "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "721D0068-2664-4E92-9D96-9007F2120450"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur1:standard:*:*:*:*:*",
- "matchCriteriaId": "9F076EB9-CE31-456E-B7E9-B9F4C26CB0DC"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur2:enterprise:*:*:*:*:*",
- "matchCriteriaId": "7805CF93-C1EC-4698-95A6-CAB9C26EEAB9"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur2:standard:*:*:*:*:*",
- "matchCriteriaId": "951B75FF-9190-4AF7-BE9D-23C2114F71DC"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur3:enterprise:*:*:*:*:*",
- "matchCriteriaId": "D30859F7-97BE-4D6F-A9A8-EE12E8BC6201"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur3:standard:*:*:*:*:*",
- "matchCriteriaId": "D254F827-8A6C-496F-A6A0-667EF4F1D526"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:enterprise:*:*:*:*:*",
- "matchCriteriaId": "D9F68042-8C22-447E-8C6B-F44DEE5BF389"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:platform:*:*:*:*:*",
- "matchCriteriaId": "7659FD2B-6F83-44F1-B4A1-94D106B4C686"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:standard:*:*:*:*:*",
- "matchCriteriaId": "1379A19D-72CF-490C-871E-B67BA40547E6"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:ur1:platform:*:*:*:*:*",
- "matchCriteriaId": "E2A9B4B2-B844-411F-B4C7-9AC60C37A5A3"
+ "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9134A420-1A6E-48C0-A6CE-5AE555FC0D94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E"
},
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*",
- "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*",
- "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*",
- "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*",
- "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*",
- "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944"
- },
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
@@ -165,51 +90,6 @@
"criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8"
},
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "57DC2FBE-6556-4113-83BF-ABCAC70CBDE6"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "3DA512F0-B382-407E-B75D-5D2D15E185BB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*",
- "matchCriteriaId": "16727FF1-3CD7-4667-A2BA-2241A3AFEED3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*",
- "matchCriteriaId": "F60E165E-5B62-4D46-941D-E84603516D23"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*",
- "matchCriteriaId": "FF6BCC24-EADB-4EB8-9142-01D34C307C45"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*",
- "matchCriteriaId": "05017BA4-C9FC-4F7D-A5FE-9CE763CFE3E7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*",
- "matchCriteriaId": "DCC700F7-8675-441A-8AB7-CEFF84639E7F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*",
- "matchCriteriaId": "7BE04EB1-CDBD-4AA2-9513-826637F14771"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*",
- "matchCriteriaId": "EBD38B0A-EB9B-4556-B6DE-A7598ACC04AE"
- },
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
@@ -217,78 +97,8 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "85A181D1-C261-4C29-BC8C-A7A815A63E2E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "3A10F68F-4A2F-44A0-A039-1A34C6E2D083"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*",
- "matchCriteriaId": "021DC080-18ED-41F4-9FBD-1DD0C332F871"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*",
- "matchCriteriaId": "C878B2FD-88A1-44E2-9234-C40CA1DDC5BC"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*",
- "matchCriteriaId": "0F6B3BC6-9A4B-40E7-A540-9BCFC3D02E66"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*",
- "matchCriteriaId": "9760BDBA-E5FD-4AFF-ACB8-4C8B55CC3A61"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:update_3:*:*:*:*:*:*",
- "matchCriteriaId": "1A460F62-4594-447A-9D0B-9C1DBBDE9852"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*",
- "matchCriteriaId": "37553E5D-7B68-40C4-B970-FA0D02B7D3D9"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*",
- "matchCriteriaId": "3D089210-2135-4D41-92AD-51FB97AB343E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*",
- "matchCriteriaId": "C2C8EF3B-1A44-4D15-B2BE-FC970281760C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*",
- "matchCriteriaId": "E3597345-9D0B-492B-99BC-1C992EBF7CD5"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur6:platform:*:*:*:*:*",
- "matchCriteriaId": "2E93217B-0307-4E04-BD02-50AD5AD35072"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur6:standard:*:*:*:*:*",
- "matchCriteriaId": "B77E35C5-FF8B-4BB5-A12E-E9B6485E207A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur7:platform:*:*:*:*:*",
- "matchCriteriaId": "3F7BD264-7418-4A48-9B67-BB90A9566E7A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur7:standard:*:*:*:*:*",
- "matchCriteriaId": "11BB061E-ECF0-49F3-A3A8-378284A4F983"
+ "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56BB3993-C089-421F-987E-D6294E8C909E"
}
]
}
@@ -296,22 +106,45 @@
}
],
"references": [
+ {
+ "url": "http://secunia.com/advisories/23186",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
+ },
{
"url": "http://securitytracker.com/id?1017322",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://securitytracker.com/id?1017323",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://securitytracker.com/id?1017324",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Patch"
]
},
@@ -319,16 +152,26 @@
"url": "http://www.securityfocus.com/bid/21371",
"source": "cve@mitre.org",
"tags": [
- "Patch"
+ "Broken Link",
+ "Patch",
+ "Third Party Advisory",
+ "VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4793",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2007/CVE-2007-08xx/CVE-2007-0897.json b/CVE-2007/CVE-2007-08xx/CVE-2007-0897.json
index fa88fd75db1..05808a6a838 100644
--- a/CVE-2007/CVE-2007-08xx/CVE-2007-0897.json
+++ b/CVE-2007/CVE-2007-08xx/CVE-2007-0897.json
@@ -2,9 +2,9 @@
"id": "CVE-2007-0897",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-02-16T19:28:00.000",
- "lastModified": "2017-07-29T01:30:29.563",
- "vulnStatus": "Modified",
- "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nClam AntiVirus, ClamAV, 0.90 Stable",
+ "lastModified": "2024-02-09T02:48:50.797",
+ "vulnStatus": "Analyzed",
+ "evaluatorSolution": "This vulnerability is addressed in the following product release:\nClam AntiVirus, ClamAV, 0.90 Stable",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -49,7 +71,7 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-Other"
+ "value": "CWE-772"
}
]
}
@@ -63,291 +85,40 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.15",
- "matchCriteriaId": "E040C64A-273E-49FC-9B32-E25BE15D357A"
- },
+ "criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "0.90",
+ "matchCriteriaId": "EA546DD9-A29C-4D82-8E21-80619B2FF25B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.20",
- "matchCriteriaId": "F4DAF18C-D921-448C-9806-F7161B742E51"
- },
+ "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.4.11",
+ "matchCriteriaId": "B2D0444E-6B76-46EE-95EF-617F8967F6B6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.21",
- "matchCriteriaId": "09A48542-552D-45B6-9989-EBA02C16BAD7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.22",
- "matchCriteriaId": "7F5E3E9F-9F7F-4366-AF74-5DD79D500ADA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.23",
- "matchCriteriaId": "630D6FA9-DF36-4FFF-A894-282DBD3C6931"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.24",
- "matchCriteriaId": "C0CC9F29-854C-4B58-93B7-04FB5AFF4AF7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.51",
- "matchCriteriaId": "75501EBF-B78B-4160-B1FD-B8FF502BC860"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.52",
- "matchCriteriaId": "26AEB8E6-B3A9-48F6-AA7D-55FDB2B6DF8C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.53",
- "matchCriteriaId": "2D6117F8-A05B-42FA-B5CD-4646C0F755D6"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.54",
- "matchCriteriaId": "D40CD000-F4D6-48EA-8785-7C662DD4FB77"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.60",
- "matchCriteriaId": "2E370AEE-3D76-4DB3-B2EA-DE2F24A1D2B8"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.60p",
- "matchCriteriaId": "59FCC7A7-4AC9-4084-9684-E236FAEF4B3F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.65",
- "matchCriteriaId": "8848DF73-5C8F-4923-B6D5-103D3A4E45BB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.67",
- "matchCriteriaId": "AC26FE6A-DA82-4F10-A176-6EF719383232"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.68",
- "matchCriteriaId": "D9ECDDC6-88C6-42DE-BC4D-F1099957341E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.68.1",
- "matchCriteriaId": "4014C1FE-9659-4D87-BE25-82A28222CEE2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.70",
- "matchCriteriaId": "054DFC0C-996C-4ECD-8832-9E8C085B7C4D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.71",
- "matchCriteriaId": "CCEC1516-8A43-4010-903A-07DB582C18C6"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.72",
- "matchCriteriaId": "8582F6D3-EBD5-485B-8BB5-F91DDFC9C600"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.73",
- "matchCriteriaId": "09C15660-74FA-4AA0-929E-6291AE2B1297"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.74",
- "matchCriteriaId": "E68EB72E-EEDE-4231-B309-B6558956BC6C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.75",
- "matchCriteriaId": "BD05D78B-6F28-4068-88F7-96461D85236C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.75.1",
- "matchCriteriaId": "8278F2A2-8B1B-4FC2-BC66-C6EC87E9476D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.80",
- "matchCriteriaId": "F07C275E-16B0-4A2B-89A6-C68C68FCF67D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.80_rc1",
- "matchCriteriaId": "D0867DF1-4122-4E5C-8F72-FADB042DA14D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.80_rc2",
- "matchCriteriaId": "3CF31500-C66B-4FEC-90BE-30F7D0956929"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.80_rc3",
- "matchCriteriaId": "B721C0AE-AB73-4A9A-84CB-BECCD974CA99"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.80_rc4",
- "matchCriteriaId": "6638002E-716F-476A-9452-4C1B188CF59B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.81",
- "matchCriteriaId": "C596E6BB-7060-4BA7-B2BA-8E84FF6BF9A4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.81_rc1",
- "matchCriteriaId": "8943D346-7542-4DD4-82D0-B8CF1D0494B2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.82",
- "matchCriteriaId": "9E3A3962-54F7-48EC-8ABD-BAE8C8B4727E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.83",
- "matchCriteriaId": "C745EB7E-367A-4C2B-B206-3FEB4C33A97A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.84",
- "matchCriteriaId": "8B796948-15AD-4A30-8251-67444175A777"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.84_rc1",
- "matchCriteriaId": "4C64CF0B-91A9-4EF7-B089-0B3CA26B2EFD"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.84_rc2",
- "matchCriteriaId": "56ED080B-6E44-4B47-833F-25535FCEDA69"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.85",
- "matchCriteriaId": "7A0FB401-6282-4687-A8EC-EB3BE02C293D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.85.1",
- "matchCriteriaId": "2C0E3FE9-0B62-484E-A7CF-1CE0BBDE36AE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.86",
- "matchCriteriaId": "9391B98E-80A9-4C12-9EB8-F45A289FD9F1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.86.1",
- "matchCriteriaId": "184FC0BC-25CD-4804-9DFF-9309F991557D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.86.2",
- "matchCriteriaId": "AFDA61E7-4CE4-4FDD-8B1B-BFF6A934CDA2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.86_rc1",
- "matchCriteriaId": "18547613-F1A4-410C-A723-FC7BB8A270CC"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.87",
- "matchCriteriaId": "A5BF037B-141A-48AB-88A3-555836B160FF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.87.1",
- "matchCriteriaId": "D1873479-6058-472F-94AB-2601B2936812"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.88",
- "matchCriteriaId": "B498C911-81FC-4B1A-B9A4-5F266AA2B7CA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.88.1",
- "matchCriteriaId": "990BE50A-0B0B-44CC-BE51-CF69C900EE52"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.88.3",
- "matchCriteriaId": "E9B0DEE6-CA69-4020-AF96-8C6E5872ADF5"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.88.4",
- "matchCriteriaId": "8D7A91DF-84B4-4E45-8675-E107D8BCD070"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.88.6",
- "matchCriteriaId": "F8D97900-5AD1-43BF-860F-537D25A54C95"
+ "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"
}
]
}
@@ -357,57 +128,157 @@
"references": [
{
"url": "http://docs.info.apple.com/article.html?artnum=307562",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=475",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Feb/0004.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
+ },
+ {
+ "url": "http://osvdb.org/32283",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/24183",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/24187",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Patch",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/24192",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/24319",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/24332",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/24425",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/29420",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200703-03.xml",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.debian.org/security/2007/dsa-1263",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:043",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/22580",
"source": "cve@mitre.org",
"tags": [
- "Patch"
+ "Broken Link",
+ "Patch",
+ "Third Party Advisory",
+ "VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1017659",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.vupen.com/english/advisories/2007/0623",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0924/references",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32531",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2008/CVE-2008-01xx/CVE-2008-0166.json b/CVE-2008/CVE-2008-01xx/CVE-2008-0166.json
index 7c99129dd34..126e43f04aa 100644
--- a/CVE-2008/CVE-2008-01xx/CVE-2008-0166.json
+++ b/CVE-2008/CVE-2008-01xx/CVE-2008-0166.json
@@ -2,7 +2,7 @@
"id": "CVE-2008-0166",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-05-13T17:20:00.000",
- "lastModified": "2022-02-02T14:59:01.730",
+ "lastModified": "2024-02-09T02:45:16.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -22,6 +22,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -55,14 +77,13 @@
"description": [
{
"lang": "en",
- "value": "CWE-310"
+ "value": "CWE-338"
}
]
}
],
"configurations": [
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -70,52 +91,53 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:openssl:openssl:0.9.8c-1:*:*:*:*:*:*:*",
- "matchCriteriaId": "38238ECD-0581-47A0-B65E-9AA63A6C3148"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
- "matchCriteriaId": "766EA6F2-7FA4-4713-9859-9971CCD2FDCB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
- "matchCriteriaId": "EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
- "matchCriteriaId": "2BB38AEA-BAF0-4920-9A71-747C24444770"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
- "matchCriteriaId": "1F33EA2B-DE15-4695-A383-7A337AC38908"
+ "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "0.9.8c-1",
+ "versionEndIncluding": "0.9.8g",
+ "matchCriteriaId": "8EEFA1C8-85D4-425F-A987-29AC6D10C303"
}
]
- },
+ }
+ ]
+ },
+ {
+ "nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
- "vulnerable": false,
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
+ "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
+ },
+ {
+ "vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501"
},
{
- "vulnerable": false,
+ "vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
},
{
- "vulnerable": false,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
- "matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB"
- },
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
+ "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
