diff --git a/CVE-2021/CVE-2021-363xx/CVE-2021-36394.json b/CVE-2021/CVE-2021-363xx/CVE-2021-36394.json index 81b8687ccc3..b426530b829 100644 --- a/CVE-2021/CVE-2021-363xx/CVE-2021-36394.json +++ b/CVE-2021/CVE-2021-363xx/CVE-2021-36394.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36394", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-06T21:15:10.447", - "lastModified": "2024-11-21T06:13:40.443", + "lastModified": "2025-03-06T16:15:37.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -55,6 +55,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4265.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4265.json index 368e9a3a7f5..bb18a493596 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4265.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4265.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4265", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-06T14:15:09.537", - "lastModified": "2024-11-21T07:34:54.190", + "lastModified": "2025-03-06T16:15:39.280", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43974.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43974.json index 6dd389f28ed..7345223ea35 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43974.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43974.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43974", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-09T09:15:10.043", - "lastModified": "2024-11-21T07:27:27.703", + "lastModified": "2025-03-06T16:15:37.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47476.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47476.json index ea05a2fece5..e209e778c8f 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47476.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47476.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47476", "sourceIdentifier": "security@unisoc.com", "published": "2023-03-10T21:15:13.923", - "lastModified": "2024-11-21T07:32:02.470", + "lastModified": "2025-03-06T16:15:38.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47479.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47479.json index 6e9ec66f166..a0810d7b82f 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47479.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47479.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47479", "sourceIdentifier": "security@unisoc.com", "published": "2023-03-10T21:15:14.087", - "lastModified": "2024-11-21T07:32:02.840", + "lastModified": "2025-03-06T16:15:38.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-496xx/CVE-2022-49614.json b/CVE-2022/CVE-2022-496xx/CVE-2022-49614.json index 9e42da1ca43..bea04ce4efa 100644 --- a/CVE-2022/CVE-2022-496xx/CVE-2022-49614.json +++ b/CVE-2022/CVE-2022-496xx/CVE-2022-49614.json @@ -2,28 +2,15 @@ "id": "CVE-2022-49614", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:36.837", - "lastModified": "2025-02-26T07:01:36.837", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:15:39.210", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: use struct group for generic command dwords\n\nThis will allow the trace event to know the full size of the data\nintended to be copied and silence read overflow checks." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme: usar grupo de estructuras para dwords de comandos gen\u00e9ricos Esto permitir\u00e1 que el evento de seguimiento conozca el tama\u00f1o completo de los datos que se pretenden copiar y silencie las comprobaciones de desbordamiento de lectura." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/3d8b35387e01cab217dc4691a6f770cbb6ed852c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/5c629dc9609dc43492a7bc8060cc6120875bf096", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0063.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0063.json index c71488d2f6f..4039ebecbe7 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0063.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0063.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0063", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-06T14:15:09.890", - "lastModified": "2024-11-21T07:36:29.137", + "lastModified": "2025-03-06T15:15:12.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0064.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0064.json index b1f611d3205..5e16b49029e 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0064.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0064.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0064", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-06T14:15:09.960", - "lastModified": "2024-11-21T07:36:29.240", + "lastModified": "2025-03-06T15:15:13.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0068.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0068.json index 53a5b0029b3..cac25a874f1 100644 --- a/CVE-2023/CVE-2023-00xx/CVE-2023-0068.json +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0068.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0068", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-06T14:15:10.107", - "lastModified": "2024-11-21T07:36:29.650", + "lastModified": "2025-03-06T15:15:13.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0165.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0165.json index 7a7737ca769..6f7a31d437b 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0165.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0165.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0165", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-06T14:15:10.407", - "lastModified": "2024-11-21T07:36:40.253", + "lastModified": "2025-03-06T15:15:13.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0212.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0212.json index f3c464bad9e..4765df97ab0 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0212.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0212.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0212", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-06T14:15:10.483", - "lastModified": "2024-11-21T07:36:45.487", + "lastModified": "2025-03-06T15:15:13.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0328.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0328.json index db7bc2894dc..9fc43710730 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0328.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0328.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0328", "sourceIdentifier": "contact@wpscan.com", "published": "2023-03-06T14:15:10.573", - "lastModified": "2024-11-21T07:36:58.870", + "lastModified": "2025-03-06T16:15:39.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1203.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1203.json index 3ed4bb8a981..43fb9100316 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1203.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1203.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1203", "sourceIdentifier": "security@devolutions.net", "published": "2023-03-10T21:15:14.680", - "lastModified": "2024-11-21T07:38:39.760", + "lastModified": "2025-03-06T15:15:13.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-213xx/CVE-2023-21376.json b/CVE-2023/CVE-2023-213xx/CVE-2023-21376.json index c241e5722fe..03020f17285 100644 --- a/CVE-2023/CVE-2023-213xx/CVE-2023-21376.json +++ b/CVE-2023/CVE-2023-213xx/CVE-2023-21376.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21376", "sourceIdentifier": "security@android.com", "published": "2023-10-30T18:15:09.100", - "lastModified": "2024-11-21T07:42:44.527", + "lastModified": "2025-03-06T16:15:39.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json index 2ef1335ca13..34987ca56de 100644 --- a/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json +++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22069", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-10-17T22:15:12.687", - "lastModified": "2024-11-21T07:44:12.910", + "lastModified": "2025-03-06T16:15:39.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json index 1fe9f3df78a..0ac5220c982 100644 --- a/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json +++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22072", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-10-17T22:15:12.910", - "lastModified": "2024-11-21T07:44:13.260", + "lastModified": "2025-03-06T16:15:39.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22513.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22513.json index 950ee4060ad..939f38ab7d4 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22513.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22513.