From 2a2f2898fd4902a63b55c3e4da01aa9600cf75ff Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 9 Feb 2024 03:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-02-09T03:00:24.960458+00:00 --- CVE-2001/CVE-2001-08xx/CVE-2001-0830.json | 56 +- CVE-2003/CVE-2003-09xx/CVE-2003-0981.json | 38 +- CVE-2005/CVE-2005-20xx/CVE-2005-2088.json | 167 +- CVE-2005/CVE-2005-20xx/CVE-2005-2089.json | 36 +- CVE-2005/CVE-2005-42xx/CVE-2005-4206.json | 74 +- CVE-2006/CVE-2006-62xx/CVE-2006-6276.json | 253 +- CVE-2007/CVE-2007-08xx/CVE-2007-0897.json | 463 ++-- CVE-2008/CVE-2008-01xx/CVE-2008-0166.json | 142 +- CVE-2008/CVE-2008-20xx/CVE-2008-2052.json | 43 +- CVE-2008/CVE-2008-21xx/CVE-2008-2122.json | 66 +- CVE-2008/CVE-2008-29xx/CVE-2008-2951.json | 226 +- CVE-2011/CVE-2011-41xx/CVE-2011-4107.json | 249 +- CVE-2016/CVE-2016-101xx/CVE-2016-10180.json | 5 +- CVE-2021/CVE-2021-371xx/CVE-2021-37147.json | 6 +- CVE-2022/CVE-2022-28xx/CVE-2022-2820.json | 10 +- CVE-2022/CVE-2022-30xx/CVE-2022-3032.json | 12 +- CVE-2022/CVE-2022-459xx/CVE-2022-45918.json | 6 +- CVE-2023/CVE-2023-253xx/CVE-2023-25365.json | 4 +- CVE-2023/CVE-2023-270xx/CVE-2023-27001.json | 4 +- CVE-2023/CVE-2023-323xx/CVE-2023-32341.json | 59 + CVE-2023/CVE-2023-330xx/CVE-2023-33046.json | 1372 ++++++++- CVE-2023/CVE-2023-330xx/CVE-2023-33049.json | 2750 ++++++++++++++++++- CVE-2023/CVE-2023-330xx/CVE-2023-33057.json | 2750 ++++++++++++++++++- CVE-2023/CVE-2023-330xx/CVE-2023-33058.json | 1314 ++++++++- CVE-2023/CVE-2023-330xx/CVE-2023-33060.json | 1314 ++++++++- CVE-2023/CVE-2023-330xx/CVE-2023-33064.json | 2426 +++++++++++++++- CVE-2023/CVE-2023-364xx/CVE-2023-36498.json | 44 +- CVE-2023/CVE-2023-402xx/CVE-2023-40262.json | 4 +- CVE-2023/CVE-2023-402xx/CVE-2023-40263.json | 4 +- CVE-2023/CVE-2023-402xx/CVE-2023-40264.json | 4 +- CVE-2023/CVE-2023-402xx/CVE-2023-40265.json | 4 +- CVE-2023/CVE-2023-402xx/CVE-2023-40266.json | 4 +- CVE-2023/CVE-2023-420xx/CVE-2023-42016.json | 59 + CVE-2023/CVE-2023-426xx/CVE-2023-42664.json | 44 +- CVE-2023/CVE-2023-434xx/CVE-2023-43482.json | 44 +- CVE-2023/CVE-2023-451xx/CVE-2023-45187.json | 59 + CVE-2023/CVE-2023-451xx/CVE-2023-45190.json | 47 + CVE-2023/CVE-2023-451xx/CVE-2023-45191.json | 59 + CVE-2023/CVE-2023-466xx/CVE-2023-46683.json | 44 +- CVE-2023/CVE-2023-471xx/CVE-2023-47131.json | 4 +- CVE-2023/CVE-2023-471xx/CVE-2023-47132.json | 4 +- CVE-2023/CVE-2023-471xx/CVE-2023-47167.json | 44 +- CVE-2023/CVE-2023-472xx/CVE-2023-47209.json | 44 +- CVE-2023/CVE-2023-476xx/CVE-2023-47617.json | 44 +- CVE-2023/CVE-2023-476xx/CVE-2023-47618.json | 44 +- CVE-2023/CVE-2023-491xx/CVE-2023-49101.json | 4 +- CVE-2023/CVE-2023-503xx/CVE-2023-50356.json | 49 +- CVE-2023/CVE-2023-516xx/CVE-2023-51630.json | 4 +- CVE-2023/CVE-2023-524xx/CVE-2023-52425.json | 69 +- CVE-2023/CVE-2023-524xx/CVE-2023-52426.json | 79 +- CVE-2023/CVE-2023-59xx/CVE-2023-5992.json | 96 +- CVE-2023/CVE-2023-60xx/CVE-2023-6028.json | 63 +- CVE-2023/CVE-2023-63xx/CVE-2023-6395.json | 6 +- CVE-2023/CVE-2023-67xx/CVE-2023-6779.json | 117 +- CVE-2023/CVE-2023-67xx/CVE-2023-6780.json | 121 +- CVE-2023/CVE-2023-68xx/CVE-2023-6816.json | 6 +- CVE-2023/CVE-2023-70xx/CVE-2023-7043.json | 95 +- CVE-2024/CVE-2024-04xx/CVE-2024-0408.json | 6 +- CVE-2024/CVE-2024-04xx/CVE-2024-0409.json | 6 +- CVE-2024/CVE-2024-07xx/CVE-2024-0749.json | 14 +- CVE-2024/CVE-2024-09xx/CVE-2024-0914.json | 88 +- CVE-2024/CVE-2024-12xx/CVE-2024-1283.json | 12 +- CVE-2024/CVE-2024-12xx/CVE-2024-1284.json | 12 +- CVE-2024/CVE-2024-13xx/CVE-2024-1353.json | 88 + CVE-2024/CVE-2024-200xx/CVE-2024-20001.json | 375 ++- CVE-2024/CVE-2024-200xx/CVE-2024-20002.json | 375 ++- CVE-2024/CVE-2024-200xx/CVE-2024-20003.json | 170 +- CVE-2024/CVE-2024-200xx/CVE-2024-20004.json | 170 +- CVE-2024/CVE-2024-200xx/CVE-2024-20006.json | 110 +- CVE-2024/CVE-2024-200xx/CVE-2024-20007.json | 249 +- CVE-2024/CVE-2024-200xx/CVE-2024-20009.json | 245 +- CVE-2024/CVE-2024-200xx/CVE-2024-20010.json | 365 ++- CVE-2024/CVE-2024-200xx/CVE-2024-20011.json | 165 +- CVE-2024/CVE-2024-200xx/CVE-2024-20012.json | 325 ++- CVE-2024/CVE-2024-200xx/CVE-2024-20013.json | 370 ++- CVE-2024/CVE-2024-200xx/CVE-2024-20015.json | 275 +- CVE-2024/CVE-2024-200xx/CVE-2024-20016.json | 255 +- CVE-2024/CVE-2024-209xx/CVE-2024-20955.json | 17 +- CVE-2024/CVE-2024-222xx/CVE-2024-22236.json | 72 +- CVE-2024/CVE-2024-223xx/CVE-2024-22318.json | 59 + CVE-2024/CVE-2024-223xx/CVE-2024-22332.json | 59 + CVE-2024/CVE-2024-231xx/CVE-2024-23170.json | 72 +- CVE-2024/CVE-2024-232xx/CVE-2024-23206.json | 6 +- CVE-2024/CVE-2024-232xx/CVE-2024-23213.json | 6 +- CVE-2024/CVE-2024-232xx/CVE-2024-23222.json | 6 +- CVE-2024/CVE-2024-236xx/CVE-2024-23639.json | 67 + CVE-2024/CVE-2024-236xx/CVE-2024-23650.json | 63 +- CVE-2024/CVE-2024-236xx/CVE-2024-23651.json | 63 +- CVE-2024/CVE-2024-236xx/CVE-2024-23652.json | 63 +- CVE-2024/CVE-2024-236xx/CVE-2024-23653.json | 63 +- CVE-2024/CVE-2024-237xx/CVE-2024-23756.json | 4 +- CVE-2024/CVE-2024-237xx/CVE-2024-23775.json | 72 +- CVE-2024/CVE-2024-239xx/CVE-2024-23917.json | 57 +- CVE-2024/CVE-2024-240xx/CVE-2024-24001.json | 74 +- CVE-2024/CVE-2024-240xx/CVE-2024-24002.json | 73 +- CVE-2024/CVE-2024-240xx/CVE-2024-24004.json | 74 +- CVE-2024/CVE-2024-243xx/CVE-2024-24393.json | 4 +- CVE-2024/CVE-2024-243xx/CVE-2024-24397.json | 78 +- CVE-2024/CVE-2024-244xx/CVE-2024-24494.json | 4 +- CVE-2024/CVE-2024-244xx/CVE-2024-24495.json | 4 +- CVE-2024/CVE-2024-244xx/CVE-2024-24496.json | 4 +- CVE-2024/CVE-2024-244xx/CVE-2024-24497.json | 4 +- CVE-2024/CVE-2024-244xx/CVE-2024-24498.json | 4 +- CVE-2024/CVE-2024-244xx/CVE-2024-24499.json | 4 +- CVE-2024/CVE-2024-247xx/CVE-2024-24752.json | 57 +- CVE-2024/CVE-2024-247xx/CVE-2024-24753.json | 57 +- CVE-2024/CVE-2024-247xx/CVE-2024-24754.json | 57 +- CVE-2024/CVE-2024-248xx/CVE-2024-24819.json | 63 + CVE-2024/CVE-2024-248xx/CVE-2024-24820.json | 4 +- CVE-2024/CVE-2024-248xx/CVE-2024-24821.json | 4 +- CVE-2024/CVE-2024-248xx/CVE-2024-24825.json | 4 +- CVE-2024/CVE-2024-248xx/CVE-2024-24829.json | 4 +- CVE-2024/CVE-2024-248xx/CVE-2024-24830.json | 4 +- CVE-2024/CVE-2024-249xx/CVE-2024-24936.json | 57 +- CVE-2024/CVE-2024-249xx/CVE-2024-24937.json | 57 +- CVE-2024/CVE-2024-249xx/CVE-2024-24938.json | 57 +- CVE-2024/CVE-2024-249xx/CVE-2024-24939.json | 57 +- CVE-2024/CVE-2024-249xx/CVE-2024-24941.json | 57 +- CVE-2024/CVE-2024-249xx/CVE-2024-24942.json | 57 +- CVE-2024/CVE-2024-249xx/CVE-2024-24943.json | 57 +- CVE-2024/CVE-2024-251xx/CVE-2024-25106.json | 4 +- CVE-2024/CVE-2024-251xx/CVE-2024-25107.json | 4 +- README.md | 86 +- 123 files changed, 19422 insertions(+), 1234 deletions(-) create mode 100644 CVE-2023/CVE-2023-323xx/CVE-2023-32341.json create mode 100644 CVE-2023/CVE-2023-420xx/CVE-2023-42016.json create mode 100644 CVE-2023/CVE-2023-451xx/CVE-2023-45187.json create mode 100644 CVE-2023/CVE-2023-451xx/CVE-2023-45190.json create mode 100644 CVE-2023/CVE-2023-451xx/CVE-2023-45191.json create mode 100644 CVE-2024/CVE-2024-13xx/CVE-2024-1353.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22318.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22332.json create mode 100644 CVE-2024/CVE-2024-236xx/CVE-2024-23639.json create mode 100644 CVE-2024/CVE-2024-248xx/CVE-2024-24819.json diff --git a/CVE-2001/CVE-2001-08xx/CVE-2001-0830.json b/CVE-2001/CVE-2001-08xx/CVE-2001-0830.json index 11bc954ce40..44542581e0a 100644 --- a/CVE-2001/CVE-2001-08xx/CVE-2001-0830.json +++ b/CVE-2001/CVE-2001-08xx/CVE-2001-0830.json @@ -2,8 +2,8 @@ "id": "CVE-2001-0830", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-06T05:00:00.000", - "lastModified": "2017-10-10T01:29:53.627", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:52:21.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-772" } ] } @@ -58,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pld:6tunnel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:6tunnel_project:6tunnel:*:*:*:*:*:*:*:*", "versionEndIncluding": "0.08", - "matchCriteriaId": "09817A67-3CC0-4014-9592-4C1592E7C17D" + "matchCriteriaId": "B58776F5-F89E-456E-8BBF-B081DD979C39" } ] } @@ -70,19 +92,35 @@ "references": [ { "url": "ftp://213.146.38.146/pub/wojtekka/6tunnel-0.09.tar.gz", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=100386451702966&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/3467", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7337", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-09xx/CVE-2003-0981.json b/CVE-2003/CVE-2003-09xx/CVE-2003-0981.json index 3c9765c0a3c..a23a8c3f43c 100644 --- a/CVE-2003/CVE-2003-09xx/CVE-2003-0981.json +++ b/CVE-2003/CVE-2003-09xx/CVE-2003-0981.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0981", "sourceIdentifier": "cve@mitre.org", "published": "2004-01-05T05:00:00.000", - "lastModified": "2016-10-18T02:38:47.473", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:53:22.383", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-346" } ] } @@ -62,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:freescripts:visitorbook:le:*:*:*:*:*:*:*", - "matchCriteriaId": "C05BD42A-A99E-4683-A034-BE7CDBA4F289" + "criteria": "cpe:2.3:a:freescripts:visitorbook_le:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8641B1D-117C-4913-B66D-48D7768F18FE" } ] } @@ -73,12 +95,16 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=107107840622493&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.westpoint.ltd.uk/advisories/wp-03-0001.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] diff --git a/CVE-2005/CVE-2005-20xx/CVE-2005-2088.json b/CVE-2005/CVE-2005-20xx/CVE-2005-2088.json index ef03cdac921..31209d83f36 100644 --- a/CVE-2005/CVE-2005-20xx/CVE-2005-2088.json +++ b/CVE-2005/CVE-2005-20xx/CVE-2005-2088.json @@ -2,8 +2,8 @@ "id": "CVE-2005-2088", "sourceIdentifier": "secalert@redhat.com", "published": "2005-07-05T04:00:00.000", - "lastModified": "2023-02-13T01:16:07.923", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:40:37.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -51,7 +51,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-444" } ] } @@ -67,8 +67,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.0.35", - "versionEndIncluding": "2.0.55", - "matchCriteriaId": "514A6F28-6C2B-495E-9816-C06ADCE3539D" + "versionEndExcluding": "2.0.55", + "matchCriteriaId": "7B627099-D2E2-4E43-84B7-0C921FAD4156" } ] } @@ -127,6 +127,69 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/14530", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/17319", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/17487", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/17813", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/19072", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/19073", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/19185", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/19317", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/23074", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, { "url": "http://securityreason.com/securityalert/604", "source": "secalert@redhat.com", @@ -176,6 +239,7 @@ "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=PK13959&apar=only", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -183,6 +247,7 @@ "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -190,6 +255,7 @@ "url": "http://www.apache.org/dist/httpd/CHANGES_1.3", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -197,6 +263,7 @@ "url": "http://www.apache.org/dist/httpd/CHANGES_2.0", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -204,6 +271,7 @@ "url": "http://www.debian.org/security/2005/dsa-803", "source": "secalert@redhat.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, @@ -211,6 +279,7 @@ "url": "http://www.debian.org/security/2005/dsa-805", "source": "secalert@redhat.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, @@ -218,7 +287,7 @@ "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:130", "source": "secalert@redhat.com", "tags": [ - "Broken Link" + "Third Party Advisory" ] }, { @@ -239,6 +308,7 @@ "url": "http://www.redhat.com/support/errata/RHSA-2005-582.html", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -254,6 +324,7 @@ "url": "http://www.securityfocus.com/archive/1/428138/100/0/threaded", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -262,6 +333,7 @@ "url": "http://www.securityfocus.com/bid/14106", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -270,6 +342,7 @@ "url": "http://www.securityfocus.com/bid/15647", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -285,6 +358,7 @@ "url": "http://www.vupen.com/english/advisories/2005/2140", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Permissions Required" ] }, @@ -292,6 +366,7 @@ "url": "http://www.vupen.com/english/advisories/2005/2659", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Permissions Required" ] }, @@ -299,6 +374,7 @@ "url": "http://www.vupen.com/english/advisories/2006/0789", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Permissions Required" ] }, @@ -306,6 +382,7 @@ "url": "http://www.vupen.com/english/advisories/2006/1018", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Permissions Required" ] }, @@ -313,6 +390,7 @@ "url": "http://www.vupen.com/english/advisories/2006/4680", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Permissions Required" ] }, @@ -332,56 +410,105 @@ }, { "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11452", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -389,6 +516,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1237", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -396,6 +524,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1526", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -403,6 +532,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1629", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -410,6 +540,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A840", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory" ] }, diff --git a/CVE-2005/CVE-2005-20xx/CVE-2005-2089.json b/CVE-2005/CVE-2005-20xx/CVE-2005-2089.json index bdd420b7f44..d6817da18c5 100644 --- a/CVE-2005/CVE-2005-20xx/CVE-2005-2089.json +++ b/CVE-2005/CVE-2005-20xx/CVE-2005-2089.json @@ -2,8 +2,8 @@ "id": "CVE-2005-2089", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-05T04:00:00.000", - "lastModified": "2018-10-30T16:25:10.357", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:29:29.420", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-444" } ] } @@ -58,13 +58,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F7C954A7-FF84-4DEB-8728-5B207F374ECC" + "criteria": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "413C07EA-139F-4B7D-A58B-835BD2591FA0" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "413C07EA-139F-4B7D-A58B-835BD2591FA0" + "criteria": "cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9B4DF95D-B4B1-4FB6-9D27-A6D359EEACFA" } ] } @@ -74,19 +74,33 @@ "references": [ { "url": "http://seclists.org/lists/bugtraq/2005/Jun/0025.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.securiteam.com/securityreviews/5GP0220G0U.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42899", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json b/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json index 94954c9cb05..a8af86b5d9e 100644 --- a/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json +++ b/CVE-2005/CVE-2005-42xx/CVE-2005-4206.json @@ -2,8 +2,8 @@ "id": "CVE-2005-4206", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-13T11:03:00.000", - "lastModified": "2017-07-20T01:29:12.003", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:28:08.810", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-601" } ] } @@ -58,13 +80,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:blackboard:blackboard_learning_and_community_post_systems:6.2.3.23:*:*:*:*:*:*:*", - "matchCriteriaId": "3F3D9504-565E-4A64-AEAA-C226FB1B1B86" + "criteria": "cpe:2.3:a:blackboard:academic_suite:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.0.0.0", + "matchCriteriaId": "1E586786-3A7D-4F69-A800-A0D6B280E63A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:blackboard:blackboard_learning_and_community_post_systems:6.3.1.424:*:*:*:*:*:*:*", - "matchCriteriaId": "397937CE-A799-452F-9079-7A026A4BD490" + "criteria": "cpe:2.3:a:blackboard:academic_suite:6.2.3.23:*:*:*:*:*:*:*", + "matchCriteriaId": "51932C51-CCCC-419F-9655-C71B01D24336" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blackboard:academic_suite:6.3.1.424:*:*:*:*:*:*:*", + "matchCriteriaId": "535D86A9-D28E-4356-AE5C-1018C1645942" } ] } @@ -72,20 +100,46 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17991", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit", + "Vendor Advisory" + ] + }, { "url": "http://www.ipomonis.com/advisories/Bb_6.zip", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/21618", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/15814", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23558", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-62xx/CVE-2006-6276.json b/CVE-2006/CVE-2006-62xx/CVE-2006-6276.json index 57f3a7cff04..00cf7b89709 100644 --- a/CVE-2006/CVE-2006-62xx/CVE-2006-6276.json +++ b/CVE-2006/CVE-2006-62xx/CVE-2006-6276.json @@ -2,8 +2,8 @@ "id": "CVE-2006-6276", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-04T11:28:00.000", - "lastModified": "2017-07-29T01:29:26.530", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:34:42.803", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-444" } ] } @@ -67,94 +67,19 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur1:enterprise:*:*:*:*:*", - "matchCriteriaId": "2F40832C-EA2D-4AEF-9C98-36795D36BA06" + "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "721D0068-2664-4E92-9D96-9007F2120450" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur1:standard:*:*:*:*:*", - "matchCriteriaId": "9F076EB9-CE31-456E-B7E9-B9F4C26CB0DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur2:enterprise:*:*:*:*:*", - "matchCriteriaId": "7805CF93-C1EC-4698-95A6-CAB9C26EEAB9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur2:standard:*:*:*:*:*", - "matchCriteriaId": "951B75FF-9190-4AF7-BE9D-23C2114F71DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur3:enterprise:*:*:*:*:*", - "matchCriteriaId": "D30859F7-97BE-4D6F-A9A8-EE12E8BC6201" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur3:standard:*:*:*:*:*", - "matchCriteriaId": "D254F827-8A6C-496F-A6A0-667EF4F1D526" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:enterprise:*:*:*:*:*", - "matchCriteriaId": "D9F68042-8C22-447E-8C6B-F44DEE5BF389" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:platform:*:*:*:*:*", - "matchCriteriaId": "7659FD2B-6F83-44F1-B4A1-94D106B4C686" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:standard:*:*:*:*:*", - "matchCriteriaId": "1379A19D-72CF-490C-871E-B67BA40547E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:ur1:platform:*:*:*:*:*", - "matchCriteriaId": "E2A9B4B2-B844-411F-B4C7-9AC60C37A5A3" + "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9134A420-1A6E-48C0-A6CE-5AE555FC0D94" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*", - "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*", - "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*", - "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*", - "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*", - "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*", - "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*", - "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*", @@ -165,51 +90,6 @@ "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "57DC2FBE-6556-4113-83BF-ABCAC70CBDE6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*", - "matchCriteriaId": "3DA512F0-B382-407E-B75D-5D2D15E185BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "16727FF1-3CD7-4667-A2BA-2241A3AFEED3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "F60E165E-5B62-4D46-941D-E84603516D23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*", - "matchCriteriaId": "FF6BCC24-EADB-4EB8-9142-01D34C307C45" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*", - "matchCriteriaId": "05017BA4-C9FC-4F7D-A5FE-9CE763CFE3E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*", - "matchCriteriaId": "DCC700F7-8675-441A-8AB7-CEFF84639E7F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*", - "matchCriteriaId": "7BE04EB1-CDBD-4AA2-9513-826637F14771" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*", - "matchCriteriaId": "EBD38B0A-EB9B-4556-B6DE-A7598ACC04AE" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*", @@ -217,78 +97,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*", - "matchCriteriaId": "85A181D1-C261-4C29-BC8C-A7A815A63E2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*", - "matchCriteriaId": "3A10F68F-4A2F-44A0-A039-1A34C6E2D083" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*", - "matchCriteriaId": "021DC080-18ED-41F4-9FBD-1DD0C332F871" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*", - "matchCriteriaId": "C878B2FD-88A1-44E2-9234-C40CA1DDC5BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*", - "matchCriteriaId": "0F6B3BC6-9A4B-40E7-A540-9BCFC3D02E66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*", - "matchCriteriaId": "9760BDBA-E5FD-4AFF-ACB8-4C8B55CC3A61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:update_3:*:*:*:*:*:*", - "matchCriteriaId": "1A460F62-4594-447A-9D0B-9C1DBBDE9852" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*", - "matchCriteriaId": "37553E5D-7B68-40C4-B970-FA0D02B7D3D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*", - "matchCriteriaId": "3D089210-2135-4D41-92AD-51FB97AB343E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*", - "matchCriteriaId": "C2C8EF3B-1A44-4D15-B2BE-FC970281760C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*", - "matchCriteriaId": "E3597345-9D0B-492B-99BC-1C992EBF7CD5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur6:platform:*:*:*:*:*", - "matchCriteriaId": "2E93217B-0307-4E04-BD02-50AD5AD35072" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur6:standard:*:*:*:*:*", - "matchCriteriaId": "B77E35C5-FF8B-4BB5-A12E-E9B6485E207A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur7:platform:*:*:*:*:*", - "matchCriteriaId": "3F7BD264-7418-4A48-9B67-BB90A9566E7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:ur7:standard:*:*:*:*:*", - "matchCriteriaId": "11BB061E-ECF0-49F3-A3A8-378284A4F983" + "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56BB3993-C089-421F-987E-D6294E8C909E" } ] } @@ -296,22 +106,45 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/23186", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://securitytracker.com/id?1017322", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://securitytracker.com/id?1017323", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://securitytracker.com/id?1017324", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, @@ -319,16 +152,26 @@ "url": "http://www.securityfocus.com/bid/21371", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.vupen.com/english/advisories/2006/4793", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-08xx/CVE-2007-0897.json b/CVE-2007/CVE-2007-08xx/CVE-2007-0897.json index fa88fd75db1..05808a6a838 100644 --- a/CVE-2007/CVE-2007-08xx/CVE-2007-0897.json +++ b/CVE-2007/CVE-2007-08xx/CVE-2007-0897.json @@ -2,9 +2,9 @@ "id": "CVE-2007-0897", "sourceIdentifier": "cve@mitre.org", "published": "2007-02-16T19:28:00.000", - "lastModified": "2017-07-29T01:30:29.563", - "vulnStatus": "Modified", - "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nClam AntiVirus, ClamAV, 0.90 Stable", + "lastModified": "2024-02-09T02:48:50.797", + "vulnStatus": "Analyzed", + "evaluatorSolution": "This vulnerability is addressed in the following product release:\nClam AntiVirus, ClamAV, 0.90 Stable", "descriptions": [ { "lang": "en", @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -49,7 +71,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-772" } ] } @@ -63,291 +85,40 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.15", - "matchCriteriaId": "E040C64A-273E-49FC-9B32-E25BE15D357A" - }, + "criteria": "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.90", + "matchCriteriaId": "EA546DD9-A29C-4D82-8E21-80619B2FF25B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.20", - "matchCriteriaId": "F4DAF18C-D921-448C-9806-F7161B742E51" - }, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.11", + "matchCriteriaId": "B2D0444E-6B76-46EE-95EF-617F8967F6B6" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.21", - "matchCriteriaId": "09A48542-552D-45B6-9989-EBA02C16BAD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.22", - "matchCriteriaId": "7F5E3E9F-9F7F-4366-AF74-5DD79D500ADA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.23", - "matchCriteriaId": "630D6FA9-DF36-4FFF-A894-282DBD3C6931" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.24", - "matchCriteriaId": "C0CC9F29-854C-4B58-93B7-04FB5AFF4AF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.51", - "matchCriteriaId": "75501EBF-B78B-4160-B1FD-B8FF502BC860" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.52", - "matchCriteriaId": "26AEB8E6-B3A9-48F6-AA7D-55FDB2B6DF8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.53", - "matchCriteriaId": "2D6117F8-A05B-42FA-B5CD-4646C0F755D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.54", - "matchCriteriaId": "D40CD000-F4D6-48EA-8785-7C662DD4FB77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.60", - "matchCriteriaId": "2E370AEE-3D76-4DB3-B2EA-DE2F24A1D2B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.60p", - "matchCriteriaId": "59FCC7A7-4AC9-4084-9684-E236FAEF4B3F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.65", - "matchCriteriaId": "8848DF73-5C8F-4923-B6D5-103D3A4E45BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.67", - "matchCriteriaId": "AC26FE6A-DA82-4F10-A176-6EF719383232" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.68", - "matchCriteriaId": "D9ECDDC6-88C6-42DE-BC4D-F1099957341E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.68.1", - "matchCriteriaId": "4014C1FE-9659-4D87-BE25-82A28222CEE2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.70", - "matchCriteriaId": "054DFC0C-996C-4ECD-8832-9E8C085B7C4D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.71", - "matchCriteriaId": "CCEC1516-8A43-4010-903A-07DB582C18C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.72", - "matchCriteriaId": "8582F6D3-EBD5-485B-8BB5-F91DDFC9C600" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.73", - "matchCriteriaId": "09C15660-74FA-4AA0-929E-6291AE2B1297" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.74", - "matchCriteriaId": "E68EB72E-EEDE-4231-B309-B6558956BC6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.75", - "matchCriteriaId": "BD05D78B-6F28-4068-88F7-96461D85236C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.75.1", - "matchCriteriaId": "8278F2A2-8B1B-4FC2-BC66-C6EC87E9476D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.80", - "matchCriteriaId": "F07C275E-16B0-4A2B-89A6-C68C68FCF67D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.80_rc1", - "matchCriteriaId": "D0867DF1-4122-4E5C-8F72-FADB042DA14D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.80_rc2", - "matchCriteriaId": "3CF31500-C66B-4FEC-90BE-30F7D0956929" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.80_rc3", - "matchCriteriaId": "B721C0AE-AB73-4A9A-84CB-BECCD974CA99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.80_rc4", - "matchCriteriaId": "6638002E-716F-476A-9452-4C1B188CF59B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.81", - "matchCriteriaId": "C596E6BB-7060-4BA7-B2BA-8E84FF6BF9A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.81_rc1", - "matchCriteriaId": "8943D346-7542-4DD4-82D0-B8CF1D0494B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.82", - "matchCriteriaId": "9E3A3962-54F7-48EC-8ABD-BAE8C8B4727E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.83", - "matchCriteriaId": "C745EB7E-367A-4C2B-B206-3FEB4C33A97A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.84", - "matchCriteriaId": "8B796948-15AD-4A30-8251-67444175A777" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.84_rc1", - "matchCriteriaId": "4C64CF0B-91A9-4EF7-B089-0B3CA26B2EFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.84_rc2", - "matchCriteriaId": "56ED080B-6E44-4B47-833F-25535FCEDA69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.85", - "matchCriteriaId": "7A0FB401-6282-4687-A8EC-EB3BE02C293D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.85.1", - "matchCriteriaId": "2C0E3FE9-0B62-484E-A7CF-1CE0BBDE36AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.86", - "matchCriteriaId": "9391B98E-80A9-4C12-9EB8-F45A289FD9F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.86.1", - "matchCriteriaId": "184FC0BC-25CD-4804-9DFF-9309F991557D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.86.2", - "matchCriteriaId": "AFDA61E7-4CE4-4FDD-8B1B-BFF6A934CDA2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.86_rc1", - "matchCriteriaId": "18547613-F1A4-410C-A723-FC7BB8A270CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.87", - "matchCriteriaId": "A5BF037B-141A-48AB-88A3-555836B160FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.87.1", - "matchCriteriaId": "D1873479-6058-472F-94AB-2601B2936812" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.88", - "matchCriteriaId": "B498C911-81FC-4B1A-B9A4-5F266AA2B7CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.88.1", - "matchCriteriaId": "990BE50A-0B0B-44CC-BE51-CF69C900EE52" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.88.3", - "matchCriteriaId": "E9B0DEE6-CA69-4020-AF96-8C6E5872ADF5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.88.4", - "matchCriteriaId": "8D7A91DF-84B4-4E45-8675-E107D8BCD070" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.88.6", - "matchCriteriaId": "F8D97900-5AD1-43BF-860F-537D25A54C95" + "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" } ] } @@ -357,57 +128,157 @@ "references": [ { "url": "http://docs.info.apple.com/article.html?artnum=307562", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=475", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.suse.com/archive/suse-security-announce/2007-Feb/0004.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://osvdb.org/32283", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/24183", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24187", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24192", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24319", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24332", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24425", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/29420", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200703-03.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2007/dsa-1263", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:043", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/22580", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id?1017659", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/0623", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/0924/references", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32531", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-01xx/CVE-2008-0166.json b/CVE-2008/CVE-2008-01xx/CVE-2008-0166.json index 7c99129dd34..126e43f04aa 100644 --- a/CVE-2008/CVE-2008-01xx/CVE-2008-0166.json +++ b/CVE-2008/CVE-2008-01xx/CVE-2008-0166.json @@ -2,7 +2,7 @@ "id": "CVE-2008-0166", "sourceIdentifier": "cve@mitre.org", "published": "2008-05-13T17:20:00.000", - "lastModified": "2022-02-02T14:59:01.730", + "lastModified": "2024-02-09T02:45:16.693", "vulnStatus": "Analyzed", "descriptions": [ { @@ -22,6 +22,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -55,14 +77,13 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-338" } ] } ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -70,52 +91,53 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.8c-1:*:*:*:*:*:*:*", - "matchCriteriaId": "38238ECD-0581-47A0-B65E-9AA63A6C3148" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*", - "matchCriteriaId": "766EA6F2-7FA4-4713-9859-9971CCD2FDCB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*", - "matchCriteriaId": "EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*", - "matchCriteriaId": "2BB38AEA-BAF0-4920-9A71-747C24444770" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*", - "matchCriteriaId": "1F33EA2B-DE15-4695-A383-7A337AC38908" + "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9.8c-1", + "versionEndIncluding": "0.9.8g", + "matchCriteriaId": "8EEFA1C8-85D4-425F-A987-29AC6D10C303" } ] - }, + } + ] + }, + { + "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { - "vulnerable": false, + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", + "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" + }, + { + "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501" }, { - "vulnerable": false, + "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468" }, { - "vulnerable": false, - "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", - "matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB" - }, + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", + "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { - "vulnerable": false, + "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" } @@ -132,6 +154,54 @@ "Broken Link" ] }, + { + "url": "http://secunia.com/advisories/30136", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/30220", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/30221", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/30231", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/30239", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/30249", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel", "source": "cve@mitre.org", @@ -143,6 +213,7 @@ "url": "http://www.debian.org/security/2008/dsa-1571", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Patch", "Vendor Advisory" ] @@ -151,6 +222,7 @@ "url": "http://www.debian.org/security/2008/dsa-1576", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Patch" ] }, @@ -166,6 +238,7 @@ "url": "http://www.securityfocus.com/archive/1/492112/100/0/threaded", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -174,6 +247,7 @@ "url": "http://www.securityfocus.com/bid/29179", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Third Party Advisory", "VDB Entry" @@ -183,6 +257,7 @@ "url": "http://www.securitytracker.com/id?1020017", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -228,6 +303,7 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA08-137A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "US Government Resource" ] diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2052.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2052.json index 3cab0956dd1..ed09bafbee3 100644 --- a/CVE-2008/CVE-2008-20xx/CVE-2008-2052.json +++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2052.json @@ -2,8 +2,8 @@ "id": "CVE-2008-2052", "sourceIdentifier": "cve@mitre.org", "published": "2008-05-02T17:05:00.000", - "lastModified": "2017-08-08T01:30:42.963", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:31:16.793", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-59" + "value": "CWE-601" } ] } @@ -62,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:bitrix:bitrix_site_manager:6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "92DAD826-62C2-4880-AADE-F8B3FB0248F2" + "criteria": "cpe:2.3:a:bitrix24:bitrix_site_manager:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "339641BD-BEF4-4A84-B266-41BF09E63225" } ] } @@ -73,11 +95,18 @@ "references": [ { "url": "http://holisticinfosec.org/content/view/62/45/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42157", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-21xx/CVE-2008-2122.json b/CVE-2008/CVE-2008-21xx/CVE-2008-2122.json index 87ee49d6344..76c71407b09 100644 --- a/CVE-2008/CVE-2008-21xx/CVE-2008-2122.json +++ b/CVE-2008/CVE-2008-21xx/CVE-2008-2122.json @@ -2,8 +2,8 @@ "id": "CVE-2008-2122", "sourceIdentifier": "cve@mitre.org", "published": "2008-05-09T15:20:00.000", - "lastModified": "2017-08-08T01:30:47.057", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:54:11.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-772" } ] } @@ -71,25 +93,53 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/30081", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21303877", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/29036", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1019964", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/1427/references", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42173", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-29xx/CVE-2008-2951.json b/CVE-2008/CVE-2008-29xx/CVE-2008-2951.json index 81a33254eac..9bdb7f5bf17 100644 --- a/CVE-2008/CVE-2008-29xx/CVE-2008-2951.json +++ b/CVE-2008/CVE-2008-29xx/CVE-2008-2951.json @@ -2,8 +2,8 @@ "id": "CVE-2008-2951", "sourceIdentifier": "cve@mitre.org", "published": "2008-07-27T22:41:00.000", - "lastModified": "2017-08-08T01:31:28.247", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:30:37.