- "vulnerable": false,
+ "vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
}
@@ -132,6 +154,54 @@
"Broken Link"
]
},
+ {
+ "url": "http://secunia.com/advisories/30136",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/30220",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/30221",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/30231",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/30239",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/30249",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
{
"url": "http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel",
"source": "cve@mitre.org",
@@ -143,6 +213,7 @@
"url": "http://www.debian.org/security/2008/dsa-1571",
"source": "cve@mitre.org",
"tags": [
+ "Mailing List",
"Patch",
"Vendor Advisory"
]
@@ -151,6 +222,7 @@
"url": "http://www.debian.org/security/2008/dsa-1576",
"source": "cve@mitre.org",
"tags": [
+ "Mailing List",
"Patch"
]
},
@@ -166,6 +238,7 @@
"url": "http://www.securityfocus.com/archive/1/492112/100/0/threaded",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@@ -174,6 +247,7 @@
"url": "http://www.securityfocus.com/bid/29179",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry"
@@ -183,6 +257,7 @@
"url": "http://www.securitytracker.com/id?1020017",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@@ -228,6 +303,7 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA08-137A.html",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Third Party Advisory",
"US Government Resource"
]
diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2052.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2052.json
index 3cab0956dd1..ed09bafbee3 100644
--- a/CVE-2008/CVE-2008-20xx/CVE-2008-2052.json
+++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2052.json
@@ -2,8 +2,8 @@
"id": "CVE-2008-2052",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-05-02T17:05:00.000",
- "lastModified": "2017-08-08T01:30:42.963",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:31:16.793",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,6 +15,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-59"
+ "value": "CWE-601"
}
]
}
@@ -62,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:bitrix:bitrix_site_manager:6.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "92DAD826-62C2-4880-AADE-F8B3FB0248F2"
+ "criteria": "cpe:2.3:a:bitrix24:bitrix_site_manager:6.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "339641BD-BEF4-4A84-B266-41BF09E63225"
}
]
}
@@ -73,11 +95,18 @@
"references": [
{
"url": "http://holisticinfosec.org/content/view/62/45/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42157",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2008/CVE-2008-21xx/CVE-2008-2122.json b/CVE-2008/CVE-2008-21xx/CVE-2008-2122.json
index 87ee49d6344..76c71407b09 100644
--- a/CVE-2008/CVE-2008-21xx/CVE-2008-2122.json
+++ b/CVE-2008/CVE-2008-21xx/CVE-2008-2122.json
@@ -2,8 +2,8 @@
"id": "CVE-2008-2122",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-05-09T15:20:00.000",
- "lastModified": "2017-08-08T01:30:47.057",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:54:11.277",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,6 +15,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-399"
+ "value": "CWE-772"
}
]
}
@@ -71,25 +93,53 @@
}
],
"references": [
+ {
+ "url": "http://secunia.com/advisories/30081",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
+ },
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21303877",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/29036",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.securitytracker.com/id?1019964",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1427/references",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42173",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2008/CVE-2008-29xx/CVE-2008-2951.json b/CVE-2008/CVE-2008-29xx/CVE-2008-2951.json
index 81a33254eac..9bdb7f5bf17 100644
--- a/CVE-2008/CVE-2008-29xx/CVE-2008-2951.json
+++ b/CVE-2008/CVE-2008-29xx/CVE-2008-2951.json
@@ -2,8 +2,8 @@
"id": "CVE-2008-2951",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-07-27T22:41:00.000",
- "lastModified": "2017-08-08T01:31:28.247",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:30:37.427",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,6 +15,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-601"
}
]
}
@@ -62,139 +84,29 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "0.10.4",
- "matchCriteriaId": "6AB0CAB5-F4B4-44AE-A527-A3A089279943"
+ "criteria": "cpe:2.3:a:edgewall:trac:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "0.10.5",
+ "matchCriteriaId": "C6C4CEF3-92F7-4344-9833-7CBCEF16E94F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "F0C99624-9190-42FF-BDE9-A7A5938EDECA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.5.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "04F968D4-9691-4ED1-A412-7DF43898863C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.5.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "1EE1121C-5E38-4811-A9BA-3122EF00941D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "AF9D8496-03C6-4C9E-9511-B32EE1AD6E91"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.6.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "FF4AC75E-2EE6-4333-9AA5-B26571CA86AB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "A370F182-C0BF-4E53-81B5-57E03974FA00"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.7.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "9C37AA14-7184-4FFC-BEDE-B567EE315E9F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "661C665F-A7F1-4631-B232-1DC9A2635E77"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.8.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "9710175D-AB7F-4416-9BD6-DD9BD9D0D322"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.8.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "3829D131-F1DB-426E-82C9-C39CBC1D8164"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.8.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "9410D67A-6338-4076-AF88-9DFAB701E1FF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.8.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "9239A5E2-62D4-4100-BA88-B114FE5944F0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "39206222-52BA-49B3-B2D8-1AFB247AA05F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9:b1:*:*:*:*:*:*",
- "matchCriteriaId": "BF8C0FF0-98FF-463F-B9F0-B26DC587CE05"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9:b2:*:*:*:*:*:*",
- "matchCriteriaId": "ED00A360-A4BD-44A9-BF88-A81257CF5E3C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "CEEE9CAF-6A17-4B68-988B-2EA0183FC45E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "CE0E4289-9154-4547-8DAA-51536706EFE7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "7836864F-1F39-479A-99D0-A00247711FB4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "14D2B12D-3479-435C-BF76-158C4152C548"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "E9AC7C92-2D82-470E-A04A-5C2B5AAA8CFA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.9.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "87EB909D-2F50-456E-9339-31617A9FC64E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "351C68FA-9A8E-4E65-BD8E-44F5BBDAFE8A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.10.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "76B67191-EBC8-4679-9434-9AF56E9151B7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.10.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "CA90857B-FA3A-4DD8-A20D-04837CCFFF77"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.10.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "3012B1CE-686F-4F0E-BCB2-790D7C30D257"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:trac:trac:0.10.3.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "F826915A-400C-4DC8-83A3-6EC158ACE0D0"
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140"
}
]
}
@@ -204,27 +116,63 @@
"references": [
{
"url": "http://holisticinfosec.org/content/view/72/45/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/31314",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
+ ]
},
{
"url": "http://trac.edgewall.org/wiki/ChangeLog",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "http://www.osvdb.org/46513",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/30402",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44043",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2011/CVE-2011-41xx/CVE-2011-4107.json b/CVE-2011/CVE-2011-41xx/CVE-2011-4107.json
index ceb2b97e02c..c68834ee7f6 100644
--- a/CVE-2011/CVE-2011-41xx/CVE-2011-4107.json
+++ b/CVE-2011/CVE-2011-41xx/CVE-2011-4107.json
@@ -2,8 +2,8 @@
"id": "CVE-2011-4107",
"sourceIdentifier": "secalert@redhat.com",
"published": "2011-11-17T19:55:01.517",
- "lastModified": "2017-08-29T01:30:27.397",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:27:11.997",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,6 +15,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-200"
+ "value": "CWE-611"
}
]
}
@@ -62,118 +84,57 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.5.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "3EE1361B-D70B-45B9-BD2F-7C049D96928A"
+ "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.3.0.0",
+ "versionEndExcluding": "3.3.10.5",
+ "matchCriteriaId": "07CC6931-2524-492E-9290-2388CD6435F9"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "06EE0CCB-559F-457B-A1EC-79D0680DCDD8"
+ "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.4.0.0",
+ "versionEndExcluding": "3.4.7.1",
+ "matchCriteriaId": "A872DC22-5EB5-4348-BEAD-61A59394AA51"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "00826A60-50A4-4E05-B317-8D0A5FC637BC"
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "7AC1AECC-6521-4D9D-88D5-86DA8BDB1D26"
- },
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
+ "matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "79093150-F515-42D9-AEF2-86C0C4B1B8AD"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "1FE65F49-CDED-49B0-89F4-CE52E357069A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "4B29D2E6-F327-4B19-B33F-E888F8B81E7B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "7C579327-8F92-41AF-926A-86442063A83D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "8C3F84C4-883B-48DC-9181-E54A87DC973B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "2C10C216-594B-4F08-B86E-A476A452189B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "E3E72232-C7D1-4D3E-97D1-5F3B89D447ED"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "3540439C-52FD-45A7-ABF4-E18C4AED89C4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "31E1CEF6-682E-4580-8A90-864173C4E4A5"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "2C714361-7AE3-4DC2-994C-7C67B41226B0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "2A3CED16-3ECE-49F6-A52B-0222B14DBC88"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "E4938BCE-1365-469A-B714-A5D9C451FA20"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "35F46942-E054-43E4-9543-E126738845E2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "A1A24EBE-D760-4251-972E-86B71EC8A07D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "9AC8F001-B2D6-49AD-94E7-673E8BEC958C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "AE9EFA08-1838-46A9-A851-A0540C60739D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "B231B0D4-F971-4D4F-97CE-74951DF2B681"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "35158ABE-56D7-499D-8268-D5452DE3E139"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "DD8C3CAC-7CE6-4D13-9640-B924081D628E"
+ "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
}
]
}
@@ -183,20 +144,40 @@
"references": [
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069625.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069635.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069649.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "http://osvdb.org/76798",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://packetstormsecurity.org/files/view/106511/phpmyadmin-fileread.txt",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Exploit"
]
},
@@ -204,28 +185,53 @@
"url": "http://seclists.org/fulldisclosure/2011/Nov/21",
"source": "secalert@redhat.com",
"tags": [
- "Exploit"
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/46447",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link",
+ "Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/8533",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.debian.org/security/2012/dsa-2391",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:198",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/11/03/3",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2011/11/03/5",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php",
@@ -237,12 +243,18 @@
},
{
"url": "http://www.securityfocus.com/bid/50497",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.wooyun.org/bugs/wooyun-2010-03185",
"source": "secalert@redhat.com",
"tags": [
+ "Broken Link",
"Exploit"
]
},
@@ -250,12 +262,17 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751112",
"source": "secalert@redhat.com",
"tags": [
- "Exploit"
+ "Exploit",
+ "Issue Tracking"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71108",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json
index bd3bf8b81d2..e0ea2d502a5 100644
--- a/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json
+++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-10180",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-01-30T04:59:00.360",
- "lastModified": "2021-04-23T18:45:19.730",
+ "lastModified": "2024-02-09T02:41:18.860",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-338"
+ "value": "CWE-335"
}
]
}
@@ -109,6 +109,7 @@
"url": "http://www.securityfocus.com/bid/95877",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Third Party Advisory",
"VDB Entry"
]
diff --git a/CVE-2021/CVE-2021-371xx/CVE-2021-37147.json b/CVE-2021/CVE-2021-371xx/CVE-2021-37147.json
index f89dd0fefa0..ad9bfaaf774 100644
--- a/CVE-2021/CVE-2021-371xx/CVE-2021-37147.json
+++ b/CVE-2021/CVE-2021-371xx/CVE-2021-37147.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-37147",
"sourceIdentifier": "security@apache.org",
"published": "2021-11-03T16:15:07.987",
- "lastModified": "2022-10-14T11:56:28.303",
+ "lastModified": "2024-02-09T02:28:42.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -71,6 +71,10 @@
{
"lang": "en",
"value": "CWE-20"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-444"
}
]
},
diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2820.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2820.json
index 04cd2cdee05..3e3e9f6b48a 100644
--- a/CVE-2022/CVE-2022-28xx/CVE-2022-2820.json
+++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2820.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-2820",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-08-15T11:21:31.687",
- "lastModified": "2023-07-10T16:15:48.020",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:29:58.530",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -103,8 +103,7 @@
"url": "https://github.com/namelessmc/nameless/commit/469bebc17855720e43f0c8209c88a57d2b55f6de",
"source": "security@huntr.dev",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
@@ -112,8 +111,7 @@
"source": "security@huntr.dev",
"tags": [
"Exploit",
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
}
]
diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3032.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3032.json
index 75652efcb0f..9d7fb40d93c 100644
--- a/CVE-2022/CVE-2022-30xx/CVE-2022-3032.json
+++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3032.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-3032",
"sourceIdentifier": "security@mozilla.org",
"published": "2022-12-22T20:15:37.763",
- "lastModified": "2023-01-03T20:25:26.860",
+ "lastModified": "2024-02-09T02:47:57.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "When receiving an HTML email that contained an iframe
element, which used a srcdoc
attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1."