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22513", "sourceIdentifier": "security@atlassian.com", "published": "2023-09-19T17:15:08.017", - "lastModified": "2024-11-21T07:44:57.667", + "lastModified": "2025-03-06T16:15:40.103", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -71,6 +71,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24776.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24776.json index d2d7849f30f..7a918b90248 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24776.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24776.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24776", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-06T20:15:09.857", - "lastModified": "2024-11-21T07:48:23.833", + "lastModified": "2025-03-06T16:15:40.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25144.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25144.json index 44b5390fda7..1cb46028b0c 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25144.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25144.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25144", "sourceIdentifier": "security@trendmicro.com", "published": "2023-03-10T21:15:14.943", - "lastModified": "2024-11-21T07:49:11.603", + "lastModified": "2025-03-06T16:15:40.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-266xx/CVE-2023-26600.json b/CVE-2023/CVE-2023-266xx/CVE-2023-26600.json index f0947a87f7c..39b6cb92248 100644 --- a/CVE-2023/CVE-2023-266xx/CVE-2023-26600.json +++ b/CVE-2023/CVE-2023-266xx/CVE-2023-26600.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26600", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-06T20:15:09.913", - "lastModified": "2024-11-21T07:51:49.920", + "lastModified": "2025-03-06T16:15:40.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3108.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3108.json index 4e653b3ea1a..901f6ef2d7e 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3108.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3108.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3108", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-11T16:15:12.083", - "lastModified": "2024-11-21T08:16:28.583", + "lastModified": "2025-03-06T16:15:42.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,20 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32560.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32560.json index bf0fbe50ae3..d8158f94a4c 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32560.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32560.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32560", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-10T20:15:10.200", - "lastModified": "2024-11-21T08:03:36.150", + "lastModified": "2025-03-06T16:15:41.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -67,6 +67,20 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32561.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32561.json index b025003ad50..ae0bc6869d5 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32561.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32561.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32561", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-10T20:15:10.287", - "lastModified": "2024-11-21T08:03:36.280", + "lastModified": "2025-03-06T16:15:41.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -67,6 +67,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32562.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32562.json index a21a49456b1..0bd686d098d 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32562.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32562.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32562", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-10T20:15:10.360", - "lastModified": "2024-11-21T08:03:36.400", + "lastModified": "2025-03-06T16:15:41.573", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -67,6 +67,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34057.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34057.json index 3f78c899d09..b3642a79f90 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34057.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34057.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34057", "sourceIdentifier": "security@vmware.com", "published": "2023-10-27T05:15:38.837", - "lastModified": "2024-11-21T08:06:29.487", + "lastModified": "2025-03-06T16:15:41.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json index a21b161c931..46633109d5a 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34058", "sourceIdentifier": "security@vmware.com", "published": "2023-10-27T05:15:38.957", - "lastModified": "2024-11-21T08:06:29.613", + "lastModified": "2025-03-06T16:15:41.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-347" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json index 6a3fdd6c96b..fee6c0dcd7a 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34059", "sourceIdentifier": "security@vmware.com", "published": "2023-10-27T05:15:39.013", - "lastModified": "2024-11-21T08:06:29.770", + "lastModified": "2025-03-06T16:15:42.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ @@ -233,6 +243,10 @@ "tags": [ "Not Applicable" ] + }, + { + "url": "https://www.openwall.com/lists/oss-security/2023/10/27/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37362.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37362.json index c737283ae15..e3097b86ba4 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37362.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37362.json @@ -2,13 +2,13 @@ "id": "CVE-2023-37362", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-07-19T22:15:11.380", - "lastModified": "2024-11-21T08:11:35.107", + "lastModified": "2025-03-06T15:15:14.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\n\n\nWeintek Weincloud v0.13.6\n\n \n\ncould allow an attacker to abuse the registration functionality to login with testing credentials to the official website.\n\n\n\n\n\n" + "value": "Weintek Weincloud v0.13.6\n\n \n\ncould allow an attacker to abuse the registration functionality to login with testing credentials to the official website." } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-522" } ] } diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38547.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38547.json index 304c5b2c499..88fb8cf0e4a 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38547.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38547.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38547", "sourceIdentifier": "support@hackerone.com", "published": "2023-11-07T07:15:07.387", - "lastModified": "2024-11-21T08:13:48.367", + "lastModified": "2025-03-06T16:15:42.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -71,6 +71,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38548.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38548.json index 9326b105022..981679a0128 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38548.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38548.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38548", "sourceIdentifier": "support@hackerone.com", "published": "2023-11-07T07:15:08.673", - "lastModified": "2024-11-21T08:13:48.483", + "lastModified": "2025-03-06T16:15:42.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -71,6 +71,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json index 4dffa330ba6..1f1941e69d2 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3814", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:09.570", - "lastModified": "2024-11-21T08:18:07.877", + "lastModified": "2025-03-06T16:15:42.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -83,6 +103,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://wpscan.com/vulnerability/ca954ec6-6ebd-4d72-a323-570474e2e339", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4059.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4059.json index 9e933b313e5..58ea2476219 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4059.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4059.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4059", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.110", - "lastModified": "2024-11-21T08:34:19.340", + "lastModified": "2025-03-06T16:15:43.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -87,6 +107,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://wpscan.com/vulnerability/fc719d12-2f58-4d1f-b696-0f937e706842", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41929.