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-601" } ] } @@ -62,139 +84,29 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.10.4", - "matchCriteriaId": "6AB0CAB5-F4B4-44AE-A527-A3A089279943" + "criteria": "cpe:2.3:a:edgewall:trac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.10.5", + "matchCriteriaId": "C6C4CEF3-92F7-4344-9833-7CBCEF16E94F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*", + "matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F0C99624-9190-42FF-BDE9-A7A5938EDECA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "04F968D4-9691-4ED1-A412-7DF43898863C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1EE1121C-5E38-4811-A9BA-3122EF00941D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "AF9D8496-03C6-4C9E-9511-B32EE1AD6E91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FF4AC75E-2EE6-4333-9AA5-B26571CA86AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "A370F182-C0BF-4E53-81B5-57E03974FA00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9C37AA14-7184-4FFC-BEDE-B567EE315E9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "661C665F-A7F1-4631-B232-1DC9A2635E77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9710175D-AB7F-4416-9BD6-DD9BD9D0D322" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3829D131-F1DB-426E-82C9-C39CBC1D8164" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9410D67A-6338-4076-AF88-9DFAB701E1FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "9239A5E2-62D4-4100-BA88-B114FE5944F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "39206222-52BA-49B3-B2D8-1AFB247AA05F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9:b1:*:*:*:*:*:*", - "matchCriteriaId": "BF8C0FF0-98FF-463F-B9F0-B26DC587CE05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9:b2:*:*:*:*:*:*", - "matchCriteriaId": "ED00A360-A4BD-44A9-BF88-A81257CF5E3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CEEE9CAF-6A17-4B68-988B-2EA0183FC45E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CE0E4289-9154-4547-8DAA-51536706EFE7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7836864F-1F39-479A-99D0-A00247711FB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "14D2B12D-3479-435C-BF76-158C4152C548" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E9AC7C92-2D82-470E-A04A-5C2B5AAA8CFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "87EB909D-2F50-456E-9339-31617A9FC64E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "351C68FA-9A8E-4E65-BD8E-44F5BBDAFE8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "76B67191-EBC8-4679-9434-9AF56E9151B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CA90857B-FA3A-4DD8-A20D-04837CCFFF77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "3012B1CE-686F-4F0E-BCB2-790D7C30D257" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trac:trac:0.10.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F826915A-400C-4DC8-83A3-6EC158ACE0D0" + "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", + "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140" } ] } @@ -204,27 +116,63 @@ "references": [ { "url": "http://holisticinfosec.org/content/view/72/45/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/31314", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://trac.edgewall.org/wiki/ChangeLog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] + }, + { + "url": "http://www.osvdb.org/46513", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/30402", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44043", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01261.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01270.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-41xx/CVE-2011-4107.json b/CVE-2011/CVE-2011-41xx/CVE-2011-4107.json index ceb2b97e02c..c68834ee7f6 100644 --- a/CVE-2011/CVE-2011-41xx/CVE-2011-4107.json +++ b/CVE-2011/CVE-2011-41xx/CVE-2011-4107.json @@ -2,8 +2,8 @@ "id": "CVE-2011-4107", "sourceIdentifier": "secalert@redhat.com", "published": "2011-11-17T19:55:01.517", - "lastModified": "2017-08-29T01:30:27.397", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:27:11.997", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-611" } ] } @@ -62,118 +84,57 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3EE1361B-D70B-45B9-BD2F-7C049D96928A" + "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3.0.0", + "versionEndExcluding": "3.3.10.5", + "matchCriteriaId": "07CC6931-2524-492E-9290-2388CD6435F9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "06EE0CCB-559F-457B-A1EC-79D0680DCDD8" + "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4.0.0", + "versionEndExcluding": "3.4.7.1", + "matchCriteriaId": "A872DC22-5EB5-4348-BEAD-61A59394AA51" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", + "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "00826A60-50A4-4E05-B317-8D0A5FC637BC" + "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", + "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "7AC1AECC-6521-4D9D-88D5-86DA8BDB1D26" - }, + "criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*", + "matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "79093150-F515-42D9-AEF2-86C0C4B1B8AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1FE65F49-CDED-49B0-89F4-CE52E357069A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4B29D2E6-F327-4B19-B33F-E888F8B81E7B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7C579327-8F92-41AF-926A-86442063A83D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8C3F84C4-883B-48DC-9181-E54A87DC973B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2C10C216-594B-4F08-B86E-A476A452189B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E3E72232-C7D1-4D3E-97D1-5F3B89D447ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "3540439C-52FD-45A7-ABF4-E18C4AED89C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.3.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "31E1CEF6-682E-4580-8A90-864173C4E4A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2C714361-7AE3-4DC2-994C-7C67B41226B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2A3CED16-3ECE-49F6-A52B-0222B14DBC88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E4938BCE-1365-469A-B714-A5D9C451FA20" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "35F46942-E054-43E4-9543-E126738845E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A1A24EBE-D760-4251-972E-86B71EC8A07D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9AC8F001-B2D6-49AD-94E7-673E8BEC958C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "AE9EFA08-1838-46A9-A851-A0540C60739D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B231B0D4-F971-4D4F-97CE-74951DF2B681" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "35158ABE-56D7-499D-8268-D5452DE3E139" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "DD8C3CAC-7CE6-4D13-9640-B924081D628E" + "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" } ] } @@ -183,20 +144,40 @@ "references": [ { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069625.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069635.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069649.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/76798", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://packetstormsecurity.org/files/view/106511/phpmyadmin-fileread.txt", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Exploit" ] }, @@ -204,28 +185,53 @@ "url": "http://seclists.org/fulldisclosure/2011/Nov/21", "source": "secalert@redhat.com", "tags": [ - "Exploit" + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/46447", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Vendor Advisory" ] }, { "url": "http://securityreason.com/securityalert/8533", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2012/dsa-2391", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:198", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2011/11/03/3", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2011/11/03/5", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php", @@ -237,12 +243,18 @@ }, { "url": "http://www.securityfocus.com/bid/50497", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.wooyun.org/bugs/wooyun-2010-03185", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Exploit" ] }, @@ -250,12 +262,17 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=751112", "source": "secalert@redhat.com", "tags": [ - "Exploit" + "Exploit", + "Issue Tracking" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71108", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json index bd3bf8b81d2..e0ea2d502a5 100644 --- a/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json +++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10180.json @@ -2,7 +2,7 @@ "id": "CVE-2016-10180", "sourceIdentifier": "cve@mitre.org", "published": "2017-01-30T04:59:00.360", - "lastModified": "2021-04-23T18:45:19.730", + "lastModified": "2024-02-09T02:41:18.860", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-338" + "value": "CWE-335" } ] } @@ -109,6 +109,7 @@ "url": "http://www.securityfocus.com/bid/95877", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2021/CVE-2021-371xx/CVE-2021-37147.json b/CVE-2021/CVE-2021-371xx/CVE-2021-37147.json index f89dd0fefa0..ad9bfaaf774 100644 --- a/CVE-2021/CVE-2021-371xx/CVE-2021-37147.json +++ b/CVE-2021/CVE-2021-371xx/CVE-2021-37147.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37147", "sourceIdentifier": "security@apache.org", "published": "2021-11-03T16:15:07.987", - "lastModified": "2022-10-14T11:56:28.303", + "lastModified": "2024-02-09T02:28:42.050", "vulnStatus": "Analyzed", "descriptions": [ { @@ -71,6 +71,10 @@ { "lang": "en", "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-444" } ] }, diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2820.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2820.json index 04cd2cdee05..3e3e9f6b48a 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2820.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2820.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2820", "sourceIdentifier": "security@huntr.dev", "published": "2022-08-15T11:21:31.687", - "lastModified": "2023-07-10T16:15:48.020", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:29:58.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,8 +103,7 @@ "url": "https://github.com/namelessmc/nameless/commit/469bebc17855720e43f0c8209c88a57d2b55f6de", "source": "security@huntr.dev", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -112,8 +111,7 @@ "source": "security@huntr.dev", "tags": [ "Exploit", - "Patch", - "Third Party Advisory" + "Patch" ] } ] diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3032.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3032.json index 75652efcb0f..9d7fb40d93c 100644 --- a/CVE-2022/CVE-2022-30xx/CVE-2022-3032.json +++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3032.json @@ -2,12 +2,16 @@ "id": "CVE-2022-3032", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:37.763", - "lastModified": "2023-01-03T20:25:26.860", + "lastModified": "2024-02-09T02:47:57.353", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "When receiving an HTML email that contained an iframe element, which used a srcdoc attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1." + }, + { + "lang": "es", + "value": "Al recibir un correo electr\u00f3nico HTML que conten\u00eda un elemento iframe, que utilizaba un atributo srcdoc para definir el documento HTML interno, los objetos remotos especificados en el documento anidado, por ejemplo im\u00e1genes o v\u00eddeos , no fueron bloqueados. M\u00e1s bien, se acced\u00eda a la red, se cargaban los objetos y se mostraban. Esta vulnerabilidad afecta a Thunderbird < 102.2.1 y Thunderbird < 91.13.1." } ], "metrics": { @@ -41,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "CWE-610" } ] } @@ -76,9 +80,7 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783831", "source": "security@mozilla.org", "tags": [ - "Issue Tracking", - "Permissions Required", - "Vendor Advisory" + "Permissions Required" ] }, { diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45918.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45918.json index 4104823a704..f8adc6d24c1 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45918.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45918.json @@ -2,12 +2,16 @@ "id": "CVE-2022-45918", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-07T01:15:11.677", - "lastModified": "2023-01-06T20:37:46.383", + "lastModified": "2024-02-09T02:38:20.347", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "ILIAS before 7.16 allows External Control of File Name or Path." + }, + { + "lang": "es", + "value": "ILIAS anterior a 7.16 permite el control externo del nombre o ruta del archivo." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json index 3eb8d12ac8f..2f954acef86 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25365.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25365", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T22:15:08.410", - "lastModified": "2024-02-08T22:15:08.410", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json index 77c66f7f58e..0e5a58aba20 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27001.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27001", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T22:15:08.463", - "lastModified": "2024-02-08T22:15:08.463", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32341.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32341.json new file mode 100644 index 00000000000..65859073925 --- /dev/null +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32341.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-32341", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-09T01:15:08.033", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 could allow an authenticated user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 255827." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/255827", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7116081", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json index 409da84db46..62167803820 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33046.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33046", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:58.807", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:11:34.037", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "product-security@qualcomm.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -38,10 +58,1354 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD36089F-92DF-49EC-9C6F-4300E4903CB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D19A754C-6900-4436-916D-F5361E0BC324" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA73E75-F339-49BA-B1F6-619E4630DE92" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA6E940-1059-4EA2-8225-0F754FE9F50F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C155F86-467F-4B57-950E-12FAAB570B01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71E06B94-9463-49A6-B816-E8A82BEA8545" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C1AB7D4-FB11-4020-A4A0-8F40D98C07F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB6053F0-5E34-458A-B084-078E4D4F4021" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json index 3f613cf52d0..a6b1d3ef767 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33049.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33049", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.043", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:10:50.280", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,10 +38,2754 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E93E1D2-4546-4D60-B53D-20CF09551766" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3358AEB-CD49-4FF9-9410-7EDF0AAABB82" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ED45581-33EE-4D4C-B078-9D7DB6F2386A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json index 9c874d7c7c7..e858421a0ab 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33057.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33057", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.217", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:10:39.467", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,10 +38,2754 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A85141A5-667F-41BB-B84D-908E73A86759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AC9E0F8-6E27-4F6B-A667-786272632A24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E93E1D2-4546-4D60-B53D-20CF09551766" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CCBF666-CB4E-44E1-9676-6891EDC73578" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C767AB6A-1A8C-406C-A600-96A816F44E2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA3F11F3-C9F4-460D-BD77-1BFBCC1F0592" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25673A10-D99C-4F67-BDA7-9C2E4A70EF9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50906EF2-01F7-4E97-9F49-F892DF41CB29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B23A89FF-9C94-40C6-B9B7-3E8354777916" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A930E317-7F22-4605-A85F-144921EEBA0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAF50FDA-47FA-491B-BEAE-76CC38C18F52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9A2DA11-5E4E-4E36-923C-A2D3CC2F2751" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE7DFAD4-1D21-4A3A-9E8C-10F00AD7C403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A96C773B-B228-4A39-8CAE-AEA0EE6E5699" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "898FE463-291B-4C89-BEC5-8B99EA18CF23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C9940B4-672B-4D82-B904-80A3FC1DD4C2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11ADEB65-9803-4036-AAB4-B85E430B626D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD14F17B-FDC3-4B1B-9901-E40B783E77C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FD2424-599C-4137-9BB0-378F34B7AB3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6037264-BF88-4BCA-9F5F-B5D30587D9A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BABB84B3-C5BC-4AE9-AB6E-BA4BAF9FBECB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87ECCB82-B880-412D-A635-CA6F0B035F2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "424743C4-CE74-4A02-835A-023C9DA0CFAC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14EA48BF-BD65-43B2-8DC1-D97F75AD6FE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B86E317F-12BF-42F6-879B-88A85F7E3F81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C68227-8928-41C4-A6B8-CD142C018AB6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38E60ED4-9FB7-481E-915B-B7576566E0BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "194A4BD4-0DDF-49E5-AA89-40A5BFB71933" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72FF9732-40D8-4C12-8259-BAA16FAB5A56" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01CBD543-635C-4C57-87B7-55DD3BA3C1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7272B6-AADB-4CCD-B041-66170C313C76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3358AEB-CD49-4FF9-9410-7EDF0AAABB82" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ED45581-33EE-4D4C-B078-9D7DB6F2386A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D6C6B2-36DC-4D0D-AFF8-2108A090A78D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28FEB3B1-F641-436D-AC4F-3304C37167C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json index 69a2ad576a6..33ac6703f1a 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33058.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33058", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.393", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:10:31.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "product-security@qualcomm.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", @@ -38,10 +58,1296 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json index 92158cd5839..712fabab009 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33060.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33060", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.613", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:09:39.027", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "product-security@qualcomm.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "product-security@qualcomm.