+ },
+ {
+ "lang": "es",
+ "value": "Al recibir un correo electr\u00f3nico HTML que conten\u00eda un elemento iframe
, que utilizaba un atributo srcdoc
para definir el documento HTML interno, los objetos remotos especificados en el documento anidado, por ejemplo im\u00e1genes o v\u00eddeos , no fueron bloqueados. M\u00e1s bien, se acced\u00eda a la red, se cargaban los objetos y se mostraban. Esta vulnerabilidad afecta a Thunderbird < 102.2.1 y Thunderbird < 91.13.1."
}
],
"metrics": {
@@ -41,7 +45,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-863"
+ "value": "CWE-610"
}
]
}
@@ -76,9 +80,7 @@
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783831",
"source": "security@mozilla.org",
"tags": [
- "Issue Tracking",
- "Permissions Required",
- "Vendor Advisory"
+ "Permissions Required"
]
},
{
diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45918.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45918.json
index 4104823a704..f8adc6d24c1 100644
--- a/CVE-2022/CVE-2022-459xx/CVE-2022-45918.json
+++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45918.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-45918",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-07T01:15:11.677",
- "lastModified": "2023-01-06T20:37:46.383",
+ "lastModified": "2024-02-09T02:38:20.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ILIAS before 7.16 allows External Control of File Name or Path."
+ },
+ {
+ "lang": "es",
+ "value": "ILIAS anterior a 7.16 permite el control externo del nombre o ruta del archivo."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json
index 3eb8d12ac8f..2f954acef86 100644
--- a/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json
+++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25365",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T22:15:08.410",
- "lastModified": "2024-02-08T22:15:08.410",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json
index 77c66f7f58e..0e5a58aba20 100644
--- a/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json
+++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27001",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T22:15:08.463",
- "lastModified": "2024-02-08T22:15:08.463",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32341.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32341.json
new file mode 100644
index 00000000000..65859073925
--- /dev/null
+++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32341.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-32341",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-09T01:15:08.033",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 could allow an authenticated user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 255827."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/255827",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7116081",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json
index 409da84db46..62167803820 100644
--- a/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json
+++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-33046",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-02-06T06:15:58.807",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:11:34.037",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "product-security@qualcomm.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ },
+ {
+ "source": "product-security@qualcomm.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@@ -38,10 +58,1354 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C155F86-467F-4B57-950E-12FAAB570B01"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "71E06B94-9463-49A6-B816-E8A82BEA8545"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json
index 3f613cf52d0..a6b1d3ef767 100644
--- a/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json
+++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-33049",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-02-06T06:15:59.043",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:10:50.280",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -38,10 +38,2754 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-401"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E93E1D2-4546-4D60-B53D-20CF09551766"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3358AEB-CD49-4FF9-9410-7EDF0AAABB82"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ED45581-33EE-4D4C-B078-9D7DB6F2386A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json
index 9c874d7c7c7..e858421a0ab 100644
--- a/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json
+++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-33057",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-02-06T06:15:59.217",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:10:39.467",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -38,10 +38,2754 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E93E1D2-4546-4D60-B53D-20CF09551766"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3358AEB-CD49-4FF9-9410-7EDF0AAABB82"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ED45581-33EE-4D4C-B078-9D7DB6F2386A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json
index 69a2ad576a6..33ac6703f1a 100644
--- a/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json
+++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-33058",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-02-06T06:15:59.393",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:10:31.330",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "product-security@qualcomm.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "product-security@qualcomm.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
@@ -38,10 +58,1296 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json
index 92158cd5839..712fabab009 100644
--- a/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json
+++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-33060",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-02-06T06:15:59.613",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:09:39.027",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "product-security@qualcomm.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "product-security@qualcomm.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
@@ -38,10 +58,1296 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json
index 60c76a0fa9a..1c71df41970 100644
--- a/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json
+++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-33064",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-02-06T06:15:59.780",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:08:59.433",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -38,10 +38,2430 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6BD8A1C-D9AB-4BE7-A855-31E58631879C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11405993-5903-4716-B452-370281034B42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22B3AB46-81F4-4C45-AF66-C8B36A175685"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A8198E0-C95A-4433-9EC0-F544CAA90251"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B4837E0-EFF7-4546-918C-03551E03F6BD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79AFE82F-12C5-4B2E-9004-52F68C965F70"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B5CD77E-1AFD-4AB4-A752-7AAE195E6324"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin",
- "source": "product-security@qualcomm.com"
+ "source": "product-security@qualcomm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36498.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36498.json
index 2504f17b93e..b72a45b5eac 100644
--- a/CVE-2023/CVE-2023-364xx/CVE-2023-36498.json
+++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36498.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-36498",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-02-06T17:15:08.527",
- "lastModified": "2024-02-06T18:15:58.383",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:09:17.397",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n en la funcionalidad del cliente PPTP de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad y obtener acceso a un shell sin restricciones."
}
],
"metrics": {
@@ -46,10 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
+ "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1853",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40262.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40262.json
index 0844f76e03d..e3a787be299 100644
--- a/CVE-2023/CVE-2023-402xx/CVE-2023-40262.json
+++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40262.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40262",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.683",
- "lastModified": "2024-02-08T23:15:09.683",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40263.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40263.json
index b2546c722ce..ea26398ff4a 100644
--- a/CVE-2023/CVE-2023-402xx/CVE-2023-40263.json
+++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40263.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40263",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.730",
- "lastModified": "2024-02-08T23:15:09.730",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40264.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40264.json
index 9cfcbbf5f8e..b05fff25e37 100644
--- a/CVE-2023/CVE-2023-402xx/CVE-2023-40264.json
+++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40264.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40264",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.773",
- "lastModified": "2024-02-08T23:15:09.773",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40265.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40265.json
index 835183d16c0..9815780577f 100644
--- a/CVE-2023/CVE-2023-402xx/CVE-2023-40265.json
+++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40265.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40265",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T22:15:08.770",
- "lastModified": "2024-02-08T22:15:08.770",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40266.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40266.json
index 110a18319c3..8477d8287ed 100644
--- a/CVE-2023/CVE-2023-402xx/CVE-2023-40266.json
+++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40266.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40266",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T22:15:08.840",
- "lastModified": "2024-02-08T22:15:08.840",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42016.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42016.json
new file mode 100644
index 00000000000..a79948f57a4
--- /dev/null
+++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42016.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-42016",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-09T01:15:08.260",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 265559."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-614"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265559",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7116083",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42664.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42664.json
index e472189052b..fa611cd4a05 100644
--- a/CVE-2023/CVE-2023-426xx/CVE-2023-42664.json
+++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42664.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-42664",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-02-06T17:15:08.770",
- "lastModified": "2024-02-06T18:15:58.670",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:11:08.817",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A post authentication command injection vulnerability exists when setting up the PPTP global configuration of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n al configurar la configuraci\u00f3n global PPTP de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
@@ -46,10 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
+ "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1856",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43482.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43482.json
index bd9937b60d2..12bfd5eafc3 100644
--- a/CVE-2023/CVE-2023-434xx/CVE-2023-43482.json
+++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43482.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-43482",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-02-06T17:15:08.973",
- "lastModified": "2024-02-06T18:15:58.757",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:11:03.607",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A command execution vulnerability exists in the guest resource functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comandos en la funcionalidad de recursos invitados de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
@@ -46,10 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
+ "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1850",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45187.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45187.json
new file mode 100644
index 00000000000..2fa4d6b9898
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45187.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45187",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-09T01:15:08.493",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 268749."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-613"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268749",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7116045",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45190.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45190.json
new file mode 100644
index 00000000000..50568948db9
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45190.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-45190",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-09T01:15:08.707",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Engineering Lifecycle Optimization 7.0.2 and 7.0.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 268754."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268754",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7116045",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45191.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45191.json
new file mode 100644
index 00000000000..4be931528f3
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45191.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45191",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-09T01:15:08.890",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Engineering Lifecycle Optimization 7.0.2 and 7.0.3 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 268755."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-307"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268755",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7116045",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46683.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46683.json
index dcbe421bd56..cbbe80f5ba5 100644
--- a/CVE-2023/CVE-2023-466xx/CVE-2023-46683.json
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46683.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-46683",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-02-06T17:15:09.180",
- "lastModified": "2024-02-06T18:15:58.840",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:10:55.253",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A post authentication command injection vulnerability exists when configuring the wireguard VPN functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection . An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n al configurar la funcionalidad VPN de protecci\u00f3n de cables de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
@@ -46,10 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
+ "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1857",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47131.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47131.json
index 2804ce00f89..25cc1e3bd97 100644
--- a/CVE-2023/CVE-2023-471xx/CVE-2023-47131.json
+++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47131.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-47131",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.827",
- "lastModified": "2024-02-08T23:15:09.827",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json
index 33dd8bd1024..6c123608cf9 100644
--- a/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json
+++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-47132",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.877",
- "lastModified": "2024-02-08T23:15:09.877",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47167.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47167.json
index ef5d0d2a9aa..1ccde819d71 100644
--- a/CVE-2023/CVE-2023-471xx/CVE-2023-47167.json
+++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47167.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-47167",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-02-06T17:15:09.380",
- "lastModified": "2024-02-06T18:15:58.923",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:10:50.633",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A post authentication command injection vulnerability exists in the GRE policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n en la funcionalidad de pol\u00edtica GRE de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
@@ -46,10 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
+ "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1855",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47209.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47209.json
index f3ebbde70dd..4396f5a40d4 100644
--- a/CVE-2023/CVE-2023-472xx/CVE-2023-47209.json
+++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47209.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-47209",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-02-06T17:15:09.593",
- "lastModified": "2024-02-06T18:15:59.000",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:10:45.003",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A post authentication command injection vulnerability exists in the ipsec policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n en la funcionalidad de pol\u00edtica ipsec de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
@@ -46,10 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
+ "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1854",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47617.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47617.json
index 5e3306d19b2..8fab16efb1f 100644
--- a/CVE-2023/CVE-2023-476xx/CVE-2023-47617.json
+++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47617.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-47617",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-02-06T17:15:09.797",
- "lastModified": "2024-02-06T18:15:59.080",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:10:37.967",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A post authentication command injection vulnerability exists when configuring the web group member of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n al configurar el miembro del grupo web de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
@@ -46,10 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
+ "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1858",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47618.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47618.json
index 2038c2f9dfa..066e17313fc 100644
--- a/CVE-2023/CVE-2023-476xx/CVE-2023-47618.json
+++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47618.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-47618",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-02-06T17:15:10.013",
- "lastModified": "2024-02-06T18:15:59.160",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:10:33.477",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A post authentication command execution vulnerability exists in the web filtering functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comando posterior a la autenticaci\u00f3n en la funcionalidad de filtrado web de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
@@ -46,10 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
+ "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1859",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49101.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49101.json
index 9457ade0cfd..71164d0bc2c 100644
--- a/CVE-2023/CVE-2023-491xx/CVE-2023-49101.json
+++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49101.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49101",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T22:15:08.940",
- "lastModified": "2024-02-08T22:15:08.940",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50356.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50356.json
index 58514818d14..f05c7fbb9a8 100644
--- a/CVE-2023/CVE-2023-503xx/CVE-2023-50356.json
+++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50356.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-50356",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-01-31T11:15:07.910",
- "lastModified": "2024-01-31T14:05:19.990",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:00:50.277",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "info@cert.vde.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 4.2
+ },
+ {
+ "source": "info@cert.vde.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
@@ -50,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:areal-topkapi:vision_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.2.4719",
+ "matchCriteriaId": "8C7F4AB6-5E01-424E-8B2D-A6E5295231D5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.areal-topkapi.com/en/services/security-bulletins",
- "source": "info@cert.vde.com"
+ "source": "info@cert.vde.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51630.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51630.json
index 5963601dc6c..00644a728ea 100644
--- a/CVE-2023/CVE-2023-516xx/CVE-2023-51630.json
+++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51630.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-51630",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-02-08T23:15:09.933",
- "lastModified": "2024-02-08T23:15:09.933",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52425.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52425.json
index 11898db3e7c..2be01ec86fd 100644
--- a/CVE-2023/CVE-2023-524xx/CVE-2023-52425.json
+++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52425.json
@@ -2,19 +2,80 @@
"id": "CVE-2023-52425",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-04T20:15:46.063",
- "lastModified": "2024-02-05T02:09:37.420",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:03:16.300",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed."