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41929.json index d7535ec2a03..761373eded7 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41929.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41929.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41929", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-18T12:15:07.470", - "lastModified": "2024-11-21T08:21:56.380", + "lastModified": "2025-03-06T16:15:42.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41955.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41955.json index dce518900c3..483f397a391 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41955.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41955.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41955", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T07:15:59.920", - "lastModified": "2024-11-21T08:21:59.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.8.9", + "matchCriteriaId": "D766209B-2253-44F3-A898-CA9D572EAC09" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/essential-addons-for-elementor-lite/wordpress-essential-addons-for-elementor-plugin-5-8-8-contributor-privilege-escalation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/essential-addons-for-elementor-lite/wordpress-essential-addons-for-elementor-plugin-5-8-8-contributor-privilege-escalation-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4151.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4151.json index 9be2be74761..55f0e75f2c4 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4151.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4151.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4151", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.187", - "lastModified": "2024-11-21T08:34:29.463", + "lastModified": "2025-03-06T16:15:44.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -71,6 +91,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://wpscan.com/vulnerability/c9d80aa4-a26d-4b3f-b7bf-9d2fb0560d7b", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42540.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42540.json index c7dc4c4ef50..1ef1473c389 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42540.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42540.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42540", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-11-07T08:15:19.577", - "lastModified": "2024-11-21T08:22:44.950", + "lastModified": "2025-03-06T16:15:43.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42541.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42541.json index a7139327656..8706f8292b7 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42541.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42541.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42541", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-11-07T08:15:19.953", - "lastModified": "2024-11-21T08:22:45.060", + "lastModified": "2025-03-06T16:15:43.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42542.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42542.json index c27c60794e4..1fbfd05aae9 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42542.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42542.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42542", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-11-07T08:15:20.220", - "lastModified": "2024-11-21T08:22:45.167", + "lastModified": "2025-03-06T16:15:43.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42553.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42553.json index e2575b0ceb0..de3020bc52f 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42553.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42553.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42553", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-11-07T08:15:23.367", - "lastModified": "2024-11-21T08:22:46.417", + "lastModified": "2025-03-06T16:15:43.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42554.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42554.json index 13562ac5b87..14d4f2f39eb 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42554.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42554.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42554", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-11-07T08:15:23.610", - "lastModified": "2024-11-21T08:22:46.537", + "lastModified": "2025-03-06T16:15:43.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4284.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4284.json index 54954da04fa..00d6a33736f 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4284.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4284.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4284", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.627", - "lastModified": "2024-11-21T08:34:47.370", + "lastModified": "2025-03-06T16:15:44.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -71,6 +71,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://wpscan.com/vulnerability/1c126869-0afa-456f-94cc-10334964e5f9", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45000.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45000.json index 4a516dcb7f8..a63477e6607 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45000.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45000.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45000", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-16T18:15:10.790", - "lastModified": "2024-11-21T08:26:12.577", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.7.0.1", + "matchCriteriaId": "967FB0CF-DC74-4455-8237-A277E95FE632" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-broken-access-control-on-api-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-broken-access-control-on-api-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45272.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45272.json index d2e6209abca..e3adf66c3dc 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45272.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45272.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45272", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T15:15:19.400", - "lastModified": "2025-01-02T15:15:19.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T16:24:25.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:map_builder_for_google_maps:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.74", + "matchCriteriaId": "A05EF3ED-FE01-4BF3-9171-1BBBF52CD562" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wd-google-maps/vulnerability/wordpress-10web-map-builder-for-google-maps-plugin-1-0-73-notice-dismissal-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47233.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47233.json index d0fdb4edd97..afa63b5b07f 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47233.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47233.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47233", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T21:15:17.360", - "lastModified": "2024-11-21T08:30:00.123", + "lastModified": "2025-03-06T16:15:43.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47807.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47807.json index 0901f175e61..feb531edddc 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47807.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47807.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47807", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T15:15:20.607", - "lastModified": "2025-01-02T15:15:20.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T16:24:25.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:10webanalytics:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.12", + "matchCriteriaId": "B571FB14-DBD7-4A83-802A-5AD8EC930546" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/wd-google-analytics/vulnerability/wordpress-10webanalytics-plugin-1-2-12-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4800.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4800.json index 3e4b9b6e5be..12c3af32cb6 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4800.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4800.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4800", "sourceIdentifier": "contact@wpscan.com", "published": "2023-10-16T20:15:16.583", - "lastModified": "2024-11-21T08:35:59.570", + "lastModified": "2025-03-06T16:15:44.