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", @@ -38,10 +58,1296 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55AECCCF-0761-46B6-B669-E73096679AFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE87CA2-160A-43BF-AC18-DA788501B5B4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59CB6F2F-7C95-498B-9F9E-728930FD24A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284E62AF-2E4D-4E82-AC9A-F27DA71735EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAD88351-1DA2-4CE5-BCEB-3C64BD16468A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03149AA1-8048-4675-8C6F-18FD32E54064" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json index 60c76a0fa9a..1c71df41970 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33064.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33064", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-02-06T06:15:59.780", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:08:59.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,10 +38,2430 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6BD8A1C-D9AB-4BE7-A855-31E58631879C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0F8ED6-EAE7-44EA-A8C6-F5AD408261F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "059486E9-3F99-4C65-A763-470564EDAF2C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72F6CE39-9299-4FC3-BC48-11F79034F2E4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "487D6D28-F007-4726-AB69-F68B1FF4CA3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FE3BF-8A02-4928-BA5F-BF2457D2C8CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22B3AB46-81F4-4C45-AF66-C8B36A175685" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A8198E0-C95A-4433-9EC0-F544CAA90251" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81FC1C9D-D494-4426-93FF-A774D68554D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B4837E0-EFF7-4546-918C-03551E03F6BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532F3191-56DD-41C2-8FCC-D1B20D0E5624" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BF8CD16-C2A7-4C93-8693-0E74F3CD0809" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF26AC15-F805-4FEB-9CFC-BD530FA114F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17A6D87A-544D-4B8E-884A-0117C499DD8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22303AD4-779C-45A3-8F33-3864C45E4328" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EC440D-D420-4477-8F14-427245B80631" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41446A77-6EF3-4570-BAD2-4C761A2C4E7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "448C401B-EF07-4385-A7B4-123D7808F64F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79AFE82F-12C5-4B2E-9004-52F68C965F70" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B5CD77E-1AFD-4AB4-A752-7AAE195E6324" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62B00662-139A-4E36-98FA-D4F7D101D4AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36498.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36498.json index 2504f17b93e..b72a45b5eac 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36498.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36498.json @@ -2,12 +2,16 @@ "id": "CVE-2023-36498", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-06T17:15:08.527", - "lastModified": "2024-02-06T18:15:58.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:09:17.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n en la funcionalidad del cliente PPTP de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad y obtener acceso a un shell sin restricciones." } ], "metrics": { @@ -46,10 +50,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", + "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1853", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40262.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40262.json index 0844f76e03d..e3a787be299 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40262.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40262.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40262", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T23:15:09.683", - "lastModified": "2024-02-08T23:15:09.683", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40263.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40263.json index b2546c722ce..ea26398ff4a 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40263.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40263.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40263", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T23:15:09.730", - "lastModified": "2024-02-08T23:15:09.730", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40264.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40264.json index 9cfcbbf5f8e..b05fff25e37 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40264.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40264.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40264", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T23:15:09.773", - "lastModified": "2024-02-08T23:15:09.773", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40265.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40265.json index 835183d16c0..9815780577f 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40265.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40265.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40265", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T22:15:08.770", - "lastModified": "2024-02-08T22:15:08.770", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40266.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40266.json index 110a18319c3..8477d8287ed 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40266.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40266.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40266", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T22:15:08.840", - "lastModified": "2024-02-08T22:15:08.840", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42016.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42016.json new file mode 100644 index 00000000000..a79948f57a4 --- /dev/null +++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42016.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-42016", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-09T01:15:08.260", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 265559." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-614" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265559", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7116083", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42664.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42664.json index e472189052b..fa611cd4a05 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42664.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42664.json @@ -2,12 +2,16 @@ "id": "CVE-2023-42664", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-06T17:15:08.770", - "lastModified": "2024-02-06T18:15:58.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:11:08.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A post authentication command injection vulnerability exists when setting up the PPTP global configuration of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n al configurar la configuraci\u00f3n global PPTP de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -46,10 +50,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", + "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1856", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43482.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43482.json index bd9937b60d2..12bfd5eafc3 100644 --- a/CVE-2023/CVE-2023-434xx/CVE-2023-43482.json +++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43482.json @@ -2,12 +2,16 @@ "id": "CVE-2023-43482", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-06T17:15:08.973", - "lastModified": "2024-02-06T18:15:58.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:11:03.607", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A command execution vulnerability exists in the guest resource functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comandos en la funcionalidad de recursos invitados de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -46,10 +50,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", + "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1850", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45187.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45187.json new file mode 100644 index 00000000000..2fa4d6b9898 --- /dev/null +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45187.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-45187", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-09T01:15:08.493", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 268749." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268749", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7116045", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45190.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45190.json new file mode 100644 index 00000000000..50568948db9 --- /dev/null +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45190.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-45190", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-09T01:15:08.707", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Engineering Lifecycle Optimization 7.0.2 and 7.0.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 268754." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268754", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7116045", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45191.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45191.json new file mode 100644 index 00000000000..4be931528f3 --- /dev/null +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45191.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-45191", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-09T01:15:08.890", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Engineering Lifecycle Optimization 7.0.2 and 7.0.3 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 268755." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268755", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7116045", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46683.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46683.json index dcbe421bd56..cbbe80f5ba5 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46683.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46683.json @@ -2,12 +2,16 @@ "id": "CVE-2023-46683", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-06T17:15:09.180", - "lastModified": "2024-02-06T18:15:58.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:10:55.253", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A post authentication command injection vulnerability exists when configuring the wireguard VPN functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection . An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n al configurar la funcionalidad VPN de protecci\u00f3n de cables de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -46,10 +50,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", + "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1857", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47131.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47131.json index 2804ce00f89..25cc1e3bd97 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47131.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47131.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47131", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T23:15:09.827", - "lastModified": "2024-02-08T23:15:09.827", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json index 33dd8bd1024..6c123608cf9 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47132.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47132", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T23:15:09.877", - "lastModified": "2024-02-08T23:15:09.877", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47167.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47167.json index ef5d0d2a9aa..1ccde819d71 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47167.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47167.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47167", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-06T17:15:09.380", - "lastModified": "2024-02-06T18:15:58.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:10:50.633", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A post authentication command injection vulnerability exists in the GRE policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n en la funcionalidad de pol\u00edtica GRE de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -46,10 +50,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", + "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1855", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47209.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47209.json index f3ebbde70dd..4396f5a40d4 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47209.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47209.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47209", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-06T17:15:09.593", - "lastModified": "2024-02-06T18:15:59.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:10:45.003", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A post authentication command injection vulnerability exists in the ipsec policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n en la funcionalidad de pol\u00edtica ipsec de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -46,10 +50,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", + "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1854", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47617.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47617.json index 5e3306d19b2..8fab16efb1f 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47617.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47617.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47617", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-06T17:15:09.797", - "lastModified": "2024-02-06T18:15:59.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:10:37.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A post authentication command injection vulnerability exists when configuring the web group member of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n al configurar el miembro del grupo web de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede dar lugar a la inyecci\u00f3n de comandos arbitrarios. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -46,10 +50,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", + "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1858", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47618.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47618.json index 2038c2f9dfa..066e17313fc 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47618.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47618.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47618", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-06T17:15:10.013", - "lastModified": "2024-02-06T18:15:59.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:10:33.477", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A post authentication command execution vulnerability exists in the web filtering functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de ejecuci\u00f3n de comando posterior a la autenticaci\u00f3n en la funcionalidad de filtrado web de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad." } ], "metrics": { @@ -46,10 +50,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*", + "matchCriteriaId": "96429759-A111-4CB6-BB47-C258CFD5C301" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB65324D-FD72-4C28-92AF-85BFF1E8A993" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1859", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49101.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49101.json index 9457ade0cfd..71164d0bc2c 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49101.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49101.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49101", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T22:15:08.940", - "lastModified": "2024-02-08T22:15:08.940", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50356.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50356.json index 58514818d14..f05c7fbb9a8 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50356.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50356.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50356", "sourceIdentifier": "info@cert.vde.com", "published": "2024-01-31T11:15:07.910", - "lastModified": "2024-01-31T14:05:19.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:00:50.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:areal-topkapi:vision_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.4719", + "matchCriteriaId": "8C7F4AB6-5E01-424E-8B2D-A6E5295231D5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.areal-topkapi.com/en/services/security-bulletins", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51630.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51630.json index 5963601dc6c..00644a728ea 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51630.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51630.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51630", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-02-08T23:15:09.933", - "lastModified": "2024-02-08T23:15:09.933", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52425.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52425.json index 11898db3e7c..2be01ec86fd 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52425.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52425.json @@ -2,19 +2,80 @@ "id": "CVE-2023-52425", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-04T20:15:46.063", - "lastModified": "2024-02-05T02:09:37.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:03:16.300", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed." + }, + { + "lang": "es", + "value": "libexpat hasta 2.5.0 permite una denegaci\u00f3n de servicio (consumo de recursos) porque se requieren muchos an\u00e1lisis completos en el caso de un token grande para el cual se necesitan m\u00faltiples rellenos de b\u00fafer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.0", + "matchCriteriaId": "1C50909D-8A18-484B-A7DB-7EF4CA67C2CB" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/libexpat/libexpat/pull/789", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json index 922fc6ac949..65f237f7c6f 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52426.json @@ -2,27 +2,94 @@ "id": "CVE-2023-52426", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-04T20:15:46.120", - "lastModified": "2024-02-05T02:09:37.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:02:39.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time." + }, + { + "lang": "es", + "value": "libexpat hasta 2.5.0 permite la expansi\u00f3n recursiva de entidades XML si XML_DTD no est\u00e1 definido en el momento de la compilaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-776" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.0", + "matchCriteriaId": "1C50909D-8A18-484B-A7DB-7EF4CA67C2CB" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cwe.mitre.org/data/definitions/776.