+ },
+ {
+ "lang": "es",
+ "value": "libexpat hasta 2.5.0 permite una denegaci\u00f3n de servicio (consumo de recursos) porque se requieren muchos an\u00e1lisis completos en el caso de un token grande para el cual se necesitan m\u00faltiples rellenos de b\u00fafer."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.5.0",
+ "matchCriteriaId": "1C50909D-8A18-484B-A7DB-7EF4CA67C2CB"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/libexpat/libexpat/pull/789",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json
index 922fc6ac949..65f237f7c6f 100644
--- a/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json
+++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json
@@ -2,27 +2,94 @@
"id": "CVE-2023-52426",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-04T20:15:46.120",
- "lastModified": "2024-02-05T02:09:37.420",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:02:39.800",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time."
+ },
+ {
+ "lang": "es",
+ "value": "libexpat hasta 2.5.0 permite la expansi\u00f3n recursiva de entidades XML si XML_DTD no est\u00e1 definido en el momento de la compilaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-776"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.5.0",
+ "matchCriteriaId": "1C50909D-8A18-484B-A7DB-7EF4CA67C2CB"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/776.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Technical Description"
+ ]
},
{
"url": "https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/libexpat/libexpat/pull/777",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json
index 54ce538cb05..b582e8440b8 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-5992",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.147",
- "lastModified": "2024-01-31T14:28:47.077",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:00:00.933",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en OpenSC donde la eliminaci\u00f3n del relleno de cifrado PKCS#1 no se implementa como resistente al canal lateral. Este problema puede resultar en una posible filtraci\u00f3n de datos privados."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-203"
+ }
+ ]
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -46,18 +80,70 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "0.24.0",
+ "matchCriteriaId": "A3EB32A5-0147-4801-8E71-C881624EE6B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5992",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248685",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6028.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6028.json
index d5ba6648000..4ca6887c7c0 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6028.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6028.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-6028",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2024-02-05T18:15:51.670",
- "lastModified": "2024-02-05T18:25:55.213",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:07:12.437",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A reflected\ncross-site scripting (XSS) vulnerability exists in the SVG version of System\nDiagnostics Manager of B&R Automation Runtime versions <= G4.93 that\nenables a remote attacker to execute arbitrary JavaScript code in the context\nof the attacked user\u2019s browser session.\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de cross-site scripting (XSS) reflejada en la versi\u00f3n SVG de System Diagnostics Manager de B&R Automation Runtime versiones <= G4.93 que permite a un atacante remoto ejecutar c\u00f3digo JavaScript arbitrario en el contexto de la sesi\u00f3n del navegador del usuario atacado."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "cybersecurity@ch.abb.com",
"type": "Secondary",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "cybersecurity@ch.abb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,12 +68,43 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cybersecurity@ch.abb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:br-automation:automation_runtime:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "i4.93",
+ "matchCriteriaId": "884D020E-3583-4A39-A843-DB5977674E39"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://www.br-automation.com/fileadmin/SA23P018_SDM_Web_interface_vulnerable_to_XSS-1d75bee8.pdf",
- "source": "cybersecurity@ch.abb.com"
+ "source": "cybersecurity@ch.abb.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json
index 9f9bfb8f9c5..8848bb9b501 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6395",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-16T15:15:08.657",
- "lastModified": "2024-01-30T05:15:08.500",
+ "lastModified": "2024-02-09T02:15:08.047",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -180,6 +180,10 @@
"Patch"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SP2BJC2AFLFJJAEHPGZ3ZINTBTI7AN/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBFYREAJH4T7GXXQZ4GJEREN4Q3AHS3K/",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json
index 82664e9376e..c655289eb9e 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6779",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.700",
- "lastModified": "2024-02-04T09:15:10.377",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T00:59:49.720",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -50,38 +80,105 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.39",
+ "matchCriteriaId": "9B07E72A-FA10-49C2-BBE3-468AF836A462"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6779",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254395",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202402-01",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/01/30/6",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Exploit",
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json
index fe925c25655..42f2dc5e8bb 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6780",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.917",
- "lastModified": "2024-02-04T09:15:10.487",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T00:59:38.740",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -39,6 +59,20 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-131"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -50,38 +84,105 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.37",
+ "matchCriteriaId": "8CFD354C-94B0-4DF2-B943-780F99A0CF07"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6780",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254396",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202402-01",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/01/30/6",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Exploit",
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json
index a5f05f068ac..cd6714273ad 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6816",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-18T05:15:08.607",
- "lastModified": "2024-02-04T20:15:46.477",
+ "lastModified": "2024-02-09T02:15:08.207",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -246,6 +246,10 @@
"Mailing List"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://security.gentoo.org/glsa/202401-30",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7043.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7043.json
index 168d24a1163..b3735113135 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7043.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7043.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-7043",
"sourceIdentifier": "security@eset.com",
"published": "2024-01-31T13:15:10.147",
- "lastModified": "2024-01-31T14:05:19.990",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:00:15.637",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unquoted service path in ESET products allows to \n\ndrop a prepared program to a specific location\u00a0and\u00a0run on boot with the \n\nNT AUTHORITY\\NetworkService\u00a0permissions."
+ },
+ {
+ "lang": "es",
+ "value": "La ruta de servicio sin comillas en los productos ESET permite colocar un programa preparado en una ubicaci\u00f3n espec\u00edfica y ejecutarlo al arrancar con los permisos NT AUTHORITY\\NetworkService."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "security@eset.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-428"
+ }
+ ]
+ },
{
"source": "security@eset.com",
"type": "Secondary",
@@ -46,10 +80,65 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.1.2046.0",
+ "versionEndExcluding": "11.0.2032.0",
+ "matchCriteriaId": "50677A92-50F3-4020-BC55-B3C6FDB4511D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.1.2046.0",
+ "versionEndExcluding": "11.0.2032.0",
+ "matchCriteriaId": "74708E09-04BF-47C1-88A9-B2A0C0FCF3B7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.14.0",
+ "versionEndExcluding": "17.0.15.0",
+ "matchCriteriaId": "84EF91DD-15F6-4EF8-8B5F-C4CF4DBCBDF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eset:mail_security:10.1.10012.0:*:*:*:*:exchange_server:*:*",
+ "matchCriteriaId": "18A15279-74DB-487D-A585-BB07482505E8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.14.0",
+ "versionEndExcluding": "17.0.15.0",
+ "matchCriteriaId": "D18A8A98-430B-495B-AAD9-8198E995F77E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eset:smart_security_premium:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.14.0",
+ "versionEndExcluding": "17.0.15.0",
+ "matchCriteriaId": "555830F1-6B12-44F7-B912-9061E0EB6E46"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.eset.com/en/ca8602",
- "source": "security@eset.com"
+ "source": "security@eset.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json
index fe9a09a6f27..b6309f9a307 100644
--- a/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json
+++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-0408",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-18T16:15:08.380",
- "lastModified": "2024-01-31T13:15:10.350",
+ "lastModified": "2024-02-09T02:15:08.383",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -226,6 +226,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://security.gentoo.org/glsa/202401-30",
"source": "secalert@redhat.com"
diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json
index a5b6b13f6d5..a3dcdf83a5b 100644
--- a/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json
+++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-0409",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-18T16:15:08.593",
- "lastModified": "2024-01-31T13:15:10.460",
+ "lastModified": "2024-02-09T02:15:08.533",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -227,6 +227,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://security.gentoo.org/glsa/202401-30",
"source": "secalert@redhat.com"
diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0749.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0749.json
index 2bec633a721..b8f23e15c72 100644
--- a/CVE-2024/CVE-2024-07xx/CVE-2024-0749.json
+++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0749.json
@@ -2,12 +2,12 @@
"id": "CVE-2024-0749",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-01-23T14:15:38.550",
- "lastModified": "2024-02-02T17:18:54.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-09T02:15:08.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7."
+ "value": "A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7."