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -71,6 +91,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://wpscan.com/vulnerability/7eae1434-8c7a-4291-912d-a4a07b73ee56", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5143.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5143.json index 8e9b6b40e8e..5b3b790fa83 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5143.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5143.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5143", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-24T23:15:10.210", - "lastModified": "2024-11-21T08:41:08.990", + "lastModified": "2025-03-06T16:15:45.333", "vulnStatus": "Modified", "cveTags": [ { @@ -101,6 +101,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5269.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5269.json index 749caf57bd0..741c4451ee4 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5269.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5269.json @@ -2,13 +2,13 @@ "id": "CVE-2023-5269", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-29T16:15:10.697", - "lastModified": "2024-12-23T15:18:44.853", + "lastModified": "2025-03-06T15:15:14.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-240882 is the identifier assigned to this vulnerability." + "value": "A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id/s leads to sql injection. The exploit has been disclosed to the public and may be used." }, { "lang": "es", @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], "cvssMetricV31": [ { "source": "cna@vuldb.com", @@ -87,8 +131,12 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-74" + }, { "lang": "en", "value": "CWE-89" @@ -97,7 +145,7 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -150,6 +198,14 @@ "VDB Entry" ] }, + { + "url": "https://vuldb.com/?submit.212108", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + }, { "url": "https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%201.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10693.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10693.json index 1255b255ca3..32af688b32e 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10693.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10693.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10693", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-09T04:15:04.943", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sktthemes:skt_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4", + "matchCriteriaId": "4E1202A1-B160-48C4-8092-09F11AC2F9B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3183804%40skt-addons-for-elementor&new=3183804%40skt-addons-for-elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8accf552-f235-46dd-857b-330eef7765a0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10860.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10860.json index 1ca1e2991b7..84f87166915 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10860.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10860.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10860", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T10:15:09.963", - "lastModified": "2025-02-28T10:15:09.963", - "vulnStatus": "Received", + "lastModified": "2025-03-06T15:00:16.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NextMove Lite \u2013 Thank You Page for WooCommerce plugin for WordPress is vulnerable to unauthorized submission of data due to a missing capability check on the _submit_uninstall_reason_action() function in all versions up to, and including, 2.19.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit a deactivation reason on behalf of a site." + }, + { + "lang": "es", + "value": "El complemento NextMove Lite \u2013 Thank You Page for WooCommerce para WordPress es vulnerable al env\u00edo no autorizado de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n _submit_uninstall_reason_action() en todas las versiones hasta la 2.19.0 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, env\u00eden un motivo de desactivaci\u00f3n en nombre de un sitio." } ], "metrics": { @@ -45,16 +49,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xlplugins:nextmove:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "2.20.0", + "matchCriteriaId": "56448A09-D37C-4C9E-8343-757DF634EF68" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3246927/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5cefecf8-46dc-4ae1-9e94-b724beb7136f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12146.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12146.json new file mode 100644 index 00000000000..7e4246750c2 --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12146.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12146", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2025-03-06T15:15:15.137", + "lastModified": "2025-03-06T15:15:15.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Validation of Syntactic Correctness of Input vulnerability in Finder Fire Safety Finder ERP/CRM (New System) allows SQL Injection.This issue affects Finder ERP/CRM (New System): before 18.12.2024." + }, + { + "lang": "es", + "value": "Vulnerabilidad de validaci\u00f3n incorrecta de la correcci\u00f3n sint\u00e1ctica de la entrada en Finder Fire Safety Finder ERP/CRM (nuevo sistema) permite la inyecci\u00f3n de SQL. Este problema afecta a Finder ERP/CRM (nuevo sistema): antes del 18.12.2024." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1286" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-25-0060", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13868.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13868.json index 8ba23429d3c..52a31d375f2 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13868.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13868.json @@ -2,16 +2,55 @@ "id": "CVE-2024-13868", "sourceIdentifier": "contact@wpscan.com", "published": "2025-03-06T06:15:34.720", - "lastModified": "2025-03-06T06:15:34.720", + "lastModified": "2025-03-06T15:15:15.297", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The URL Shortener | Conversion Tracking | AB Testing | WooCommerce WordPress plugin through 9.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + }, + { + "lang": "es", + "value": "El complemento URL Shortener | Conversion Tracking | AB Testing | WooCommerce WordPress hasta la versi\u00f3n 9.0.2 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://wpscan.com/vulnerability/0bff1645-dd53-4416-a90f-7cf4a6b33c1a/", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1479.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1479.json index 5cc0c0b57f9..07ea0fad85c 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1479.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1479.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1479", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:23.013", - "lastModified": "2024-11-21T08:50:40.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,92 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:generatepress:wp_show_posts:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.5", + "matchCriteriaId": "DC81EC69-6B2E-414A-BF8B-50F3ADC98BB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-show-posts/trunk/wp-show-posts.php#L224", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-show-posts/trunk/wp-show-posts.php#L591", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041416%40wp-show-posts%2Ftrunk&old=2846296%40wp-show-posts%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6788e2ee-ce61-494b-8d7f-6d1144466e58?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-show-posts/trunk/wp-show-posts.php#L224", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-show-posts/trunk/wp-show-posts.php#L591", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041416%40wp-show-posts%2Ftrunk&old=2846296%40wp-show-posts%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6788e2ee-ce61-494b-8d7f-6d1144466e58?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1855.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1855.json index 44e841b59eb..79f1cf8f41a 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1855.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1855", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-23T02:15:08.277", - "lastModified": "2024-11-21T08:51:27.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themewinter:wpcafe:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.24", + "matchCriteriaId": "7109DDB1-DCB4-421B-BE80-F75AD85B39F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-cafe/trunk/core/action/wpc-ajax-action.php#L76", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3084054/wp-cafe/trunk/core/action/wpc-ajax-action.