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Technical Description" + ] }, { "url": "https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/libexpat/libexpat/pull/777", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json index 54ce538cb05..b582e8440b8 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json @@ -2,16 +2,40 @@ "id": "CVE-2023-5992", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.147", - "lastModified": "2024-01-31T14:28:47.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:00:00.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en OpenSC donde la eliminaci\u00f3n del relleno de cifrado PKCS#1 no se implementa como resistente al canal lateral. Este problema puede resultar en una posible filtraci\u00f3n de datos privados." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -46,18 +80,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.24.0", + "matchCriteriaId": "A3EB32A5-0147-4801-8E71-C881624EE6B9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-5992", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248685", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6028.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6028.json index d5ba6648000..4ca6887c7c0 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6028.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6028.json @@ -2,16 +2,40 @@ "id": "CVE-2023-6028", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-02-05T18:15:51.670", - "lastModified": "2024-02-05T18:25:55.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:07:12.437", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A reflected\ncross-site scripting (XSS) vulnerability exists in the SVG version of System\nDiagnostics Manager of B&R Automation Runtime versions <= G4.93 that\nenables a remote attacker to execute arbitrary JavaScript code in the context\nof the attacked user\u2019s browser session.\n\n\n\n\n\n\n\n" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de cross-site scripting (XSS) reflejada en la versi\u00f3n SVG de System Diagnostics Manager de B&R Automation Runtime versiones <= G4.93 que permite a un atacante remoto ejecutar c\u00f3digo JavaScript arbitrario en el contexto de la sesi\u00f3n del navegador del usuario atacado." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cybersecurity@ch.abb.com", "type": "Secondary", @@ -36,7 +60,7 @@ }, "weaknesses": [ { - "source": "cybersecurity@ch.abb.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +68,43 @@ "value": "CWE-79" } ] + }, + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:br-automation:automation_runtime:*:*:*:*:*:*:*:*", + "versionEndExcluding": "i4.93", + "matchCriteriaId": "884D020E-3583-4A39-A843-DB5977674E39" + } + ] + } + ] } ], "references": [ { "url": "https://www.br-automation.com/fileadmin/SA23P018_SDM_Web_interface_vulnerable_to_XSS-1d75bee8.pdf", - "source": "cybersecurity@ch.abb.com" + "source": "cybersecurity@ch.abb.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json index 9f9bfb8f9c5..8848bb9b501 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6395.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6395", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T15:15:08.657", - "lastModified": "2024-01-30T05:15:08.500", + "lastModified": "2024-02-09T02:15:08.047", "vulnStatus": "Modified", "descriptions": [ { @@ -180,6 +180,10 @@ "Patch" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SP2BJC2AFLFJJAEHPGZ3ZINTBTI7AN/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBFYREAJH4T7GXXQZ4GJEREN4Q3AHS3K/", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json index 82664e9376e..c655289eb9e 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6779", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.700", - "lastModified": "2024-02-04T09:15:10.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T00:59:49.720", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -50,38 +80,105 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.39", + "matchCriteriaId": "9B07E72A-FA10-49C2-BBE3-468AF836A462" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Feb/3", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6779", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254395", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.gentoo.org/glsa/202402-01", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/01/30/6", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json index fe925c25655..42f2dc5e8bb 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6780", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.917", - "lastModified": "2024-02-04T09:15:10.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T00:59:38.740", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -39,6 +59,20 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + }, + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -50,38 +84,105 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.37", + "matchCriteriaId": "8CFD354C-94B0-4DF2-B943-780F99A0CF07" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Feb/3", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6780", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254396", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.gentoo.org/glsa/202402-01", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/01/30/6", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json index a5f05f068ac..cd6714273ad 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6816", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T05:15:08.607", - "lastModified": "2024-02-04T20:15:46.477", + "lastModified": "2024-02-09T02:15:08.207", "vulnStatus": "Modified", "descriptions": [ { @@ -246,6 +246,10 @@ "Mailing List" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/", + "source": "secalert@redhat.com" + }, { "url": "https://security.gentoo.org/glsa/202401-30", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7043.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7043.json index 168d24a1163..b3735113135 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7043.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7043.json @@ -2,16 +2,40 @@ "id": "CVE-2023-7043", "sourceIdentifier": "security@eset.com", "published": "2024-01-31T13:15:10.147", - "lastModified": "2024-01-31T14:05:19.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:00:15.637", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Unquoted service path in ESET products allows to \n\ndrop a prepared program to a specific location\u00a0and\u00a0run on boot with the \n\nNT AUTHORITY\\NetworkService\u00a0permissions." + }, + { + "lang": "es", + "value": "La ruta de servicio sin comillas en los productos ESET permite colocar un programa preparado en una ubicaci\u00f3n espec\u00edfica y ejecutarlo al arrancar con los permisos NT AUTHORITY\\NetworkService." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "security@eset.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + }, { "source": "security@eset.com", "type": "Secondary", @@ -46,10 +80,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.2046.0", + "versionEndExcluding": "11.0.2032.0", + "matchCriteriaId": "50677A92-50F3-4020-BC55-B3C6FDB4511D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.2046.0", + "versionEndExcluding": "11.0.2032.0", + "matchCriteriaId": "74708E09-04BF-47C1-88A9-B2A0C0FCF3B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.14.0", + "versionEndExcluding": "17.0.15.0", + "matchCriteriaId": "84EF91DD-15F6-4EF8-8B5F-C4CF4DBCBDF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:mail_security:10.1.10012.0:*:*:*:*:exchange_server:*:*", + "matchCriteriaId": "18A15279-74DB-487D-A585-BB07482505E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.14.0", + "versionEndExcluding": "17.0.15.0", + "matchCriteriaId": "D18A8A98-430B-495B-AAD9-8198E995F77E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eset:smart_security_premium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.1.14.0", + "versionEndExcluding": "17.0.15.0", + "matchCriteriaId": "555830F1-6B12-44F7-B912-9061E0EB6E46" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.eset.com/en/ca8602", - "source": "security@eset.com" + "source": "security@eset.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json index fe9a09a6f27..b6309f9a307 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0408", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T16:15:08.380", - "lastModified": "2024-01-31T13:15:10.350", + "lastModified": "2024-02-09T02:15:08.383", "vulnStatus": "Modified", "descriptions": [ { @@ -226,6 +226,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/", + "source": "secalert@redhat.com" + }, { "url": "https://security.gentoo.org/glsa/202401-30", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json index a5b6b13f6d5..a3dcdf83a5b 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0409", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T16:15:08.593", - "lastModified": "2024-01-31T13:15:10.460", + "lastModified": "2024-02-09T02:15:08.533", "vulnStatus": "Modified", "descriptions": [ { @@ -227,6 +227,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/", + "source": "secalert@redhat.com" + }, { "url": "https://security.gentoo.org/glsa/202401-30", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0749.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0749.json index 2bec633a721..b8f23e15c72 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0749.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0749.json @@ -2,12 +2,12 @@ "id": "CVE-2024-0749", "sourceIdentifier": "security@mozilla.org", "published": "2024-01-23T14:15:38.550", - "lastModified": "2024-02-02T17:18:54.040", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T02:15:08.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7." + "value": "A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7." }, { "lang": "es", @@ -128,14 +128,6 @@ "Vendor Advisory" ] }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", - "source": "security@mozilla.org", - "tags": [ - "Release Notes", - "Vendor Advisory" - ] - }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "source": "security@mozilla.org", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0914.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0914.json index cf907a091d8..2a312eceba6 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0914.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0914.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0914", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T05:15:08.137", - "lastModified": "2024-01-31T14:05:27.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:01:38.453", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -50,18 +80,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opencryptoki_project:opencryptoki:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.23.0", + "matchCriteriaId": "9AE1F758-E210-415A-9834-97D4F3721348" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-0914", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260407", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://people.redhat.com/~hkario/marvin/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json index 3eec24ad9fc..8c206428b4a 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1283.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1283", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-07T00:15:56.323", - "lastModified": "2024-02-07T01:11:27.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:15:08.810", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", "value": "Heap buffer overflow in Skia in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "El desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en Skia en Google Chrome anterior a 121.0.6167.160 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n el almacenamiento din\u00e1mico a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], "metrics": {}, @@ -19,6 +23,10 @@ { "url": "https://issues.chromium.org/issues/41494860", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json index cd7f3ed0cf2..f5e1d1b153e 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1284.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1284", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-07T00:15:56.380", - "lastModified": "2024-02-07T01:11:27.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:15:08.883", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", "value": "Use after free in Mojo in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Use after free en Mojo en Google Chrome anterior a 121.0.6167.160 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del almacenamiento din\u00e1mico a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], "metrics": {}, @@ -19,6 +23,10 @@ { "url": "https://issues.chromium.org/issues/41494539", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1353.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1353.json new file mode 100644 index 00000000000..8580ee82bff --- /dev/null +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1353.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-1353", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-02-09T01:15:09.140", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in PHPEMS up to 1.0. Affected by this issue is the function index of the file app/weixin/controller/index.api.php. The manipulation of the argument picurl leads to deserialization. The exploit has been disclosed to the public and may be used. VDB-253226 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.5, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://note.zhaoj.in/share/nxGzfEB6fFVY", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.253226", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.253226", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20001.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20001.json index 14ae4601546..9da764c25f0 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20001.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20001.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20001", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.027", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:02:13.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,378 @@ "value": "En TVAPI, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: DTV03961601; ID del problema: DTV03961601." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C394724-3294-4953-85C8-EE3894B5092C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E684A498-10F3-4BD8-9935-9ED5933F9157" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96BD96BE-10BC-4C7E-8A48-C7CB08A61765" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75A56009-090B-4101-B000-224412058654" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBFB4E04-7BC0-4B48-ABD7-6971E4725895" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*", + "matchCriteriaId": "354492FD-4052-41F8-805E-55F387AF8F17" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EAAF66C-9C81-498B-A0C0-3295CB7324A9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "350ED16A-35A5-4F54-A01F-6EADE58E5530" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6133E43-E032-4334-88C7-116B27B3090D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49437377-6D2F-40FD-8CCF-29179C19D296" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B45803F-1AD2-47C8-BB9B-276628A0D605" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B028E80F-396F-4898-841D-9E99DE54FAC2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB0DB25-6CFF-4688-B423-6CC0252C3B59" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B250A0A-BE50-45B6-AD72-8EA876F64DD4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9C5A33A-7B04-4E14-A268-A717CD2420DA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85C42802-293E-448B-A059-DFDEF1D97EC2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F19E7E64-721E-436B-B879-D1EDE5EFF84C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49ED757E-42DD-4176-B216-915EFD8E2F40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26696662-6232-458A-A1E1-067CBDB62FA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BA3286D-A136-4EB2-A181-6EF8A556EFDF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A9F24C9-2A69-44D9-A16B-E4187230F984" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E92602E3-1B1B-4683-801D-D151919C63EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AF44498-001B-4A51-AB32-EBC206B14741" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2E6E130-9F65-482B-AF8B-97DA81FCE19E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE404F4-FFAE-4646-9234-15230F0577F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CF26725-1701-40F4-83E9-1A4709B60763" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*", + "matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1C6E88C-46DD-45AB-88C1-B69FC0E25056" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63BC3AE7-4180-4B8C-AB69-8AC4F502700D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB80E351-B6E5-4571-A603-04A3A6AFB8CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD7AC916-FF8D-430D-837C-0587056198AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94F5F738-459C-4316-80AF-1B9C33E0F36B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*", + "matchCriteriaId": "717AE700-78CC-4750-92CB-C9293571EC7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json index fb52675790f..d0780a1fc1a 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20002", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.083", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:01:37.090", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,378 @@ "value": "En TVAPI, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: DTV03961715; ID del problema: DTV03961715." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C394724-3294-4953-85C8-EE3894B5092C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E684A498-10F3-4BD8-9935-9ED5933F9157" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96BD96BE-10BC-4C7E-8A48-C7CB08A61765" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75A56009-090B-4101-B000-224412058654" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A07610A-173B-4DF2-8DAD-D2FF07EB9A17" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EC50C1C-A31D-4EDF-AB6A-FA1E92AE7F2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEE06B45-7F23-4EB5-9885-4FCA0FC0D5C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBFB4E04-7BC0-4B48-ABD7-6971E4725895" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*", + "matchCriteriaId": "354492FD-4052-41F8-805E-55F387AF8F17" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE1DD6A9-E503-4A8E-92FF-625CD734DBD6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EAAF66C-9C81-498B-A0C0-3295CB7324A9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E1092AC-60EC-453C-9AA9-8F35A2A6DF92" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "350ED16A-35A5-4F54-A01F-6EADE58E5530" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6133E43-E032-4334-88C7-116B27B3090D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49437377-6D2F-40FD-8CCF-29179C19D296" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B45803F-1AD2-47C8-BB9B-276628A0D605" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B028E80F-396F-4898-841D-9E99DE54FAC2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB0DB25-6CFF-4688-B423-6CC0252C3B59" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E90123-D7DC-4C68-B2F9-27DCEDED2FC6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B250A0A-BE50-45B6-AD72-8EA876F64DD4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9C5A33A-7B04-4E14-A268-A717CD2420DA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FAC84405-17EE-4C25-8477-317F2A6A095F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85C42802-293E-448B-A059-DFDEF1D97EC2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F19E7E64-721E-436B-B879-D1EDE5EFF84C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEEB709-8C7B-48AF-B359-9CE9C68790D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6081A92B-4361-462A-9F7F-570AC7256CDB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49ED757E-42DD-4176-B216-915EFD8E2F40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26696662-6232-458A-A1E1-067CBDB62FA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BA3286D-A136-4EB2-A181-6EF8A556EFDF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A9F24C9-2A69-44D9-A16B-E4187230F984" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD04E099-75F4-48F6-BB8C-28A5D6FB8F60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E92602E3-1B1B-4683-801D-D151919C63EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AF44498-001B-4A51-AB32-EBC206B14741" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2E6E130-9F65-482B-AF8B-97DA81FCE19E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "311AFBA9-A0AD-4638-ACFF-0D4AC12FA127" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E5EE7B-1208-4007-AF87-6DC309FFE312" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE404F4-FFAE-4646-9234-15230F0577F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA834B63-F689-48BA-84E6-500351990BFD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF1B3B37-22C4-42F4-8264-07512619D706" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CF26725-1701-40F4-83E9-1A4709B60763" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B89606-5FD7-4513-984A-16217D37BF4B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76F4FC23-534B-449A-8344-1F13AE9C8C57" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*", + "matchCriteriaId": "392C9A58-EAB1-44B5-B189-98C68CC23199" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1C6E88C-46DD-45AB-88C1-B69FC0E25056" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D0EF507-52A0-45D1-AC26-97F765E691FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C826242C-440E-4D85-841E-570E9C69777C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63BC3AE7-4180-4B8C-AB69-8AC4F502700D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB80E351-B6E5-4571-A603-04A3A6AFB8CB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A4E9A32-6267-4AB3-B9A9-BBC79ED2F343" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD7AC916-FF8D-430D-837C-0587056198AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8531FD76-C0C1-45FE-8FDC-26402FF8BFA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94F5F738-459C-4316-80AF-1B9C33E0F36B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "046B7E06-8C40-4D37-8D10-4816E51CA143" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*", + "matchCriteriaId": "717AE700-78CC-4750-92CB-C9293571EC7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD9AD54-9F0F-414B-8936-3A981657D6AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B429106-36BE-42F2-8D05-FB9EF00BDFBA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7D78E76-6A3B-4736-B7E7-C9032CDA845B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B84CEB95-BF9E-42E3-90F4-70B1C7EE41A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json index a0dcad4d12e..b2c18154832 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20003", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.130", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:01:04.183", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,173 @@ "value": "En Modem NL1, existe una posible falla del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio, si NW env\u00eda un mensaje de configuraci\u00f3n de conexi\u00f3n NR RRC no v\u00e1lido, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01191612; ID del problema: MOLY01191612 (MSV-981)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json index 6f5e9f741d2..cc4d10c7c89 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20004", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.190", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:04:19.843", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,173 @@ "value": "En Modem NL1, existe una posible falla del sistema debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio, si NW env\u00eda un mensaje de configuraci\u00f3n de conexi\u00f3n NR RRC no v\u00e1lido, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY01191612; ID del problema: MOLY01195812 (MSV-985)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99B87E31-AC92-445B-94B8-33DBF72EC11C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json index ce9ad91d3e9..0754b737f4f 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20006", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.233", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:04:52.490", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,113 @@ "value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08477148; ID del problema: ALPS08477148." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*", + "matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*", + "matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20007.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20007.json index 5417341cad7..fa920d38101 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20007.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20007", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.283", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:05:10.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,252 @@ "value": "En el decodificador de mp3, existe una posible escritura fuera de los l\u00edmites debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08441369; ID del problema: ALPS08441369." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20009.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20009.json index f2d7b438274..0b2ab717427 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20009.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20009", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.330", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:05:28.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,248 @@ "value": "En el decodificador alac, existe una posible escritura fuera de los l\u00edmites debido a un manejo incorrecto de errores. Esto podr\u00eda conducir a una escalada remota de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08441150; ID del problema: ALPS08441150." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json index 8e010f8c0ab..9bb1b938fc7 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20010", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.387", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:05:47.917", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,368 @@ "value": "En keyInstall, existe una posible escalada de privilegios debido a confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08358560; ID del problema: ALPS08358560." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20011.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20011.json index 9f61d0e4d4c..700d5402c42 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20011.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20011.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20011", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.447", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:06:03.160", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,168 @@ "value": "En el decodificador alac, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08441146; ID del problema: ALPS08441146." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8127:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD7BDC63-3963-4C4D-B547-2936006926E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8135:-:*:*:*:*:*:*:*", + "matchCriteriaId": "182A995C-2453-4DF2-ABCC-A885D8C334C0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8176:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E5B22E8-3536-4DBC-8E71-3E14FE45A887" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195z:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B3A37B9-F500-4B3C-B77C-B2BD7B015154" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8312c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39915BEC-73D4-46B7-B52C-CED910AF3CA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8312d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF828C6-4B05-4E12-9B78-782F1F062F39" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20012.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20012.json index 38eb4389ff3..5ff39add4c4 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20012.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20012", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.490", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:06:22.713", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,328 @@ "value": "En keyInstall, existe una posible escalada de privilegios debido a confusi\u00f3n de tipos. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08358566; ID del problema: ALPS08358566." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20013.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20013.json index 76646729cb2..1167edc0259 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20013.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20013", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.530", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:06:40.570", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,373 @@ "value": "En keyInstall, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08471742; ID del problema: ALPS08308608." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BF784DB-3560-4045-BB32-F12DCF4C43B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D808EF4D-0A54-4324-8341-240F7AFABC40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64EDB89E-8140-4202-97B3-9D7337E90FDE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2C5CC4F-DA66-4980-A4BB-693987431A38" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json index bb2ba4286e2..ed75d96d593 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20015", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.580", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:06:59.953", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,278 @@ "value": "En telephony, existe una posible escalada de privilegios debido a una omisi\u00f3n de permisos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08441419; ID del problema: ALPS08441419." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", + "matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", + "matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json index 29f918986df..91defe21dad 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20016", "sourceIdentifier": "security@mediatek.com", "published": "2024-02-05T06:15:47.627", - "lastModified": "2024-02-05T13:54:33.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:07:50.523", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,258 @@ "value": "En ged, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local con los privilegios de ejecuci\u00f3n de System necesarios. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS07835901; ID del problema: ALPS07835901." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C82E144B-0BAD-47E1-A657-3A5880988FE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E76B29F-007E-4445-B3F3-3FDC054FEB84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7362AED0-47F2-4D48-A292-89F717F0697E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", + "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", + "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/February-2024", - "source": "security@mediatek.com" + "source": "security@mediatek.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20955.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20955.json index 923a3379d7c..428effa41f3 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20955.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20955", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-01-16T22:15:42.647", - "lastModified": "2024-01-26T22:15:11.647", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T02:26:25.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -57,6 +57,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:graalvm:20.3.12:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "D17D1EA4-A45F-4D8D-BA3E-4898EC6D48B7" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:graalvm:21.3.8:*:*:*:enterprise:*:*:*", @@ -69,13 +74,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:jdk:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "EF6AA431-8965-4B53-AF0F-DB3AB7A9A3F3" + "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2C5055FD-0E19-4C42-9B1F-CBE222855156" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:jre:17.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "BF274813-F650-447C-A1A6-61D5F8FF71BA" + "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "04738DE7-2BFE-4C06-ABE0-FCA099B5FFEC" } ] } diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22236.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22236.json index 368c41502ca..de5531dac4f 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22236.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22236.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22236", "sourceIdentifier": "security@vmware.com", "published": "2024-01-31T07:15:07.697", - "lastModified": "2024-01-31T14:05:27.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:01:27.447", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "security@vmware.com", "type": "Secondary", @@ -38,10 +58,56 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:spring_cloud_contract:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.10", + "matchCriteriaId": "36CB4DBB-F5DB-4E5C-9D59-6499710BE4B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:spring_cloud_contract:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.5", + "matchCriteriaId": "7634805F-40C1-4BCA-A83F-AED0D141CAD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:spring_cloud_contract:4.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2B852868-633D-4A85-A5A0-503C354F5D4A" + } + ] + } + ] + } + ], "references": [ { "url": "https://spring.io/security/cve-2024-22236", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json new file mode 100644 index 00000000000..24bccb5fe9f --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22318", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-09T01:15:09.440", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279091", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7116091", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22332.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22332.json new file mode 100644 index 00000000000..f85cedbccca --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22332.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22332", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-09T01:15:09.650", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The IBM Integration Bus for z/OS 10.1 through 10.1.0.2 AdminAPI is vulnerable to a denial of service due to file system exhaustion. IBM X-Force ID: 279972." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279972", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://https://www.ibm.com/support/pages/node/7116046", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23170.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23170.json index af7f5d6a9e8..a430e71b218 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23170.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23170.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23170", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-31T08:15:42.220", - "lastModified": "2024-01-31T14:05:19.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:01:16.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,75 @@ "value": "Se descubri\u00f3 un problema en Mbed TLS 2.x anterior a 2.28.7 y 3.x anterior a 3.5.2. Hab\u00eda un canal lateral de sincronizaci\u00f3n en las operaciones privadas de RSA. Este canal lateral podr\u00eda ser suficiente para que un atacante local recupere el texto plano. Requiere que el atacante env\u00ede una gran cantidad de mensajes para descifrarlos, como se describe en \"Everlasting ROBOT: the Marvin Attack\" de Hubert Kario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.28.7", + "matchCriteriaId": "E5465284-4EA3-4126-9130-374140F24FB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.5.2", + "matchCriteriaId": "7B335AD2-884E-4C89-8366-6BF91036BB1B" + } + ] + } + ] + } + ], "references": [ { "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json index 2481aface49..a3496fad261 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23206", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:10.840", - "lastModified": "2024-02-06T02:15:08.810", + "lastModified": "2024-02-09T02:15:08.950", "vulnStatus": "Modified", "descriptions": [ { @@ -161,6 +161,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", "source": "product-security@apple.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/en-us/HT214055", "source": "product-security@apple.com", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json index 8d3ae6adf8e..329a1299fda 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23213", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:11.183", - "lastModified": "2024-02-06T02:15:08.903", + "lastModified": "2024-02-09T02:15:09.080", "vulnStatus": "Modified", "descriptions": [ { @@ -162,6 +162,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", "source": "product-security@apple.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/en-us/HT214055", "source": "product-security@apple.com", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json index 0123dc25188..d40f5bfc96e 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23222", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:11.500", - "lastModified": "2024-02-06T02:15:09.010", + "lastModified": "2024-02-09T02:15:09.197", "vulnStatus": "Modified", "cisaExploitAdd": "2024-01-23", "cisaActionDue": "2024-02-13", @@ -185,6 +185,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", "source": "product-security@apple.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/en-us/HT214055", "source": "product-security@apple.com", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23639.