},
{
"lang": "es",
@@ -128,14 +128,6 @@
"Vendor Advisory"
]
},
- {
- "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/",
- "source": "security@mozilla.org",
- "tags": [
- "Release Notes",
- "Vendor Advisory"
- ]
- },
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-04/",
"source": "security@mozilla.org",
diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0914.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0914.json
index cf907a091d8..2a312eceba6 100644
--- a/CVE-2024/CVE-2024-09xx/CVE-2024-0914.json
+++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0914.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-0914",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T05:15:08.137",
- "lastModified": "2024-01-31T14:05:27.507",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:01:38.453",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-203"
+ }
+ ]
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -50,18 +80,66 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:opencryptoki_project:opencryptoki:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "3.23.0",
+ "matchCriteriaId": "9AE1F758-E210-415A-9834-97D4F3721348"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0914",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260407",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
},
{
"url": "https://people.redhat.com/~hkario/marvin/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json
index 3eec24ad9fc..8c206428b4a 100644
--- a/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json
+++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json
@@ -2,12 +2,16 @@
"id": "CVE-2024-1283",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-02-07T00:15:56.323",
- "lastModified": "2024-02-07T01:11:27.753",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:15:08.810",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Heap buffer overflow in Skia in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
+ },
+ {
+ "lang": "es",
+ "value": "El desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en Skia en Google Chrome anterior a 121.0.6167.160 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n el almacenamiento din\u00e1mico a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},
@@ -19,6 +23,10 @@
{
"url": "https://issues.chromium.org/issues/41494860",
"source": "chrome-cve-admin@google.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/",
+ "source": "chrome-cve-admin@google.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json
index cd7f3ed0cf2..f5e1d1b153e 100644
--- a/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json
+++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json
@@ -2,12 +2,16 @@
"id": "CVE-2024-1284",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-02-07T00:15:56.380",
- "lastModified": "2024-02-07T01:11:27.753",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:15:08.883",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Use after free in Mojo in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
+ },
+ {
+ "lang": "es",
+ "value": "Use after free en Mojo en Google Chrome anterior a 121.0.6167.160 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del almacenamiento din\u00e1mico a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"metrics": {},
@@ -19,6 +23,10 @@
{
"url": "https://issues.chromium.org/issues/41494539",
"source": "chrome-cve-admin@google.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/",
+ "source": "chrome-cve-admin@google.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1353.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1353.json
new file mode 100644
index 00000000000..8580ee82bff
--- /dev/null
+++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1353.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2024-1353",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2024-02-09T01:15:09.140",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability, which was classified as critical, has been found in PHPEMS up to 1.0. Affected by this issue is the function index of the file app/weixin/controller/index.api.php. The manipulation of the argument picurl leads to deserialization. The exploit has been disclosed to the public and may be used. VDB-253226 is the identifier assigned to this vulnerability."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
+ "accessVector": "ADJACENT_NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "NONE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 5.8
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 6.5,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://note.zhaoj.in/share/nxGzfEB6fFVY",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.253226",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.253226",
+ "source": "cna@vuldb.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20001.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20001.json
index 14ae4601546..9da764c25f0 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20001.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20001.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20001",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.027",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:02:13.153",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,378 @@
"value": "En TVAPI, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: DTV03961601; ID del problema: DTV03961601."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C394724-3294-4953-85C8-EE3894B5092C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E684A498-10F3-4BD8-9935-9ED5933F9157"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96BD96BE-10BC-4C7E-8A48-C7CB08A61765"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75A56009-090B-4101-B000-224412058654"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBFB4E04-7BC0-4B48-ABD7-6971E4725895"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "354492FD-4052-41F8-805E-55F387AF8F17"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EAAF66C-9C81-498B-A0C0-3295CB7324A9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "350ED16A-35A5-4F54-A01F-6EADE58E5530"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A6133E43-E032-4334-88C7-116B27B3090D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49437377-6D2F-40FD-8CCF-29179C19D296"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B45803F-1AD2-47C8-BB9B-276628A0D605"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B028E80F-396F-4898-841D-9E99DE54FAC2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FB0DB25-6CFF-4688-B423-6CC0252C3B59"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B250A0A-BE50-45B6-AD72-8EA876F64DD4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9C5A33A-7B04-4E14-A268-A717CD2420DA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85C42802-293E-448B-A059-DFDEF1D97EC2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F19E7E64-721E-436B-B879-D1EDE5EFF84C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49ED757E-42DD-4176-B216-915EFD8E2F40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "26696662-6232-458A-A1E1-067CBDB62FA9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BA3286D-A136-4EB2-A181-6EF8A556EFDF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A9F24C9-2A69-44D9-A16B-E4187230F984"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E92602E3-1B1B-4683-801D-D151919C63EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AF44498-001B-4A51-AB32-EBC206B14741"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2E6E130-9F65-482B-AF8B-97DA81FCE19E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FE404F4-FFAE-4646-9234-15230F0577F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF26725-1701-40F4-83E9-1A4709B60763"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C1C6E88C-46DD-45AB-88C1-B69FC0E25056"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "63BC3AE7-4180-4B8C-AB69-8AC4F502700D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB80E351-B6E5-4571-A603-04A3A6AFB8CB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD7AC916-FF8D-430D-837C-0587056198AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94F5F738-459C-4316-80AF-1B9C33E0F36B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "717AE700-78CC-4750-92CB-C9293571EC7D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json
index fb52675790f..d0780a1fc1a 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20002",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.083",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:01:37.090",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,378 @@
"value": "En TVAPI, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: DTV03961715; ID del problema: DTV03961715."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C394724-3294-4953-85C8-EE3894B5092C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E684A498-10F3-4BD8-9935-9ED5933F9157"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96BD96BE-10BC-4C7E-8A48-C7CB08A61765"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75A56009-090B-4101-B000-224412058654"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBFB4E04-7BC0-4B48-ABD7-6971E4725895"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "354492FD-4052-41F8-805E-55F387AF8F17"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EAAF66C-9C81-498B-A0C0-3295CB7324A9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "350ED16A-35A5-4F54-A01F-6EADE58E5530"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A6133E43-E032-4334-88C7-116B27B3090D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49437377-6D2F-40FD-8CCF-29179C19D296"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B45803F-1AD2-47C8-BB9B-276628A0D605"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B028E80F-396F-4898-841D-9E99DE54FAC2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FB0DB25-6CFF-4688-B423-6CC0252C3B59"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B250A0A-BE50-45B6-AD72-8EA876F64DD4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9C5A33A-7B04-4E14-A268-A717CD2420DA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85C42802-293E-448B-A059-DFDEF1D97EC2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F19E7E64-721E-436B-B879-D1EDE5EFF84C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49ED757E-42DD-4176-B216-915EFD8E2F40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "26696662-6232-458A-A1E1-067CBDB62FA9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BA3286D-A136-4EB2-A181-6EF8A556EFDF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A9F24C9-2A69-44D9-A16B-E4187230F984"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E92602E3-1B1B-4683-801D-D151919C63EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AF44498-001B-4A51-AB32-EBC206B14741"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2E6E130-9F65-482B-AF8B-97DA81FCE19E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FE404F4-FFAE-4646-9234-15230F0577F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF26725-1701-40F4-83E9-1A4709B60763"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C1C6E88C-46DD-45AB-88C1-B69FC0E25056"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "63BC3AE7-4180-4B8C-AB69-8AC4F502700D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB80E351-B6E5-4571-A603-04A3A6AFB8CB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD7AC916-FF8D-430D-837C-0587056198AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94F5F738-459C-4316-80AF-1B9C33E0F36B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "717AE700-78CC-4750-92CB-C9293571EC7D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json
index a0dcad4d12e..b2c18154832 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20003",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.130",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:01:04.183",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,173 @@
"value": "En Modem NL1, existe una posible falla del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio, si NW env\u00eda un mensaje de configuraci\u00f3n de conexi\u00f3n NR RRC no v\u00e1lido, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01191612; ID del problema: MOLY01191612 (MSV-981)."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json
index 6f5e9f741d2..cc4d10c7c89 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20004",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.190",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:04:19.843",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,173 @@
"value": "En Modem NL1, existe una posible falla del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio, si NW env\u00eda un mensaje de configuraci\u00f3n de conexi\u00f3n NR RRC no v\u00e1lido, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01191612; ID del problema: MOLY01195812 (MSV-985)."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json
index ce9ad91d3e9..0754b737f4f 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20006",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.233",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:04:52.490",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,113 @@
"value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08477148; ID del problema: ALPS08477148."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20007.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20007.json
index 5417341cad7..fa920d38101 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20007.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20007.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20007",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.283",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:05:10.947",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,252 @@
"value": "En el decodificador de mp3, existe una posible escritura fuera de los l\u00edmites debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08441369; ID del problema: ALPS08441369."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20009.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20009.json
index f2d7b438274..0b2ab717427 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20009.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20009.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20009",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.330",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:05:28.177",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,248 @@
"value": "En el decodificador alac, existe una posible escritura fuera de los l\u00edmites debido a un manejo incorrecto de errores. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08441150; ID del problema: ALPS08441150."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json
index 8e010f8c0ab..9bb1b938fc7 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20010",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.387",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:05:47.917",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,368 @@
"value": "En keyInstall, existe una posible escalada de privilegios debido a confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08358560; ID del problema: ALPS08358560."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-843"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20011.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20011.json
index 9f61d0e4d4c..700d5402c42 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20011.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20011.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20011",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.447",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:06:03.160",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,168 @@
"value": "En el decodificador alac, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08441146; ID del problema: ALPS08441146."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8127:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD7BDC63-3963-4C4D-B547-2936006926E9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8135:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "182A995C-2453-4DF2-ABCC-A885D8C334C0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8195z:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9B3A37B9-F500-4B3C-B77C-B2BD7B015154"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8312c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "39915BEC-73D4-46B7-B52C-CED910AF3CA9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8312d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3EF828C6-4B05-4E12-9B78-782F1F062F39"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20012.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20012.json
index 38eb4389ff3..5ff39add4c4 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20012.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20012.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20012",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.490",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:06:22.713",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,328 @@
"value": "En keyInstall, existe una posible escalada de privilegios debido a confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08358566; ID del problema: ALPS08358566."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-843"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20013.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20013.json
index 76646729cb2..1167edc0259 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20013.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20013.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20013",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.530",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:06:40.570",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,373 @@
"value": "En keyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08471742; ID del problema: ALPS08308608."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json
index bb2ba4286e2..ed75d96d593 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20015",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.580",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:06:59.953",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,278 @@
"value": "En telephony, existe una posible escalada de privilegios debido a una omisi\u00f3n de permisos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08441419; ID del problema: ALPS08441419."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json
index 29f918986df..91defe21dad 100644
--- a/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json
+++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20016",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-02-05T06:15:47.627",
- "lastModified": "2024-02-05T13:54:33.663",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:07:50.523",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,258 @@
"value": "En ged, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local con los privilegios de ejecuci\u00f3n de System necesarios. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS07835901; ID del problema: ALPS07835901."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/February-2024",
- "source": "security@mediatek.com"
+ "source": "security@mediatek.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20955.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20955.json
index 923a3379d7c..428effa41f3 100644
--- a/CVE-2024/CVE-2024-209xx/CVE-2024-20955.json
+++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20955.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-20955",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-01-16T22:15:42.647",
- "lastModified": "2024-01-26T22:15:11.647",