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f83c19e-1b75-4fea-b4de-f7f844a449c0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-cafe/trunk/core/action/wpc-ajax-action.php#L76", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3084054/wp-cafe/trunk/core/action/wpc-ajax-action.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f83c19e-1b75-4fea-b4de-f7f844a449c0?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json index 3c3891945b9..75916aaae56 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2112", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:28.017", - "lastModified": "2024-11-21T09:09:03.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.23", + "matchCriteriaId": "60ACC4E2-5B61-44A5-B086-FCCC3182383A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/form-maker/tags/1.15.22&old=3057012&new_path=/form-maker/tags/1.15.23&new=3057012&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5652f9c3-3cc9-4541-8209-40117b4d25d9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/form-maker/tags/1.15.22&old=3057012&new_path=/form-maker/tags/1.15.23&new=3057012&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5652f9c3-3cc9-4541-8209-40117b4d25d9?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2258.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2258.json index fadf5b22c70..959fe719b82 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2258.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2258.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2258", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-27T04:15:08.543", - "lastModified": "2024-11-21T09:09:21.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.25", + "matchCriteriaId": "F96ADA13-C5A6-4259-8368-BBC94FA12991" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3071515", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af1075a5-9efa-4b86-9798-6dbafcba4db5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3071515", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af1075a5-9efa-4b86-9798-6dbafcba4db5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json index 330d0ef1823..00deca64938 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2280.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2280", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-29T07:15:44.543", - "lastModified": "2024-11-21T09:09:25.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kitforest:better_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.2", + "matchCriteriaId": "98764366-369D-4C56-BD6D-7056FD937D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3060565%40better-elementor-addons&new=3060565%40better-elementor-addons&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/better-elementor-addons/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8d7ace3-af34-4951-810b-87923ef2ec30?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3060565%40better-elementor-addons&new=3060565%40better-elementor-addons&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/better-elementor-addons/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8d7ace3-af34-4951-810b-87923ef2ec30?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json index 147b9d78a4f..00cef36edac 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2289", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:30.813", - "lastModified": "2024-11-21T09:09:26.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbeaveraddons:powerpack_lite_for_beaver_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.0.1", + "matchCriteriaId": "E2DA49B5-749A-4C9B-9F1E-139BEFBCDC3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3051551/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a22c7b45-752c-482d-8812-888d5bc3d630?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3051551/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a22c7b45-752c-482d-8812-888d5bc3d630?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2296.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2296.json index c0d2d695cfe..d7325369aee 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2296.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2296", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-06T09:15:07.883", - "lastModified": "2024-11-21T09:09:27.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.22", + "matchCriteriaId": "58CE3C46-F773-4577-8A00-83AB7A8442C6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058445%40photo-gallery&new=3058445%40photo-gallery&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/994a044d-db69-4f2d-9027-cf3665446ed3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058445%40photo-gallery&new=3058445%40photo-gallery&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/994a044d-db69-4f2d-9027-cf3665446ed3?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json index 0d56e1e91a5..0c26ebbc7dd 100644 --- a/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25598", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:07.087", - "lastModified": "2024-11-21T09:01:03.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.3.1", + "matchCriteriaId": "079DAEE7-7483-46C2-A115-D76E94D3FFB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/addons-for-elementor/wordpress-elementor-addons-by-livemesh-plugin-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/addons-for-elementor/wordpress-elementor-addons-by-livemesh-plugin-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2604.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2604.json index 0d7bbc5d975..346374d382f 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2604.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2604", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T21:15:06.723", - "lastModified": "2024-11-21T09:10:06.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remyandrade:file_manager_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "13DCEB1D-966B-4E2E-99F8-F04FF9720D86" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257182", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257182", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257182", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257182", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28613.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28613.json index c07779c8950..533d7635e08 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28613.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28613.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28613", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-24T04:15:18.820", - "lastModified": "2024-11-21T09:06:41.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,87 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en PHP Task Management System v.1.0 permite a un atacante remoto escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro task_id del componente task-details.php y edit-task.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:php_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADEFAE0-BA75-4FCB-A8BE-796A163278DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hakkitoklu/hunt/blob/main/PHP%20Task%20Management%20System/sqli.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.sourcecodester.com/php/17217/employee-management-system-php-and-mysql-free-download.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/hakkitoklu/hunt/blob/main/PHP%20Task%20Management%20System/sqli.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.sourcecodester.com/php/17217/employee-management-system-php-and-mysql-free-download.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30423.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30423.json index 1ff00ddaea5..36a339f8d1f 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30423.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30423.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30423", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T14:15:08.680", - "lastModified": "2024-11-21T09:11:53.597", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kitforest:better_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.8", + "matchCriteriaId": "36755FFF-E97F-4D1C-BEED-8F284ED0AA3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31116.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31116.json index cee5a6fc96c..2618734533c 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31116.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31116.