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23639.json new file mode 100644 index 00000000000..a31c04886d3 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23639.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-23639", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-02-09T01:15:09.867", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Micronaut Framework is a modern, JVM-based, full stack Java framework designed for building modular, easily testable JVM applications with support for Java, Kotlin and the Groovy language. Enabled but unsecured management endpoints are susceptible to drive-by localhost attacks. While not typical of a production application, these attacks may have more impact on a development environment where such endpoints may be flipped on without much thought. A malicious/compromised website can make HTTP requests to `localhost`. Normally, such requests would trigger a CORS preflight check which would prevent the request; however, some requests are \"simple\" and do not require a preflight check. These endpoints, if enabled and not secured, are vulnerable to being triggered. Production environments typically disable unused endpoints and secure/restrict access to needed endpoints. A more likely victim is the developer in their local development host, who has enabled endpoints without security for the sake of easing development. This issue has been addressed in version 3.8.3. Users are advised to upgrade." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-15" + }, + { + "lang": "en", + "value": "CWE-610" + }, + { + "lang": "en", + "value": "CWE-664" + } + ] + } + ], + "references": [ + { + "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-583g-g682-crxf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json index b14970f1ba9..8a4781eb57b 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23650.json @@ -2,16 +2,40 @@ "id": "CVE-2024-23650", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:53.990", - "lastModified": "2024-02-01T03:18:21.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:38:44.823", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit client or frontend could craft a request that could lead to BuildKit daemon crashing with a panic. The issue has been fixed in v0.12.5. As a workaround, avoid using BuildKit frontends from untrusted sources.\n" + }, + { + "lang": "es", + "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Un cliente o interfaz de BuildKit malicioso podr\u00eda crear una solicitud que podr\u00eda provocar que el daemon BuildKit se bloquee en p\u00e1nico. El problema se solucion\u00f3 en v0.12.5. Como workaround, evite utilizar interfaces BuildKit de fuentes que no sean de confianza." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.12.5", + "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/moby/buildkit/pull/4601", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://github.com/moby/buildkit/security/advisories/GHSA-9p26-698r-w4hx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json index 55b2a9b7921..e962e70933e 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23651.json @@ -2,16 +2,40 @@ "id": "CVE-2024-23651", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:54.183", - "lastModified": "2024-02-01T03:18:21.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:43:51.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.\n" + }, + { + "lang": "es", + "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Dos pasos de compilaci\u00f3n maliciosos que se ejecutan en paralelo y comparten los mismos montajes de cach\u00e9 con subrutas podr\u00edan causar una condici\u00f3n de ejecuci\u00f3n que puede hacer que los archivos del sistema host sean accesibles al contenedor de compilaci\u00f3n. El problema se solucion\u00f3 en v0.12.5. Los workarounds incluyen evitar el uso de la interfaz de BuildKit desde una fuente que no es de confianza o crear un Dockerfile que no sea de confianza que contenga montajes de cach\u00e9 con las opciones --mount=type=cache,source=...." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.12.5", + "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/moby/buildkit/pull/4604", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://github.com/moby/buildkit/security/advisories/GHSA-m3r6-h7wv-7xxv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json index f4fd9a7256b..bf5553a44d4 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23652.json @@ -2,16 +2,40 @@ "id": "CVE-2024-23652", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:54.377", - "lastModified": "2024-02-01T03:18:21.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:44:27.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature." + }, + { + "lang": "es", + "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Una interfaz de BuildKit maliciosa o un Dockerfile que use RUN --mount podr\u00eda enga\u00f1ar a la funci\u00f3n que elimina archivos vac\u00edos creados para los puntos de montaje para que elimine un archivo fuera del contenedor, del sistema host. El problema se solucion\u00f3 en v0.12.5. Los workarounds incluyen evitar el uso de interfaces de BuildKit desde una fuente que no sea de confianza o crear un Dockerfile que no sea de confianza que contenga la funci\u00f3n RUN --mount." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.12.5", + "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/moby/buildkit/pull/4603", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json index d640bc29cb3..aa755b3ecb2 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23653.json @@ -2,16 +2,40 @@ "id": "CVE-2024-23653", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:54.600", - "lastModified": "2024-02-01T03:18:21.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:44:46.710", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n" + }, + { + "lang": "es", + "value": "BuildKit es un conjunto de herramientas para convertir c\u00f3digo fuente para crear artefactos de manera eficiente, expresiva y repetible. Adem\u00e1s de ejecutar contenedores como pasos de compilaci\u00f3n, BuildKit tambi\u00e9n proporciona API para ejecutar contenedores interactivos basados en im\u00e1genes creadas. Era posible utilizar estas API para pedirle a BuildKit que ejecutara un contenedor con privilegios elevados. Normalmente, la ejecuci\u00f3n de dichos contenedores solo se permite si el derecho especial `security.insecure` est\u00e1 habilitado tanto por la configuraci\u00f3n de buildkitd como por el usuario que inicializa la solicitud de compilaci\u00f3n. El problema se solucion\u00f3 en v0.12.5. Evite el uso de interfaces BuildKit de fuentes no confiables." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mobyproject:buildkit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.12.5", + "matchCriteriaId": "0AAE2F08-4E4D-4B85-8230-8D5BA7788D3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/moby/buildkit/pull/4602", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://github.com/moby/buildkit/security/advisories/GHSA-wr6v-9f75-vh2g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23756.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23756.json index 24651ec272e..08c04a89b3a 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23756.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23756.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23756", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T21:15:08.380", - "lastModified": "2024-02-08T21:15:08.380", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23775.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23775.json index 8383fb87a0d..77d165e7eab 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23775.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23775", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-31T08:15:42.267", - "lastModified": "2024-01-31T14:05:19.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:00:58.837", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,75 @@ "value": "Vulnerabilidad de desbordamiento de enteros en Mbed TLS 2.x anterior a 2.28.7 y 3.x anterior a 3.5.2 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de mbedtls_x509_set_extension()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.28.7", + "matchCriteriaId": "E5465284-4EA3-4126-9130-374140F24FB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.5.2", + "matchCriteriaId": "7B335AD2-884E-4C89-8366-6BF91036BB1B" + } + ] + } + ] + } + ], "references": [ { "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23917.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23917.json index 6366301d6eb..1abe540f534 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23917.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23917", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:09.280", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:05:22.180", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.11.3", + "matchCriteriaId": "8A42DE00-46DF-4A6D-A913-539C6054945B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24001.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24001.json index 1a718ee5f02..9e5c2d55255 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24001.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24001.json @@ -2,23 +2,87 @@ "id": "CVE-2024-24001", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T00:15:56.443", - "lastModified": "2024-02-07T01:11:27.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:10:25.807", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "jshERP v3.3 is vulnerable to SQL Injection. via the com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findallocationDetail() function of jshERP which allows an attacker to construct malicious payload to bypass jshERP's protection mechanism." + }, + { + "lang": "es", + "value": "jshERP v3.3 es vulnerable a la inyecci\u00f3n SQL. a trav\u00e9s de la funci\u00f3n com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findallocationDetail() de jshERP que permite a un atacante construir un payload malicioso para evitar el mecanismo de protecci\u00f3n de jshERP." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A549663F-7809-4723-9F1F-251DB15E31CA" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24001.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/jishenghua/jshERP/issues/99", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24002.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24002.json index d5cdcd8acfe..c21fc4835f6 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24002.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24002.json @@ -2,23 +2,86 @@ "id": "CVE-2024-24002", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T00:15:56.503", - "lastModified": "2024-02-07T01:11:27.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:10:13.973", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection." + }, + { + "lang": "es", + "value": "jshERP v3.3 es vulnerable a la inyecci\u00f3n SQL. La funci\u00f3n com.jsh.erp.controller.MaterialController: com.jsh.erp.utils.BaseResponseInfo getListWithStock() de jshERP no filtra los par\u00e1metros de `columna` y `orden` lo suficientemente bien, y un atacante puede construir un payload malicioso para eludir los de jshERP. Mecanismo de protecci\u00f3n en el m\u00e9todo `safeSqlParse` para inyecci\u00f3n SQL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A549663F-7809-4723-9F1F-251DB15E31CA" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24002.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/jishenghua/jshERP/issues/99", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json index 0c73a056982..12bf9fe339c 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24004.json @@ -2,23 +2,87 @@ "id": "CVE-2024-24004", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-07T00:15:56.550", - "lastModified": "2024-02-07T01:11:27.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T02:10:07.263", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutDetail() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection." + }, + { + "lang": "es", + "value": "jshERP v3.3 es vulnerable a la inyecci\u00f3n SQL. La funci\u00f3n com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutDetail() de jshERP no filtra los par\u00e1metros de `columna` y `orden` lo suficientemente bien, y un atacante puede construir un payload malicioso para eludir los par\u00e1metros de jshERP Mecanismo de protecci\u00f3n en el m\u00e9todo `safeSqlParse` para inyecci\u00f3n SQL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A549663F-7809-4723-9F1F-251DB15E31CA" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24004.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/jishenghua/jshERP/issues/99", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24393.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24393.json index 926776aabd5..2d982b8c861 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24393.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24393.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24393", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T22:15:09.130", - "lastModified": "2024-02-08T22:15:09.130", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24397.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24397.json index f49567f750b..a96374a5b42 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24397.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24397.json @@ -2,27 +2,93 @@ "id": "CVE-2024-24397", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T16:15:55.493", - "lastModified": "2024-02-05T18:25:55.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:06:54.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross Site Scripting en Stimulsoft GmbH Stimulsoft Dashboard.JS anterior a v.2024.1.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el campo ReportName." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stimulsoft:dashboards:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "2024.1.2", + "matchCriteriaId": "D5824CDC-F493-4CC0-A3C4-C21B21F8527B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "http://stimulsoft.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://cves.at/posts/cve-2024-24397/writeup/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24494.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24494.json index 0886aec1c0c..17a054db7fb 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24494.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24494.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24494", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T21:15:08.437", - "lastModified": "2024-02-08T21:15:08.437", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24495.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24495.json index 51ad3f2feaa..0f346191d3d 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24495.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24495", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T21:15:08.490", - "lastModified": "2024-02-08T21:15:08.490", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24496.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24496.json index cf5ed8fffe2..506051af38c 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24496.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24496.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24496", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T21:15:08.537", - "lastModified": "2024-02-08T21:15:08.537", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24497.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24497.json index 5907667862a..9b8d9d0781a 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24497.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24497.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24497", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T21:15:08.590", - "lastModified": "2024-02-08T21:15:08.590", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24498.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24498.json index 6e84f570279..44793d9175a 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24498.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24498.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24498", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T21:15:08.640", - "lastModified": "2024-02-08T21:15:08.640", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24499.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24499.json index 7e5e9240de4..c09cd7632f7 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24499.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24499.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24499", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-08T21:15:08.693", - "lastModified": "2024-02-08T21:15:08.693", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:59.330", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24752.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24752.json index dca46cbd31c..71117131afe 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24752.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24752.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24752", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T16:17:14.487", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:45:17.263", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and for each which contains a file, it is extracted and saved in `/tmp` with a random filename starting with `bref_upload_`. The flow mimics what plain PHP does but it does not delete the temporary files when the request has been processed. An attacker could fill the Lambda instance disk by performing multiple MultiPart requests containing files. This vulnerability is patched in 2.1.13." + }, + { + "lang": "es", + "value": "Bref habilita PHP sin servidor en AWS Lambda. Cuando se usa Bref con el tiempo de ejecuci\u00f3n de la funci\u00f3n controlada por eventos y el controlador es \"RequestHandlerInterface\", el evento Lambda se convierte en un objeto PSR7. Durante el proceso de conversi\u00f3n, si la solicitud es MultiPart, cada parte se analiza y, para cada una de las que contiene un archivo, se extrae y se guarda en `/tmp` con un nombre de archivo aleatorio que comienza con `bref_upload_`. El flujo imita lo que hace el PHP plano pero no elimina los archivos temporales cuando se procesa la solicitud. Un atacante podr\u00eda llenar el disco de la instancia de Lambda realizando m\u00faltiples solicitudes MultiPart que contengan archivos. Esta vulnerabilidad est\u00e1 parcheada en 2.1.13." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +70,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.13", + "matchCriteriaId": "D8473D9F-5007-4ADC-B256-FD331BB522A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/brefphp/bref/commit/350788de12880b6fd64c4c318ba995388bec840e", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24753.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24753.json index ef88dc3a2ff..cdf8f068dc5 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24753.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24753.