- "vulnStatus": "Modified",
+ "lastModified": "2024-02-09T02:26:25.517",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -57,6 +57,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:graalvm:20.3.12:*:*:*:enterprise:*:*:*",
+ "matchCriteriaId": "D17D1EA4-A45F-4D8D-BA3E-4898EC6D48B7"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:graalvm:21.3.8:*:*:*:enterprise:*:*:*",
@@ -69,13 +74,13 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:oracle:jdk:17.0.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "EF6AA431-8965-4B53-AF0F-DB3AB7A9A3F3"
+ "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C5055FD-0E19-4C42-9B1F-CBE222855156"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:oracle:jre:17.0.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "BF274813-F650-447C-A1A6-61D5F8FF71BA"
+ "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04738DE7-2BFE-4C06-ABE0-FCA099B5FFEC"
}
]
}
diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22236.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22236.json
index 368c41502ca..de5531dac4f 100644
--- a/CVE-2024/CVE-2024-222xx/CVE-2024-22236.json
+++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22236.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-22236",
"sourceIdentifier": "security@vmware.com",
"published": "2024-01-31T07:15:07.697",
- "lastModified": "2024-01-31T14:05:27.507",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:01:27.447",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "security@vmware.com",
"type": "Secondary",
@@ -38,10 +58,56 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:spring_cloud_contract:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.1.0",
+ "versionEndExcluding": "3.1.10",
+ "matchCriteriaId": "36CB4DBB-F5DB-4E5C-9D59-6499710BE4B4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:spring_cloud_contract:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.0.0",
+ "versionEndExcluding": "4.0.5",
+ "matchCriteriaId": "7634805F-40C1-4BCA-A83F-AED0D141CAD9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:spring_cloud_contract:4.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B852868-633D-4A85-A5A0-503C354F5D4A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://spring.io/security/cve-2024-22236",
- "source": "security@vmware.com"
+ "source": "security@vmware.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json
new file mode 100644
index 00000000000..24bccb5fe9f
--- /dev/null
+++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2024-22318",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-09T01:15:09.440",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279091",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7116091",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22332.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22332.json
new file mode 100644
index 00000000000..f85cedbccca
--- /dev/null
+++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22332.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2024-22332",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-09T01:15:09.650",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The IBM Integration Bus for z/OS 10.1 through 10.1.0.2 AdminAPI is vulnerable to a denial of service due to file system exhaustion. IBM X-Force ID: 279972."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279972",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://https://www.ibm.com/support/pages/node/7116046",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23170.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23170.json
index af7f5d6a9e8..a430e71b218 100644
--- a/CVE-2024/CVE-2024-231xx/CVE-2024-23170.json
+++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23170.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-23170",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-31T08:15:42.220",
- "lastModified": "2024-01-31T14:05:19.990",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:01:16.947",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,75 @@
"value": "Se descubri\u00f3 un problema en Mbed TLS 2.x anterior a 2.28.7 y 3.x anterior a 3.5.2. Hab\u00eda un canal lateral de sincronizaci\u00f3n en las operaciones privadas de RSA. Este canal lateral podr\u00eda ser suficiente para que un atacante local recupere el texto plano. Requiere que el atacante env\u00ede una gran cantidad de mensajes para descifrarlos, como se describe en \"Everlasting ROBOT: the Marvin Attack\" de Hubert Kario."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-203"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.28.7",
+ "matchCriteriaId": "E5465284-4EA3-4126-9130-374140F24FB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.0.0",
+ "versionEndExcluding": "3.5.2",
+ "matchCriteriaId": "7B335AD2-884E-4C89-8366-6BF91036BB1B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json
index 2481aface49..a3496fad261 100644
--- a/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json
+++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-23206",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:10.840",
- "lastModified": "2024-02-06T02:15:08.810",
+ "lastModified": "2024-02-09T02:15:08.950",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -161,6 +161,10 @@
"url": "http://www.openwall.com/lists/oss-security/2024/02/05/8",
"source": "product-security@apple.com"
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/",
+ "source": "product-security@apple.com"
+ },
{
"url": "https://support.apple.com/en-us/HT214055",
"source": "product-security@apple.com",
diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json
index 8d3ae6adf8e..329a1299fda 100644
--- a/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json
+++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-23213",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.183",
- "lastModified": "2024-02-06T02:15:08.903",
+ "lastModified": "2024-02-09T02:15:09.080",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -162,6 +162,10 @@
"url": "http://www.openwall.com/lists/oss-security/2024/02/05/8",
"source": "product-security@apple.com"
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/",
+ "source": "product-security@apple.com"
+ },
{
"url": "https://support.apple.com/en-us/HT214055",
"source": "product-security@apple.com",
diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json
index 0123dc25188..d40f5bfc96e 100644
--- a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json
+++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json
@@ -2,7 +2,7 @@
"id": "CVE-2024-23222",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.500",
- "lastModified": "2024-02-06T02:15:09.010",
+ "lastModified": "2024-02-09T02:15:09.197",
"vulnStatus": "Modified",
"cisaExploitAdd": "2024-01-23",
"cisaActionDue": "2024-02-13",
@@ -185,6 +185,10 @@
"url": "http://www.openwall.com/lists/oss-security/2024/02/05/8",
"source": "product-security@apple.com"
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/",
+ "source": "product-security@apple.com"
+ },
{
"url": "https://support.apple.com/en-us/HT214055",
"source": "product-security@apple.com",
diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23639.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23639.json
new file mode 100644
index 00000000000..a31c04886d3
--- /dev/null
+++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23639.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2024-23639",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2024-02-09T01:15:09.867",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Micronaut Framework is a modern, JVM-based, full stack Java framework designed for building modular, easily testable JVM applications with support for Java, Kotlin and the Groovy language. Enabled but unsecured management endpoints are susceptible to drive-by localhost attacks. While not typical of a production application, these attacks may have more impact on a development environment where such endpoints may be flipped on without much thought. A malicious/compromised website can make HTTP requests to `localhost`. Normally, such requests would trigger a CORS preflight check which would prevent the request; however, some requests are \"simple\" and do not require a preflight check. These endpoints, if enabled and not secured, are vulnerable to being triggered. Production environments typically disable unused endpoints and secure/restrict access to needed endpoints. A more likely victim is the developer in their local development host, who has enabled endpoints without security for the sake of easing development. This issue has been addressed in version 3.8.3. Users are advised to upgrade."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-15"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-610"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-664"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-583g-g682-crxf",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json
index b14970f1ba9..8a4781eb57b 100644
--- a/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json
+++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json
@@ -2,16 +2,40 @@
"id": "CVE-2024-23650",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-31T22:15:53.990",
- "lastModified": "2024-02-01T03:18:21.737",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:38:44.823",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic. The issue has been fixed in v0.12.5. As a workaround, avoid using BuildKit frontends from untrusted sources.\n"
+ },
+ {
+ "lang": "es",
+ "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Un cliente o interfaz de BuildKit malicioso podr\u00eda crear una solicitud que podr\u00eda provocar que el daemon BuildKit se bloquee en p\u00e1nico. El problema se solucion\u00f3 en v0.12.5. Como workaround, evite utilizar interfaces BuildKit de fuentes que no sean de confianza."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "0.12.5",
+ "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/moby/buildkit/pull/4601",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/moby/buildkit/releases/tag/v0.12.5",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/moby/buildkit/security/advisories/GHSA-9p26-698r-w4hx",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json
index 55b2a9b7921..e962e70933e 100644
--- a/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json
+++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json
@@ -2,16 +2,40 @@
"id": "CVE-2024-23651",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-31T22:15:54.183",
- "lastModified": "2024-02-01T03:18:21.737",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:43:51.767",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n"
+ },
+ {
+ "lang": "es",
+ "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Dos pasos de compilaci\u00f3n maliciosos que se ejecutan en paralelo y comparten los mismos montajes de cach\u00e9 con subrutas podr\u00edan causar una condici\u00f3n de ejecuci\u00f3n que puede hacer que los archivos del sistema host sean accesibles al contenedor de compilaci\u00f3n. El problema se solucion\u00f3 en v0.12.5. Los workarounds incluyen evitar el uso de la interfaz de BuildKit desde una fuente que no es de confianza o crear un Dockerfile que no sea de confianza que contenga montajes de cach\u00e9 con las opciones --mount=type=cache,source=...."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.2
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "0.12.5",
+ "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/moby/buildkit/pull/4604",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/moby/buildkit/releases/tag/v0.12.5",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json
index f4fd9a7256b..bf5553a44d4 100644
--- a/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json
+++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json
@@ -2,16 +2,40 @@
"id": "CVE-2024-23652",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-31T22:15:54.377",
- "lastModified": "2024-02-01T03:18:21.737",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:44:27.827",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature."
+ },
+ {
+ "lang": "es",
+ "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Una interfaz de BuildKit maliciosa o un Dockerfile que use RUN --mount podr\u00eda enga\u00f1ar a la funci\u00f3n que elimina archivos vac\u00edos creados para los puntos de montaje para que elimine un archivo fuera del contenedor, del sistema host. El problema se solucion\u00f3 en v0.12.5. Los workarounds incluyen evitar el uso de interfaces de BuildKit desde una fuente que no sea de confianza o crear un Dockerfile que no sea de confianza que contenga la funci\u00f3n RUN --mount."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "0.12.5",
+ "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/moby/buildkit/pull/4603",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/moby/buildkit/releases/tag/v0.12.5",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json
index d640bc29cb3..aa755b3ecb2 100644
--- a/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json
+++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json
@@ -2,16 +2,40 @@
"id": "CVE-2024-23653",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-31T22:15:54.600",
- "lastModified": "2024-02-01T03:18:21.737",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:44:46.710",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n"
+ },
+ {
+ "lang": "es",
+ "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Adem\u00e1s de ejecutar contenedores como pasos de compilaci\u00f3n, BuildKit tambi\u00e9n proporciona API para ejecutar contenedores interactivos basados en im\u00e1genes creadas. Era posible utilizar estas API para pedirle a BuildKit que ejecutara un contenedor con privilegios elevados. Normalmente, la ejecuci\u00f3n de dichos contenedores solo se permite si el derecho especial `security.insecure` est\u00e1 habilitado tanto por la configuraci\u00f3n de buildkitd como por el usuario que inicializa la solicitud de compilaci\u00f3n. El problema se solucion\u00f3 en v0.12.5. Evite el uso de interfaces BuildKit de fuentes no confiables."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "0.12.5",
+ "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/moby/buildkit/pull/4602",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/moby/buildkit/releases/tag/v0.12.5",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/moby/buildkit/security/advisories/GHSA-wr6v-9f75-vh2g",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23756.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23756.json
index 24651ec272e..08c04a89b3a 100644
--- a/CVE-2024/CVE-2024-237xx/CVE-2024-23756.json
+++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23756.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-23756",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T21:15:08.380",
- "lastModified": "2024-02-08T21:15:08.380",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23775.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23775.json
index 8383fb87a0d..77d165e7eab 100644
--- a/CVE-2024/CVE-2024-237xx/CVE-2024-23775.json
+++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23775.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-23775",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-31T08:15:42.267",
- "lastModified": "2024-01-31T14:05:19.990",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:00:58.837",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,75 @@
"value": "Vulnerabilidad de desbordamiento de enteros en Mbed TLS 2.x anterior a 2.28.7 y 3.x anterior a 3.5.2 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de mbedtls_x509_set_extension()."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.28.7",
+ "matchCriteriaId": "E5465284-4EA3-4126-9130-374140F24FB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.0.0",
+ "versionEndExcluding": "3.5.2",
+ "matchCriteriaId": "7B335AD2-884E-4C89-8366-6BF91036BB1B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23917.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23917.json
index 6366301d6eb..1abe540f534 100644
--- a/CVE-2024/CVE-2024-239xx/CVE-2024-23917.json
+++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23917.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-23917",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:09.280",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:05:22.180",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.11.3",
+ "matchCriteriaId": "8A42DE00-46DF-4A6D-A913-539C6054945B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
- "source": "cve@jetbrains.com"
+ "source": "cve@jetbrains.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24001.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24001.json
index 1a718ee5f02..9e5c2d55255 100644
--- a/CVE-2024/CVE-2024-240xx/CVE-2024-24001.json
+++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24001.json
@@ -2,23 +2,87 @@
"id": "CVE-2024-24001",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-07T00:15:56.443",
- "lastModified": "2024-02-07T01:11:27.753",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:10:25.807",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "jshERP v3.3 is vulnerable to SQL Injection. via the com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findallocationDetail() function of jshERP which allows an attacker to construct malicious payload to bypass jshERP's protection mechanism."
+ },
+ {
+ "lang": "es",
+ "value": "jshERP v3.3 es vulnerable a la inyecci\u00f3n SQL. a trav\u00e9s de la funci\u00f3n com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findallocationDetail() de jshERP que permite a un atacante construir un payload malicioso para evitar el mecanismo de protecci\u00f3n de jshERP."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A549663F-7809-4723-9F1F-251DB15E31CA"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24001.txt",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/jishenghua/jshERP/issues/99",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24002.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24002.json
index d5cdcd8acfe..c21fc4835f6 100644
--- a/CVE-2024/CVE-2024-240xx/CVE-2024-24002.json
+++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24002.json
@@ -2,23 +2,86 @@
"id": "CVE-2024-24002",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-07T00:15:56.503",
- "lastModified": "2024-02-07T01:11:27.753",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:10:13.973",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection."
+ },
+ {
+ "lang": "es",
+ "value": "jshERP v3.3 es vulnerable a la inyecci\u00f3n SQL. La funci\u00f3n com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() de jshERP no filtra los par\u00e1metros de `columna` y `orden` lo suficientemente bien, y un atacante puede construir un payload malicioso para eludir los de jshERP. Mecanismo de protecci\u00f3n en el m\u00e9todo `safeSqlParse` para inyecci\u00f3n SQL."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A549663F-7809-4723-9F1F-251DB15E31CA"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24002.txt",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/jishenghua/jshERP/issues/99",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json
index 0c73a056982..12bf9fe339c 100644
--- a/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json
+++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json
@@ -2,23 +2,87 @@
"id": "CVE-2024-24004",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-07T00:15:56.550",
- "lastModified": "2024-02-07T01:11:27.753",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T02:10:07.263",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutDetail() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection."