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31116", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-31T19:15:49.180", - "lastModified": "2024-11-21T09:12:53.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:map_builder_for_google_maps:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.74", + "matchCriteriaId": "CE804192-161A-4C1D-ACC7-9315FFA352F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wd-google-maps/wordpress-10web-map-builder-for-google-maps-plugin-1-0-74-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wd-google-maps/wordpress-10web-map-builder-for-google-maps-plugin-1-0-74-sql-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31525.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31525.json index 2afc5ac5cd5..b267fedf6b7 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31525.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31525.json @@ -2,16 +2,55 @@ "id": "CVE-2024-31525", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T19:15:37.340", - "lastModified": "2025-03-05T19:15:37.340", + "lastModified": "2025-03-06T15:15:15.607", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Peppermint Ticket Management 0.4.6 is vulnerable to Incorrect Access Control. A regular registered user is able to elevate his privileges to admin and gain complete access to the system as the authorization mechanism is not validated on the server side and only on the client side. This can result, for example, in creating a new admin user in the system which enables persistent access for the attacker as an administrator." + }, + { + "lang": "es", + "value": "Peppermint Ticket Management 0.4.6 es vulnerable a un control de acceso incorrecto. Un usuario registrado normal puede elevar sus privilegios a administrador y obtener acceso completo al sistema, ya que el mecanismo de autorizaci\u00f3n no est\u00e1 validado en el lado del servidor, sino solo en el lado del cliente. Esto puede dar como resultado, por ejemplo, la creaci\u00f3n de un nuevo usuario administrador en el sistema que permite el acceso persistente para el atacante como administrador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cwe.mitre.org/data/definitions/285.html", @@ -20,6 +59,10 @@ { "url": "https://github.com/Peppermint-Lab/peppermint/issues/258", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Peppermint-Lab/peppermint/issues/258", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32534.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32534.json index d6f903a0c99..cc02f81bceb 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32534.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32534.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32534", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-17T09:15:08.117", - "lastModified": "2024-11-21T09:15:07.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.24", + "matchCriteriaId": "905EB017-6751-4E0E-90E6-AFA1605A701E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-plugin-1-15-23-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-plugin-1-15-23-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32557.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32557.json index d0b2a191a5a..3d7c78e153a 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32557.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32557.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32557", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-16T07:15:12.030", - "lastModified": "2024-11-21T09:15:10.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "2.6.9.2", + "matchCriteriaId": "79286CD2-E262-4961-96D6-D7FBFFB2D420" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32578.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32578.json index e469ba5df73..d20c0b6626b 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32578.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32578", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-18T10:15:12.980", - "lastModified": "2024-11-21T09:15:13.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:slider:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.55", + "matchCriteriaId": "5CDDA903-B1B9-40F6-8656-B87991F0EB22" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/slider-wd/wordpress-sliderby10web-plugin-1-2-54-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/slider-wd/wordpress-sliderby10web-plugin-1-2-54-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32583.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32583.json index 9986cbd511b..33def6c43eb 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32583.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32583", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-18T10:15:13.920", - "lastModified": "2024-11-21T09:15:14.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.22", + "matchCriteriaId": "58CE3C46-F773-4577-8A00-83AB7A8442C6" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-21-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-21-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-325xx/CVE-2024-32593.json b/CVE-2024/CVE-2024-325xx/CVE-2024-32593.json index b286c02f97c..eb35521e25f 100644 --- a/CVE-2024/CVE-2024-325xx/CVE-2024-32593.json +++ b/CVE-2024/CVE-2024-325xx/CVE-2024-32593.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32593", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-18T09:15:13.257", - "lastModified": "2024-11-21T09:15:15.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbits:wpbits_addons_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4", + "matchCriteriaId": "8625D606-33DC-46C9-BF11-970F06A706ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpbits-addons-for-elementor/wordpress-wpbits-addons-for-elementor-page-builder-plugin-1-3-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wpbits-addons-for-elementor/wordpress-wpbits-addons-for-elementor-page-builder-plugin-1-3-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32644.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32644.json index b5bf6e37da2..f199c657820 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32644.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32644.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32644", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.960", - "lastModified": "2024-11-21T09:15:22.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,32 +69,78 @@ "value": "CWE-662" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.0.0", + "matchCriteriaId": "96100BA4-DC9E-4DD0-8D11-B249349B1184" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L460-L465", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/evmos/evmos/commit/08982b5ee726b97bc50eaf58d1914829648b6a5f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-3fp5-2xwh-fxm6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L460-L465", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/evmos/evmos/commit/08982b5ee726b97bc50eaf58d1914829648b6a5f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-3fp5-2xwh-fxm6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3221.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3221.json index 7c81418d02a..0a2e0930399 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3221.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3221", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T00:15:08.980", - "lastModified": "2024-11-21T09:29:10.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:php_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADEFAE0-BA75-4FCB-A8BE-796A163278DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SLthendieck/cve-report/blob/main/1.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259066", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259066", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308626", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/SLthendieck/cve-report/blob/main/1.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259066", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259066", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308626", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3222.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3222.json index 19114f97810..a0c0d7fac62 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3222.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3222", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T00:15:09.237", - "lastModified": "2024-11-21T09:29:10.