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24753", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T16:17:14.690", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:46:12.560", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Bref enable serverless PHP on AWS Lambda. When Bref is used in combination with an API Gateway with the v2 format, it does not handle multiple values headers. If PHP generates a response with two headers having the same key but different values only the latest one is kept. If an application relies on multiple headers with the same key being set for security reasons, then Bref would lower the application security. For example, if an application sets multiple `Content-Security-Policy` headers, then Bref would just reflect the latest one. This vulnerability is patched in 2.1.13." + }, + { + "lang": "es", + "value": "Bref habilita PHP sin servidor en AWS Lambda. Cuando Bref se usa en combinaci\u00f3n con una API Gateway con el formato v2, no maneja encabezados de valores m\u00faltiples. Si PHP genera una respuesta con dos encabezados que tienen la misma clave pero valores diferentes, solo se conserva el \u00faltimo. Si una aplicaci\u00f3n se basa en varios encabezados con la misma clave configurada por razones de seguridad, Bref reducir\u00eda la seguridad de la aplicaci\u00f3n. Por ejemplo, si una aplicaci\u00f3n establece varios encabezados \"Content-Security-Policy\", Bref solo reflejar\u00e1 el \u00faltimo. Esta vulnerabilidad est\u00e1 parcheada en 2.1.13." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +70,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.13", + "matchCriteriaId": "D8473D9F-5007-4ADC-B256-FD331BB522A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/brefphp/bref/commit/f834027aaf88b3885f4aa8edf6944ae920daf2dc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/brefphp/bref/security/advisories/GHSA-99f9-gv72-fw9r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24754.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24754.json index 131551a703b..370c332b9b5 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24754.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24754.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24754", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T16:17:14.877", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:56:35.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the `$files` or `$parsedBody` arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13." + }, + { + "lang": "es", + "value": "Bref habilita PHP sin servidor en AWS Lambda. Cuando se usa Bref con el tiempo de ejecuci\u00f3n de la funci\u00f3n controlada por eventos y el controlador es \"RequestHandlerInterface\", el evento Lambda se convierte en un objeto PSR7. Durante el proceso de conversi\u00f3n, si la solicitud es MultiPart, cada parte se analiza y su contenido se agrega en las matrices `$files` o `$parsedBody`. El proceso de conversi\u00f3n produce un resultado diferente en comparaci\u00f3n con el de PHP simple cuando se utilizan claves que terminan en un corchete abierto ([). Seg\u00fan la l\u00f3gica de la aplicaci\u00f3n, la diferencia en el an\u00e1lisis del cuerpo podr\u00eda generar vulnerabilidades y/o comportamientos indefinidos. Esta vulnerabilidad est\u00e1 parcheada en 2.1.13." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +70,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.13", + "matchCriteriaId": "D8473D9F-5007-4ADC-B256-FD331BB522A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/brefphp/bref/commit/c77d9f5abf021f29fa96b5720b7b84adbd199092", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24819.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24819.json new file mode 100644 index 00000000000..1eee36418ed --- /dev/null +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24819.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-24819", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-02-09T01:15:10.080", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "icingaweb2-module-incubator is a working project of bleeding edge Icinga Web 2 libraries. In affected versions the class `gipfl\\Web\\Form` is the base for various concrete form implementations [1] and provides protection against cross site request forgery (CSRF) by default. This is done by automatically adding an element with a CSRF token to any form, unless explicitly disabled, but even if enabled, the CSRF token (sent during a client's submission of a form relying on it) is not validated. This enables attackers to perform changes on behalf of a user which, unknowingly, interacts with a prepared link or website. The version 0.22.0 is available to remedy this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Icinga/icingaweb2-module-incubator/commit/db7dc49585fee0b4e96be666d7f6009a74a1ccb5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icingaweb2-module-incubator/security/advisories/GHSA-p8vv-9pqq-rm8p", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/search?q=gipfl%5CWeb%5CForm%3B&type=code", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24820.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24820.json index 4826aec912f..646e9add8d3 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24820.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24820.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24820", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-09T00:15:08.437", - "lastModified": "2024-02-09T00:15:08.437", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24821.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24821.json index 0254db0a7be..3a70a487019 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24821.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24821.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24821", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-09T00:15:08.680", - "lastModified": "2024-02-09T00:15:08.680", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24825.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24825.json index 91a140a5d8e..e4125682e7d 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24825.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24825.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24825", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-09T00:15:08.903", - "lastModified": "2024-02-09T00:15:08.903", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24829.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24829.json index 10a01541df5..53ee0a11f64 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24829.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24829.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24829", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-09T00:15:09.117", - "lastModified": "2024-02-09T00:15:09.117", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24830.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24830.json index 9f8abc582b0..88aa181f95e 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24830.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24830.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24830", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-08T23:15:10.153", - "lastModified": "2024-02-08T23:15:10.153", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24936.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24936.json index f08efd1dd05..2ca722008f6 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24936.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24936.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24936", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:09.553", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:06:20.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.11.2", + "matchCriteriaId": "9BAFF38E-6AE3-4E05-9218-8A7C9A0AA66B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24937.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24937.json index 1444810c9a7..9ceef191bb9 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24937.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24937.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24937", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:09.957", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:05:30.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.11.2", + "matchCriteriaId": "9BAFF38E-6AE3-4E05-9218-8A7C9A0AA66B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json index f99e02a2e51..c6d27d1ae3e 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24938.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24938", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:10.303", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:05:13.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.11.2", + "matchCriteriaId": "9BAFF38E-6AE3-4E05-9218-8A7C9A0AA66B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24939.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24939.json index 199fcb9a7eb..fdff17ce44a 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24939.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24939", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:10.603", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:04:16.577", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.3.3", + "matchCriteriaId": "2F457E78-614D-4352-AA4C-3BA7CF826CC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24941.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24941.json index 511fd871e7b..a18b062a819 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24941.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24941", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:11.183", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:05:05.250", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.3.3", + "matchCriteriaId": "B6A738AA-5898-4BA9-BA67-E8647F7CDAED" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24942.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24942.json index 7641c9d8baf..ad52384b8ac 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24942.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24942.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24942", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:11.590", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:03:13.453", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.11.3", + "matchCriteriaId": "8A42DE00-46DF-4A6D-A913-539C6054945B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24943.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24943.json index 97741337795..5d49430e2c1 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24943.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24943", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-02-06T10:15:11.837", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T01:03:03.970", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:toolbox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2", + "matchCriteriaId": "BCC75999-D31F-4471-AD3F-F5439AC524AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25106.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25106.json index 93cddb55b81..3ad1f093f64 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25106.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25106.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25106", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-08T23:15:10.360", - "lastModified": "2024-02-08T23:15:10.360", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25107.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25107.json index 682d99ea3db..797e55da0b7 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25107.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25107", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-08T23:15:10.583", - "lastModified": "2024-02-08T23:15:10.583", - "vulnStatus": "Received", + "lastModified": "2024-02-09T01:37:53.353", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 4c2a6d1a08a..e1518dba4a8 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-09T00:55:15.040763+00:00 +2024-02-09T03:00:24.960458+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-09T00:52:17.807000+00:00 +2024-02-09T02:54:11.277000+00:00 ``` ### Last Data Feed Release @@ -23,64 +23,60 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-02-08T01:00:28.263520+00:00 +2024-02-09T01:00:28.232666+00:00 ``` ### Total Number of included CVEs ```plain -237993 +238003 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `10` -* [CVE-2022-0931](CVE-2022/CVE-2022-09xx/CVE-2022-0931.json) (`2024-02-08T23:15:09.470`) -* [CVE-2023-40262](CVE-2023/CVE-2023-402xx/CVE-2023-40262.json) (`2024-02-08T23:15:09.683`) -* [CVE-2023-40263](CVE-2023/CVE-2023-402xx/CVE-2023-40263.json) (`2024-02-08T23:15:09.730`) -* [CVE-2023-40264](CVE-2023/CVE-2023-402xx/CVE-2023-40264.json) (`2024-02-08T23:15:09.773`) -* [CVE-2023-47131](CVE-2023/CVE-2023-471xx/CVE-2023-47131.json) (`2024-02-08T23:15:09.827`) -* [CVE-2023-47132](CVE-2023/CVE-2023-471xx/CVE-2023-47132.json) (`2024-02-08T23:15:09.877`) -* [CVE-2023-51630](CVE-2023/CVE-2023-516xx/CVE-2023-51630.json) (`2024-02-08T23:15:09.933`) -* [CVE-2024-24830](CVE-2024/CVE-2024-248xx/CVE-2024-24830.json) (`2024-02-08T23:15:10.153`) -* [CVE-2024-25106](CVE-2024/CVE-2024-251xx/CVE-2024-25106.json) (`2024-02-08T23:15:10.360`) -* [CVE-2024-25107](CVE-2024/CVE-2024-251xx/CVE-2024-25107.json) (`2024-02-08T23:15:10.583`) -* [CVE-2024-24820](CVE-2024/CVE-2024-248xx/CVE-2024-24820.json) (`2024-02-09T00:15:08.437`) -* [CVE-2024-24821](CVE-2024/CVE-2024-248xx/CVE-2024-24821.json) (`2024-02-09T00:15:08.680`) -* [CVE-2024-24825](CVE-2024/CVE-2024-248xx/CVE-2024-24825.json) (`2024-02-09T00:15:08.903`) -* [CVE-2024-24829](CVE-2024/CVE-2024-248xx/CVE-2024-24829.json) (`2024-02-09T00:15:09.117`) +* [CVE-2023-32341](CVE-2023/CVE-2023-323xx/CVE-2023-32341.json) (`2024-02-09T01:15:08.033`) +* [CVE-2023-42016](CVE-2023/CVE-2023-420xx/CVE-2023-42016.json) (`2024-02-09T01:15:08.260`) +* [CVE-2023-45187](CVE-2023/CVE-2023-451xx/CVE-2023-45187.json) (`2024-02-09T01:15:08.493`) +* [CVE-2023-45190](CVE-2023/CVE-2023-451xx/CVE-2023-45190.json) (`2024-02-09T01:15:08.707`) +* [CVE-2023-45191](CVE-2023/CVE-2023-451xx/CVE-2023-45191.json) (`2024-02-09T01:15:08.890`) +* [CVE-2024-1353](CVE-2024/CVE-2024-13xx/CVE-2024-1353.json) (`2024-02-09T01:15:09.140`) +* [CVE-2024-22318](CVE-2024/CVE-2024-223xx/CVE-2024-22318.json) (`2024-02-09T01:15:09.440`) +* [CVE-2024-22332](CVE-2024/CVE-2024-223xx/CVE-2024-22332.json) (`2024-02-09T01:15:09.650`) +* [CVE-2024-23639](CVE-2024/CVE-2024-236xx/CVE-2024-23639.json) (`2024-02-09T01:15:09.867`) +* [CVE-2024-24819](CVE-2024/CVE-2024-248xx/CVE-2024-24819.json) (`2024-02-09T01:15:10.080`) ### CVEs modified in the last Commit -Recently modified CVEs: `27` +Recently modified CVEs: `112` -* [CVE-2005-1036](CVE-2005/CVE-2005-10xx/CVE-2005-1036.json) (`2024-02-08T23:47:27.637`) -* [CVE-2005-2456](CVE-2005/CVE-2005-24xx/CVE-2005-2456.json) (`2024-02-09T00:44:12.917`) -* [CVE-2007-3749](CVE-2007/CVE-2007-37xx/CVE-2007-3749.json) (`2024-02-09T00:35:32.037`) -* [CVE-2008-0081](CVE-2008/CVE-2008-00xx/CVE-2008-0081.json) (`2024-02-08T23:42:31.667`) -* [CVE-2008-2934](CVE-2008/CVE-2008-29xx/CVE-2008-2934.json) (`2024-02-08T23:43:34.487`) -* [CVE-2008-3688](CVE-2008/CVE-2008-36xx/CVE-2008-3688.json) (`2024-02-08T23:44:44.063`) -* [CVE-2008-3475](CVE-2008/CVE-2008-34xx/CVE-2008-3475.json) (`2024-02-08T23:46:51.967`) -* [CVE-2008-0063](CVE-2008/CVE-2008-00xx/CVE-2008-0063.json) (`2024-02-09T00:35:55.777`) -* [CVE-2008-0062](CVE-2008/CVE-2008-00xx/CVE-2008-0062.json) (`2024-02-09T00:42:52.807`) -* [CVE-2009-2692](CVE-2009/CVE-2009-26xx/CVE-2009-2692.json) (`2024-02-08T23:50:03.097`) -* [CVE-2009-0949](CVE-2009/CVE-2009-09xx/CVE-2009-0949.json) (`2024-02-09T00:17:23.450`) -* [CVE-2009-3620](CVE-2009/CVE-2009-36xx/CVE-2009-3620.json) (`2024-02-09T00:20:34.557`) -* [CVE-2009-2523](CVE-2009/CVE-2009-25xx/CVE-2009-2523.json) (`2024-02-09T00:24:53.217`) -* [CVE-2009-0935](CVE-2009/CVE-2009-09xx/CVE-2009-0935.json) (`2024-02-09T00:39:40.193`) -* [CVE-2019-9805](CVE-2019/CVE-2019-98xx/CVE-2019-9805.json) (`2024-02-08T23:43:00.703`) -* [CVE-2020-20739](CVE-2020/CVE-2020-207xx/CVE-2020-20739.json) (`2024-02-08T23:50:31.537`) -* [CVE-2021-1782](CVE-2021/CVE-2021-17xx/CVE-2021-1782.json) (`2024-02-09T00:41:25.647`) -* [CVE-2022-36349](CVE-2022/CVE-2022-363xx/CVE-2022-36349.json) (`2024-02-09T00:12:08.327`) -* [CVE-2023-40087](CVE-2023/CVE-2023-400xx/CVE-2023-40087.json) (`2024-02-09T00:23:21.477`) -* [CVE-2023-40084](CVE-2023/CVE-2023-400xx/CVE-2023-40084.json) (`2024-02-09T00:24:31.993`) -* [CVE-2023-43513](CVE-2023/CVE-2023-435xx/CVE-2023-43513.json) (`2024-02-09T00:49:48.173`) -* [CVE-2023-43516](CVE-2023/CVE-2023-435xx/CVE-2023-43516.json) (`2024-02-09T00:50:24.280`) -* [CVE-2023-43517](CVE-2023/CVE-2023-435xx/CVE-2023-43517.json) (`2024-02-09T00:51:20.140`) -* [CVE-2023-43518](CVE-2023/CVE-2023-435xx/CVE-2023-43518.json) (`2024-02-09T00:51:42.733`) -* [CVE-2023-43523](CVE-2023/CVE-2023-435xx/CVE-2023-43523.json) (`2024-02-09T00:52:17.807`) +* [CVE-2024-20003](CVE-2024/CVE-2024-200xx/CVE-2024-20003.json) (`2024-02-09T02:01:04.183`) +* [CVE-2024-20002](CVE-2024/CVE-2024-200xx/CVE-2024-20002.json) (`2024-02-09T02:01:37.090`) +* [CVE-2024-20001](CVE-2024/CVE-2024-200xx/CVE-2024-20001.json) (`2024-02-09T02:02:13.153`) +* [CVE-2024-20004](CVE-2024/CVE-2024-200xx/CVE-2024-20004.json) (`2024-02-09T02:04:19.843`) +* [CVE-2024-20006](CVE-2024/CVE-2024-200xx/CVE-2024-20006.json) (`2024-02-09T02:04:52.490`) +* [CVE-2024-20007](CVE-2024/CVE-2024-200xx/CVE-2024-20007.json) (`2024-02-09T02:05:10.947`) +* [CVE-2024-20009](CVE-2024/CVE-2024-200xx/CVE-2024-20009.json) (`2024-02-09T02:05:28.177`) +* [CVE-2024-20010](CVE-2024/CVE-2024-200xx/CVE-2024-20010.json) (`2024-02-09T02:05:47.917`) +* [CVE-2024-20011](CVE-2024/CVE-2024-200xx/CVE-2024-20011.json) (`2024-02-09T02:06:03.160`) +* [CVE-2024-20012](CVE-2024/CVE-2024-200xx/CVE-2024-20012.json) (`2024-02-09T02:06:22.713`) +* [CVE-2024-20013](CVE-2024/CVE-2024-200xx/CVE-2024-20013.json) (`2024-02-09T02:06:40.570`) +* [CVE-2024-20015](CVE-2024/CVE-2024-200xx/CVE-2024-20015.json) (`2024-02-09T02:06:59.953`) +* [CVE-2024-20016](CVE-2024/CVE-2024-200xx/CVE-2024-20016.json) (`2024-02-09T02:07:50.523`) +* [CVE-2024-24004](CVE-2024/CVE-2024-240xx/CVE-2024-24004.json) (`2024-02-09T02:10:07.263`) +* [CVE-2024-24002](CVE-2024/CVE-2024-240xx/CVE-2024-24002.json) (`2024-02-09T02:10:13.973`) +* [CVE-2024-24001](CVE-2024/CVE-2024-240xx/CVE-2024-24001.json) (`2024-02-09T02:10:25.807`) +* [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-02-09T02:15:08.383`) +* [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-02-09T02:15:08.533`) +* [CVE-2024-0749](CVE-2024/CVE-2024-07xx/CVE-2024-0749.json) (`2024-02-09T02:15:08.690`) +* [CVE-2024-1283](CVE-2024/CVE-2024-12xx/CVE-2024-1283.json) (`2024-02-09T02:15:08.810`) +* [CVE-2024-1284](CVE-2024/CVE-2024-12xx/CVE-2024-1284.json) (`2024-02-09T02:15:08.883`) +* [CVE-2024-23206](CVE-2024/CVE-2024-232xx/CVE-2024-23206.json) (`2024-02-09T02:15:08.950`) +* [CVE-2024-23213](CVE-2024/CVE-2024-232xx/CVE-2024-23213.json) (`2024-02-09T02:15:09.080`) +* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-09T02:15:09.197`) +* [CVE-2024-20955](CVE-2024/CVE-2024-209xx/CVE-2024-20955.json) (`2024-02-09T02:26:25.517`) ## Download and Usage