+ },
+ {
+ "lang": "es",
+ "value": "jshERP v3.3 es vulnerable a la inyecci\u00f3n SQL. La funci\u00f3n com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutDetail() de jshERP no filtra los par\u00e1metros de `columna` y `orden` lo suficientemente bien, y un atacante puede construir un payload malicioso para eludir los par\u00e1metros de jshERP Mecanismo de protecci\u00f3n en el m\u00e9todo `safeSqlParse` para inyecci\u00f3n SQL."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A549663F-7809-4723-9F1F-251DB15E31CA"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24004.txt",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/jishenghua/jshERP/issues/99",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24393.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24393.json
index 926776aabd5..2d982b8c861 100644
--- a/CVE-2024/CVE-2024-243xx/CVE-2024-24393.json
+++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24393.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24393",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T22:15:09.130",
- "lastModified": "2024-02-08T22:15:09.130",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24397.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24397.json
index f49567f750b..a96374a5b42 100644
--- a/CVE-2024/CVE-2024-243xx/CVE-2024-24397.json
+++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24397.json
@@ -2,27 +2,93 @@
"id": "CVE-2024-24397",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-05T16:15:55.493",
- "lastModified": "2024-02-05T18:25:55.213",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:06:54.700",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross Site Scripting en Stimulsoft GmbH Stimulsoft Dashboard.JS anterior a v.2024.1.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el campo ReportName."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:stimulsoft:dashboards:*:*:*:*:*:node.js:*:*",
+ "versionEndExcluding": "2024.1.2",
+ "matchCriteriaId": "D5824CDC-F493-4CC0-A3C4-C21B21F8527B"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "http://stimulsoft.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Permissions Required"
+ ]
},
{
"url": "https://cves.at/posts/cve-2024-24397/writeup/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24494.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24494.json
index 0886aec1c0c..17a054db7fb 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24494.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24494.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24494",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T21:15:08.437",
- "lastModified": "2024-02-08T21:15:08.437",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24495.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24495.json
index 51ad3f2feaa..0f346191d3d 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24495.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24495.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24495",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T21:15:08.490",
- "lastModified": "2024-02-08T21:15:08.490",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24496.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24496.json
index cf5ed8fffe2..506051af38c 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24496.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24496.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24496",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T21:15:08.537",
- "lastModified": "2024-02-08T21:15:08.537",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24497.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24497.json
index 5907667862a..9b8d9d0781a 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24497.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24497.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24497",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T21:15:08.590",
- "lastModified": "2024-02-08T21:15:08.590",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24498.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24498.json
index 6e84f570279..44793d9175a 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24498.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24498.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24498",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T21:15:08.640",
- "lastModified": "2024-02-08T21:15:08.640",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24499.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24499.json
index 7e5e9240de4..c09cd7632f7 100644
--- a/CVE-2024/CVE-2024-244xx/CVE-2024-24499.json
+++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24499.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24499",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T21:15:08.693",
- "lastModified": "2024-02-08T21:15:08.693",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:59.330",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24752.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24752.json
index dca46cbd31c..71117131afe 100644
--- a/CVE-2024/CVE-2024-247xx/CVE-2024-24752.json
+++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24752.json
@@ -2,16 +2,40 @@
"id": "CVE-2024-24752",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-01T16:17:14.487",
- "lastModified": "2024-02-01T21:30:44.493",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:45:17.263",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and for each which contains a file, it is extracted and saved in `/tmp` with a random filename starting with `bref_upload_`. The flow mimics what plain PHP does but it does not delete the temporary files when the request has been processed. An attacker could fill the Lambda instance disk by performing multiple MultiPart requests containing files. This vulnerability is patched in 2.1.13."
+ },
+ {
+ "lang": "es",
+ "value": "Bref habilita PHP sin servidor en AWS Lambda. Cuando se usa Bref con el tiempo de ejecuci\u00f3n de la funci\u00f3n controlada por eventos y el controlador es \"RequestHandlerInterface\", el evento Lambda se convierte en un objeto PSR7. Durante el proceso de conversi\u00f3n, si la solicitud es MultiPart, cada parte se analiza y, para cada una de las que contiene un archivo, se extrae y se guarda en `/tmp` con un nombre de archivo aleatorio que comienza con `bref_upload_`. El flujo imita lo que hace el PHP plano pero no elimina los archivos temporales cuando se procesa la solicitud. Un atacante podr\u00eda llenar el disco de la instancia de Lambda realizando m\u00faltiples solicitudes MultiPart que contengan archivos. Esta vulnerabilidad est\u00e1 parcheada en 2.1.13."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,14 +70,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.1.13",
+ "matchCriteriaId": "D8473D9F-5007-4ADC-B256-FD331BB522A0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/brefphp/bref/commit/350788de12880b6fd64c4c318ba995388bec840e",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24753.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24753.json
index ef88dc3a2ff..cdf8f068dc5 100644
--- a/CVE-2024/CVE-2024-247xx/CVE-2024-24753.json
+++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24753.json
@@ -2,16 +2,40 @@
"id": "CVE-2024-24753",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-01T16:17:14.690",
- "lastModified": "2024-02-01T21:30:44.493",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:46:12.560",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Bref enable serverless PHP on AWS Lambda. When Bref is used in combination with an API Gateway with the v2 format, it does not handle multiple values headers. If PHP generates a response with two headers having the same key but different values only the latest one is kept. If an application relies on multiple headers with the same key being set for security reasons, then Bref would lower the application security. For example, if an application sets multiple `Content-Security-Policy` headers, then Bref would just reflect the latest one. This vulnerability is patched in 2.1.13."
+ },
+ {
+ "lang": "es",
+ "value": "Bref habilita PHP sin servidor en AWS Lambda. Cuando Bref se usa en combinaci\u00f3n con una API Gateway con el formato v2, no maneja encabezados de valores m\u00faltiples. Si PHP genera una respuesta con dos encabezados que tienen la misma clave pero valores diferentes, solo se conserva el \u00faltimo. Si una aplicaci\u00f3n se basa en varios encabezados con la misma clave configurada por razones de seguridad, Bref reducir\u00eda la seguridad de la aplicaci\u00f3n. Por ejemplo, si una aplicaci\u00f3n establece varios encabezados \"Content-Security-Policy\", Bref solo reflejar\u00e1 el \u00faltimo. Esta vulnerabilidad est\u00e1 parcheada en 2.1.13."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,14 +70,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.1.13",
+ "matchCriteriaId": "D8473D9F-5007-4ADC-B256-FD331BB522A0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/brefphp/bref/commit/f834027aaf88b3885f4aa8edf6944ae920daf2dc",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/brefphp/bref/security/advisories/GHSA-99f9-gv72-fw9r",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24754.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24754.json
index 131551a703b..370c332b9b5 100644
--- a/CVE-2024/CVE-2024-247xx/CVE-2024-24754.json
+++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24754.json
@@ -2,16 +2,40 @@
"id": "CVE-2024-24754",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-01T16:17:14.877",
- "lastModified": "2024-02-01T21:30:44.493",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:56:35.890",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the `$files` or `$parsedBody` arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13."
+ },
+ {
+ "lang": "es",
+ "value": "Bref habilita PHP sin servidor en AWS Lambda. Cuando se usa Bref con el tiempo de ejecuci\u00f3n de la funci\u00f3n controlada por eventos y el controlador es \"RequestHandlerInterface\", el evento Lambda se convierte en un objeto PSR7. Durante el proceso de conversi\u00f3n, si la solicitud es MultiPart, cada parte se analiza y su contenido se agrega en las matrices `$files` o `$parsedBody`. El proceso de conversi\u00f3n produce un resultado diferente en comparaci\u00f3n con el de PHP simple cuando se utilizan claves que terminan en un corchete abierto ([). Seg\u00fan la l\u00f3gica de la aplicaci\u00f3n, la diferencia en el an\u00e1lisis del cuerpo podr\u00eda generar vulnerabilidades y/o comportamientos indefinidos. Esta vulnerabilidad est\u00e1 parcheada en 2.1.13."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,14 +70,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.1.13",
+ "matchCriteriaId": "D8473D9F-5007-4ADC-B256-FD331BB522A0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/brefphp/bref/commit/c77d9f5abf021f29fa96b5720b7b84adbd199092",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24819.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24819.json
new file mode 100644
index 00000000000..1eee36418ed
--- /dev/null
+++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24819.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2024-24819",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2024-02-09T01:15:10.080",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "icingaweb2-module-incubator is a working project of bleeding edge Icinga Web 2 libraries. In affected versions the class `gipfl\\Web\\Form` is the base for various concrete form implementations [1] and provides protection against cross site request forgery (CSRF) by default. This is done by automatically adding an element with a CSRF token to any form, unless explicitly disabled, but even if enabled, the CSRF token (sent during a client's submission of a form relying on it) is not validated. This enables attackers to perform changes on behalf of a user which, unknowingly, interacts with a prepared link or website. The version 0.22.0 is available to remedy this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.5,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Icinga/icingaweb2-module-incubator/commit/db7dc49585fee0b4e96be666d7f6009a74a1ccb5",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/Icinga/icingaweb2-module-incubator/security/advisories/GHSA-p8vv-9pqq-rm8p",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/search?q=gipfl%5CWeb%5CForm%3B&type=code",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24820.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24820.json
index 4826aec912f..646e9add8d3 100644
--- a/CVE-2024/CVE-2024-248xx/CVE-2024-24820.json
+++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24820.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24820",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T00:15:08.437",
- "lastModified": "2024-02-09T00:15:08.437",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24821.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24821.json
index 0254db0a7be..3a70a487019 100644
--- a/CVE-2024/CVE-2024-248xx/CVE-2024-24821.json
+++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24821.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24821",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T00:15:08.680",
- "lastModified": "2024-02-09T00:15:08.680",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24825.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24825.json
index 91a140a5d8e..e4125682e7d 100644
--- a/CVE-2024/CVE-2024-248xx/CVE-2024-24825.json
+++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24825.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24825",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T00:15:08.903",
- "lastModified": "2024-02-09T00:15:08.903",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24829.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24829.json
index 10a01541df5..53ee0a11f64 100644
--- a/CVE-2024/CVE-2024-248xx/CVE-2024-24829.json