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:php_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADEFAE0-BA75-4FCB-A8BE-796A163278DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SLthendieck/cve-report/blob/main/2.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259067", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259067", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308627", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/SLthendieck/cve-report/blob/main/2.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259067", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259067", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308627", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3223.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3223.json index ffe0aa54f0d..464bc2ddc60 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3223.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3223.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3223", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T01:16:05.023", - "lastModified": "2024-11-21T09:29:10.893", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:php_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADEFAE0-BA75-4FCB-A8BE-796A163278DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SLthendieck/cve-report/blob/main/3.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259068", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259068", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308628", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/SLthendieck/cve-report/blob/main/3.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259068", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259068", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.308628", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33541.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33541.json index e7770c59be7..2fc256308c9 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33541.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33541", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T13:15:51.717", - "lastModified": "2024-11-21T09:17:06.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kitforest:better_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.2", + "matchCriteriaId": "98764366-369D-4C56-BD6D-7056FD937D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-1-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-1-local-file-inclusion-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33586.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33586.json index b12f9635aee..ac592126acb 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33586.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33586.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33586", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-29T13:15:30.820", - "lastModified": "2024-11-21T09:17:12.380", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.21", + "matchCriteriaId": "AD0405E3-FD18-4494-BA14-75CF442735F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-20-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/photo-gallery/wordpress-photo-gallery-by-10web-plugin-1-8-20-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34432.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34432.json index 0900960369e..85599ad90f1 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34432.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34432.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34432", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:03.053", - "lastModified": "2024-11-21T09:18:39.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kitforest:better_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.5", + "matchCriteriaId": "13268EB7-F6DB-4EAA-8D85-EF3DBEFF5CC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37253.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37253.json index 093c9f56175..543dba1b4e5 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37253.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37253", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-09T10:15:03.933", - "lastModified": "2024-11-21T09:23:28.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-74" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdirectorykit:wp_directory_kit:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.7", + "matchCriteriaId": "BFB1CA85-A5CB-4DBF-B315-7611362F8C40" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpdirectorykit/wordpress-wpdirectorykit-plugin-1-3-2-html-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wpdirectorykit/wordpress-wpdirectorykit-plugin-1-3-2-html-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37517.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37517.json index e14cae1bcdb..e2fe294a49d 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37517.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37517.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37517", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:29.753", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:spectra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.13.8", + "matchCriteriaId": "2793850D-7090-4BC7-BB20-1A8A49204B30" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ultimate-addons-for-gutenberg/wordpress-spectra-plugin-2-13-7-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38311.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38311.json index 7e9d14504a8..32919e4fca8 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38311.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38311.json @@ -2,20 +2,47 @@ "id": "CVE-2024-38311", "sourceIdentifier": "security@apache.org", "published": "2025-03-06T12:15:34.157", - "lastModified": "2025-03-06T12:15:34.157", + "lastModified": "2025-03-06T16:15:45.760", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache Traffic Server.\n\nThis issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3.\n\nUsers are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Traffic Server. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 8.0.0 hasta la 8.1.11, desde la versi\u00f3n 9.0.0 hasta la 9.2.8, desde la versi\u00f3n 10.0.0 hasta la 10.0.3. Se recomienda a los usuarios actualizar a la versi\u00f3n 9.2.9 o 10.0.4, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38426.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38426.json index 2660e91257f..43c826a7653 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38426.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38426.json @@ -2,20 +2,24 @@ "id": "CVE-2024-38426", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:11.260", - "lastModified": "2025-03-03T11:15:11.260", - "vulnStatus": "Received", + "lastModified": "2025-03-06T15:21:24.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "While processing the authentication message in UE, improper authentication may lead to information disclosure." + }, + { + "lang": "es", + "value": "Al procesar el mensaje de autenticaci\u00f3n en la UE, una autenticaci\u00f3n incorrecta puede provocar la divulgaci\u00f3n de informaci\u00f3n." } ], "metrics": { "cvssMetricV31": [ { "source": "product-security@qualcomm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -47,10 +71,4443 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:315_5g_iot_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58DD55C5-DDF3-4C9E-9084-694543AEFB4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:315_5g_iot:*:*:*:*:*:*:*:*", + "matchCriteriaId": "54B0498C-FBD0-4335-9505-C8953024F6EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:9205_lte_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA1C725-EA2C-488F-AAAC-2781095AC134" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:9205_lte:*:*:*:*:*:*:*:*", + "matchCriteriaId": "00A67997-CC2E-4203-A2B2-8FDCE4CDC135" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C29494C-C342-4B83-B574-ECD706020DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F6F95AC0-C2B5-4EBF-905A-D3C6D1BD99A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBF42F8-50BA-4172-A3A0-7FD1BA4B3ED3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csrb31024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A57333A7-57E8-45EF-9FAC-B9497730464C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2321AF41-BFED-4567-B61D-EEB445C92511" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:*:*:*:*:*:*:*:*", + "matchCriteriaId": "353DE282-A541-4E6C-90B9-D79D36E179A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "279C3F0E-56E1-4878-9F02-5B71FD356D4