+++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24829.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24829",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T00:15:09.117",
- "lastModified": "2024-02-09T00:15:09.117",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24830.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24830.json
index 9f8abc582b0..88aa181f95e 100644
--- a/CVE-2024/CVE-2024-248xx/CVE-2024-24830.json
+++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24830.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24830",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-08T23:15:10.153",
- "lastModified": "2024-02-08T23:15:10.153",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24936.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24936.json
index f08efd1dd05..2ca722008f6 100644
--- a/CVE-2024/CVE-2024-249xx/CVE-2024-24936.json
+++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24936.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24936",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:09.553",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:06:20.053",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.11.2",
+ "matchCriteriaId": "9BAFF38E-6AE3-4E05-9218-8A7C9A0AA66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
- "source": "cve@jetbrains.com"
+ "source": "cve@jetbrains.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24937.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24937.json
index 1444810c9a7..9ceef191bb9 100644
--- a/CVE-2024/CVE-2024-249xx/CVE-2024-24937.json
+++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24937.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24937",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:09.957",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:05:30.783",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.11.2",
+ "matchCriteriaId": "9BAFF38E-6AE3-4E05-9218-8A7C9A0AA66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
- "source": "cve@jetbrains.com"
+ "source": "cve@jetbrains.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json
index f99e02a2e51..c6d27d1ae3e 100644
--- a/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json
+++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24938",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:10.303",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:05:13.527",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.11.2",
+ "matchCriteriaId": "9BAFF38E-6AE3-4E05-9218-8A7C9A0AA66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
- "source": "cve@jetbrains.com"
+ "source": "cve@jetbrains.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24939.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24939.json
index 199fcb9a7eb..fdff17ce44a 100644
--- a/CVE-2024/CVE-2024-249xx/CVE-2024-24939.json
+++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24939.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24939",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:10.603",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:04:16.577",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.3.3",
+ "matchCriteriaId": "2F457E78-614D-4352-AA4C-3BA7CF826CC7"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
- "source": "cve@jetbrains.com"
+ "source": "cve@jetbrains.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24941.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24941.json
index 511fd871e7b..a18b062a819 100644
--- a/CVE-2024/CVE-2024-249xx/CVE-2024-24941.json
+++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24941.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24941",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:11.183",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:05:05.250",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.3.3",
+ "matchCriteriaId": "B6A738AA-5898-4BA9-BA67-E8647F7CDAED"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
- "source": "cve@jetbrains.com"
+ "source": "cve@jetbrains.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24942.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24942.json
index 7641c9d8baf..ad52384b8ac 100644
--- a/CVE-2024/CVE-2024-249xx/CVE-2024-24942.json
+++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24942.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24942",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:11.590",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:03:13.453",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.11.3",
+ "matchCriteriaId": "8A42DE00-46DF-4A6D-A913-539C6054945B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
- "source": "cve@jetbrains.com"
+ "source": "cve@jetbrains.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24943.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24943.json
index 97741337795..5d49430e2c1 100644
--- a/CVE-2024/CVE-2024-249xx/CVE-2024-24943.json
+++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24943.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-24943",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-02-06T10:15:11.837",
- "lastModified": "2024-02-06T13:53:38.513",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2024-02-09T01:03:03.970",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ },
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jetbrains:toolbox:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.2",
+ "matchCriteriaId": "BCC75999-D31F-4471-AD3F-F5439AC524AB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
- "source": "cve@jetbrains.com"
+ "source": "cve@jetbrains.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25106.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25106.json
index 93cddb55b81..3ad1f093f64 100644
--- a/CVE-2024/CVE-2024-251xx/CVE-2024-25106.json
+++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25106.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-25106",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-08T23:15:10.360",
- "lastModified": "2024-02-08T23:15:10.360",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25107.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25107.json
index 682d99ea3db..797e55da0b7 100644
--- a/CVE-2024/CVE-2024-251xx/CVE-2024-25107.json
+++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25107.json
@@ -2,8 +2,8 @@
"id": "CVE-2024-25107",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-08T23:15:10.583",
- "lastModified": "2024-02-08T23:15:10.583",
- "vulnStatus": "Received",
+ "lastModified": "2024-02-09T01:37:53.353",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/README.md b/README.md
index 4c2a6d1a08a..e1518dba4a8 100644
--- a/README.md
+++ b/README.md
@@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
-2024-02-09T00:55:15.040763+00:00
+2024-02-09T03:00:24.960458+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
-2024-02-09T00:52:17.807000+00:00
+2024-02-09T02:54:11.277000+00:00
```
### Last Data Feed Release
@@ -23,64 +23,60 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
-2024-02-08T01:00:28.263520+00:00
+2024-02-09T01:00:28.232666+00:00
```
### Total Number of included CVEs
```plain
-237993
+238003
```
### CVEs added in the last Commit
-Recently added CVEs: `14`
+Recently added CVEs: `10`
-* [CVE-2022-0931](CVE-2022/CVE-2022-09xx/CVE-2022-0931.json) (`2024-02-08T23:15:09.470`)
-* [CVE-2023-40262](CVE-2023/CVE-2023-402xx/CVE-2023-40262.json) (`2024-02-08T23:15:09.683`)
-* [CVE-2023-40263](CVE-2023/CVE-2023-402xx/CVE-2023-40263.json) (`2024-02-08T23:15:09.730`)
-* [CVE-2023-40264](CVE-2023/CVE-2023-402xx/CVE-2023-40264.json) (`2024-02-08T23:15:09.773`)
-* [CVE-2023-47131](CVE-2023/CVE-2023-471xx/CVE-2023-47131.json) (`2024-02-08T23:15:09.827`)
-* [CVE-2023-47132](CVE-2023/CVE-2023-471xx/CVE-2023-47132.json) (`2024-02-08T23:15:09.877`)
-* [CVE-2023-51630](CVE-2023/CVE-2023-516xx/CVE-2023-51630.json) (`2024-02-08T23:15:09.933`)
-* [CVE-2024-24830](CVE-2024/CVE-2024-248xx/CVE-2024-24830.json) (`2024-02-08T23:15:10.153`)
-* [CVE-2024-25106](CVE-2024/CVE-2024-251xx/CVE-2024-25106.json) (`2024-02-08T23:15:10.360`)
-* [CVE-2024-25107](CVE-2024/CVE-2024-251xx/CVE-2024-25107.json) (`2024-02-08T23:15:10.583`)
-* [CVE-2024-24820](CVE-2024/CVE-2024-248xx/CVE-2024-24820.json) (`2024-02-09T00:15:08.437`)
-* [CVE-2024-24821](CVE-2024/CVE-2024-248xx/CVE-2024-24821.json) (`2024-02-09T00:15:08.680`)
-* [CVE-2024-24825](CVE-2024/CVE-2024-248xx/CVE-2024-24825.json) (`2024-02-09T00:15:08.903`)
-* [CVE-2024-24829](CVE-2024/CVE-2024-248xx/CVE-2024-24829.json) (`2024-02-09T00:15:09.117`)
+* [CVE-2023-32341](CVE-2023/CVE-2023-323xx/CVE-2023-32341.json) (`2024-02-09T01:15:08.033`)
+* [CVE-2023-42016](CVE-2023/CVE-2023-420xx/CVE-2023-42016.json) (`2024-02-09T01:15:08.260`)
+* [CVE-2023-45187](CVE-2023/CVE-2023-451xx/CVE-2023-45187.json) (`2024-02-09T01:15:08.493`)
+* [CVE-2023-45190](CVE-2023/CVE-2023-451xx/CVE-2023-45190.json) (`2024-02-09T01:15:08.707`)
+* [CVE-2023-45191](CVE-2023/CVE-2023-451xx/CVE-2023-45191.json) (`2024-02-09T01:15:08.890`)
+* [CVE-2024-1353](CVE-2024/CVE-2024-13xx/CVE-2024-1353.json) (`2024-02-09T01:15:09.140`)
+* [CVE-2024-22318](CVE-2024/CVE-2024-223xx/CVE-2024-22318.json) (`2024-02-09T01:15:09.440`)
+* [CVE-2024-22332](CVE-2024/CVE-2024-223xx/CVE-2024-22332.json) (`2024-02-09T01:15:09.650`)
+* [CVE-2024-23639](CVE-2024/CVE-2024-236xx/CVE-2024-23639.json) (`2024-02-09T01:15:09.867`)
+* [CVE-2024-24819](CVE-2024/CVE-2024-248xx/CVE-2024-24819.json) (`2024-02-09T01:15:10.080`)
### CVEs modified in the last Commit
-Recently modified CVEs: `27`
+Recently modified CVEs: `112`
-* [CVE-2005-1036](CVE-2005/CVE-2005-10xx/CVE-2005-1036.json) (`2024-02-08T23:47:27.637`)
-* [CVE-2005-2456](CVE-2005/CVE-2005-24xx/CVE-2005-2456.json) (`2024-02-09T00:44:12.917`)
-* [CVE-2007-3749](CVE-2007/CVE-2007-37xx/CVE-2007-3749.json) (`2024-02-09T00:35:32.037`)
-* [CVE-2008-0081](CVE-2008/CVE-2008-00xx/CVE-2008-0081.json) (`2024-02-08T23:42:31.667`)
-* [CVE-2008-2934](CVE-2008/CVE-2008-29xx/CVE-2008-2934.json) (`2024-02-08T23:43:34.487`)
-* [CVE-2008-3688](CVE-2008/CVE-2008-36xx/CVE-2008-3688.json) (`2024-02-08T23:44:44.063`)
-* [CVE-2008-3475](CVE-2008/CVE-2008-34xx/CVE-2008-3475.json) (`2024-02-08T23:46:51.967`)
-* [CVE-2008-0063](CVE-2008/CVE-2008-00xx/CVE-2008-0063.json) (`2024-02-09T00:35:55.777`)
-* [CVE-2008-0062](CVE-2008/CVE-2008-00xx/CVE-2008-0062.json) (`2024-02-09T00:42:52.807`)
-* [CVE-2009-2692](CVE-2009/CVE-2009-26xx/CVE-2009-2692.json) (`2024-02-08T23:50:03.097`)
-* [CVE-2009-0949](CVE-2009/CVE-2009-09xx/CVE-2009-0949.json) (`2024-02-09T00:17:23.450`)
-* [CVE-2009-3620](CVE-2009/CVE-2009-36xx/CVE-2009-3620.json) (`2024-02-09T00:20:34.557`)
-* [CVE-2009-2523](CVE-2009/CVE-2009-25xx/CVE-2009-2523.json) (`2024-02-09T00:24:53.217`)
-* [CVE-2009-0935](CVE-2009/CVE-2009-09xx/CVE-2009-0935.json) (`2024-02-09T00:39:40.193`)
-* [CVE-2019-9805](CVE-2019/CVE-2019-98xx/CVE-2019-9805.json) (`2024-02-08T23:43:00.703`)
-* [CVE-2020-20739](CVE-2020/CVE-2020-207xx/CVE-2020-20739.json) (`2024-02-08T23:50:31.537`)
-* [CVE-2021-1782](CVE-2021/CVE-2021-17xx/CVE-2021-1782.json) (`2024-02-09T00:41:25.647`)
-* [CVE-2022-36349](CVE-2022/CVE-2022-363xx/CVE-2022-36349.json) (`2024-02-09T00:12:08.327`)
-* [CVE-2023-40087](CVE-2023/CVE-2023-400xx/CVE-2023-40087.json) (`2024-02-09T00:23:21.477`)
-* [CVE-2023-40084](CVE-2023/CVE-2023-400xx/CVE-2023-40084.json) (`2024-02-09T00:24:31.993`)
-* [CVE-2023-43513](CVE-2023/CVE-2023-435xx/CVE-2023-43513.json) (`2024-02-09T00:49:48.173`)
-* [CVE-2023-43516](CVE-2023/CVE-2023-435xx/CVE-2023-43516.json) (`2024-02-09T00:50:24.280`)
-* [CVE-2023-43517](CVE-2023/CVE-2023-435xx/CVE-2023-43517.json) (`2024-02-09T00:51:20.140`)
-* [CVE-2023-43518](CVE-2023/CVE-2023-435xx/CVE-2023-43518.json) (`2024-02-09T00:51:42.733`)
-* [CVE-2023-43523](CVE-2023/CVE-2023-435xx/CVE-2023-43523.json) (`2024-02-09T00:52:17.807`)
+* [CVE-2024-20003](CVE-2024/CVE-2024-200xx/CVE-2024-20003.json) (`2024-02-09T02:01:04.183`)
+* [CVE-2024-20002](CVE-2024/CVE-2024-200xx/CVE-2024-20002.json) (`2024-02-09T02:01:37.090`)
+* [CVE-2024-20001](CVE-2024/CVE-2024-200xx/CVE-2024-20001.json) (`2024-02-09T02:02:13.153`)
+* [CVE-2024-20004](CVE-2024/CVE-2024-200xx/CVE-2024-20004.json) (`2024-02-09T02:04:19.843`)
+* [CVE-2024-20006](CVE-2024/CVE-2024-200xx/CVE-2024-20006.json) (`2024-02-09T02:04:52.490`)
+* [CVE-2024-20007](CVE-2024/CVE-2024-200xx/CVE-2024-20007.json) (`2024-02-09T02:05:10.947`)
+* [CVE-2024-20009](CVE-2024/CVE-2024-200xx/CVE-2024-20009.json) (`2024-02-09T02:05:28.177`)
+* [CVE-2024-20010](CVE-2024/CVE-2024-200xx/CVE-2024-20010.json) (`2024-02-09T02:05:47.917`)
+* [CVE-2024-20011](CVE-2024/CVE-2024-200xx/CVE-2024-20011.json) (`2024-02-09T02:06:03.160`)
+* [CVE-2024-20012](CVE-2024/CVE-2024-200xx/CVE-2024-20012.json) (`2024-02-09T02:06:22.713`)
+* [CVE-2024-20013](CVE-2024/CVE-2024-200xx/CVE-2024-20013.json) (`2024-02-09T02:06:40.570`)
+* [CVE-2024-20015](CVE-2024/CVE-2024-200xx/CVE-2024-20015.json) (`2024-02-09T02:06:59.953`)
+* [CVE-2024-20016](CVE-2024/CVE-2024-200xx/CVE-2024-20016.json) (`2024-02-09T02:07:50.523`)
+* [CVE-2024-24004](CVE-2024/CVE-2024-240xx/CVE-2024-24004.json) (`2024-02-09T02:10:07.263`)
+* [CVE-2024-24002](CVE-2024/CVE-2024-240xx/CVE-2024-24002.json) (`2024-02-09T02:10:13.973`)
+* [CVE-2024-24001](CVE-2024/CVE-2024-240xx/CVE-2024-24001.json) (`2024-02-09T02:10:25.807`)
+* [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-02-09T02:15:08.383`)
+* [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-02-09T02:15:08.533`)
+* [CVE-2024-0749](CVE-2024/CVE-2024-07xx/CVE-2024-0749.json) (`2024-02-09T02:15:08.690`)
+* [CVE-2024-1283](CVE-2024/CVE-2024-12xx/CVE-2024-1283.json) (`2024-02-09T02:15:08.810`)
+* [CVE-2024-1284](CVE-2024/CVE-2024-12xx/CVE-2024-1284.json) (`2024-02-09T02:15:08.883`)
+* [CVE-2024-23206](CVE-2024/CVE-2024-232xx/CVE-2024-23206.json) (`2024-02-09T02:15:08.950`)
+* [CVE-2024-23213](CVE-2024/CVE-2024-232xx/CVE-2024-23213.json) (`2024-02-09T02:15:09.080`)
+* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-09T02:15:09.197`)
+* [CVE-2024-20955](CVE-2024/CVE-2024-209xx/CVE-2024-20955.json) (`2024-02-09T02:26:25.517`)
## Download and Usage