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9205s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AEA758D-ECAD-4973-9586-2621CC3B2BA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9205s:*:*:*:*:*:*:*:*", + "matchCriteriaId": "59B8E6A2-EA14-4FF6-9024-6C245B95A4F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADC6FBEE-D2FA-4660-A078-D6CE2097653D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9628:*:*:*:*:*:*:*:*", + "matchCriteriaId": "95C5F72E-5F31-4D7C-8ED3-A19B7BF43B13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9640:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CA81177-89FF-4941-B1CC-D99069A030C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8996au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "574CE24F-6575-4D36-B351-13806C3C1730" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFB39496-8699-4DAF-BD7B-AE69260B20CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca4004:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E9FADBA-C1BE-460C-9696-F2525CD6225F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D5E6782E-CC46-450B-B0DD-B17D9EA7BD51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62DC4FBB-D9CB-43EB-829E-0A892306D0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6310:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4E8A5620-161F-45EF-B40C-C8383591FE19" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886CF046-E1D9-4FD4-AC02-EAB61C3F70FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6320:*:*:*:*:*:*:*:*", + "matchCriteriaId": "45144999-8CE2-4FD2-9070-1B1E633AE317" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3108B9-9A5F-4FE9-9E22-13B7A7EDE3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "00663346-5CF1-4901-9AA9-39B4E6B71778" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A342D02-01FD-4497-ADB2-2E7F6F9CF3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C613D1E-71EE-4730-A388-C1A38921D1DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CFB656-804A-453C-A39B-1B08C0A16BB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E0813A6D-5E70-48CE-8F32-8E1DAD5558A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5EAE2E0F-A4FF-4432-B455-E27BA359DD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:*:*:*:*:*:*:*:*", + "matchCriteriaId": "16297CD7-0688-4C89-8369-D4D1C653F6A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F0C8EF72-8147-408B-B0B6-B75A962A021B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9900E07-69F3-4C20-8211-513760BF7F9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc711_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A20DED6B-1CEF-4FC8-A6C9-176E34322D5F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc711:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2986CF65-8BCE-40B3-91FB-251FFE148D9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "723EAD03-6C32-4B1C-95C1-6FDA94F08151" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2825BB85-7AA1-45E4-95C3-92D405C977AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A62E8B-549B-4A89-BDCD-EAEF7083B7F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4220BE43-073D-4E0C-A572-0D300E3D85E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9FFECE-96F6-4230-A91F-8266AC13EEC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A08879B4-D5E7-426A-A4EC-70E05605E378" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "781E405C-F1AA-4825-9BE1-E091EA432D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB71A28-0E31-4052-B8AA-429ED63CEAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:*:*:*:*:*:*:*:*", + "matchCriteriaId": "374E91E7-4375-4EAF-9718-7FB2B94EE60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C4096902-AAA2-4CD4-863F-DFCB9D5A2887" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAD1884-D549-4E40-BF84-A49C49BE2475" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F85D0833-4F0F-489E-A47D-020D82D5E78F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDD25AC-DCC7-4B9E-A852-B7D467901739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D22BAC46-9C86-4346-BA5C-B090ABDFF86C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2534DFE0-C26E-4422-B788-DB0A6C3D27A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:*:*:*:*:*:*:*:*", + "matchCriteriaId": "065B25FE-2B77-4C60-9FB9-82D001BE4423" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "56D82472-1B6A-486D-A0B9-FDF87DCD5358" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:*:*:*:*:*:*:*:*", + "matchCriteriaId": "339B1A30-B78C-4A19-BF37-C402B54D86A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69944B37-CCD1-470B-A766-170948AC0AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65307900-11B4-4374-9656-462DC8059048" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2D4B026-2118-448D-A48D-36864DE715B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qts110:*:*:*:*:*:*:*:*", + "matchCriteriaId": "414B2D41-5F19-48C6-87F6-67E98D4EDCD3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:205_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E9FB225-819E-44FD-B6B9-8A49909750B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:205:*:*:*:*:*:*:*:*", + "matchCriteriaId": "840C033A-4EA7-4266-8D7F-66EF9D4D7D4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3667862-8469-4B33-9B2D-939EA07497E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:215:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B1743434-977D-458A-8BEA-132E6C41AD6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4F674F1B-3A7E-448C-A64C-5FD143B4B68F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86E9A547-9F3D-453E-B338-01F4D47479A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F674AEE0-9AF8-4BA9-A6CF-BBDBCDEB696C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D193E214-8DE0-4334-95D5-512123C0D879" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F900C8F-9763-441A-B97E-E5394A68A08A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "51F9A779-2DFF-46A8-BFC4-C6A2F3A9C624" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "788C622C-6D7D-4276-8E9E-833D5596908E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1497D052-884E-496B-BEF8-6904A25125ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "06FF6F86-28E4-45B6-871B-A5DDB331F3E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB70F81-3A5B-4839-8746-E60ABFA73F08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6BB8749B-33C8-411D-933A-8F778ECEBD97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E52771-4FB7-45DB-A349-4DD911F53752" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm429w:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E69E56-02B6-46FB-BEBD-B8B7178CD450" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AFB1F551-5ABB-40D7-B4BF-E1913AB25C92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx57m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3716039D-2947-4F74-ADB9-1BFDD5AD0E28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3125FCBA-94BA-415A-A005-CDC5B2CDBE39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx61:*:*:*:*:*:*:*:*", + "matchCriteriaId": "53DD36F1-19B4-4C48-87BD-03E16DED14FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx71m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44B3A95E-7D1B-4EAA-8FFF-E416EFB265D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx71m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EF09CA76-405A-4BED-BFDE-0D2334355460" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx80m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CAE7C89-05DD-4083-9DCE-68E02F77EA69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx80m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BE13DE5E-BCEB-4C85-9B08-C76F486A266A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A990A85A-34B9-4402-9F1E-588B880EE264" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "37D06270-BBE2-4C97-9F5F-51EEA79AD8D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D415D6A4-5586-4A9F-8F9C-BFA733A4A3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33A13707-4866-4016-BAAA-100C16E3F267" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2293C7B3-FB54-41C9-86B1-A9E175111BCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B8E47A4-4558-43D4-8FFB-EAC5A643140A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D8919F90-252F-401B-8CB5-76CEEEFF89E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7C8F35-52E6-465A-A794-5B4E67A57DC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8650q:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1458A539-FA35-4E1A-B02C-9391F7262176" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82AB582B-5F4B-48E6-BEF4-EE1991407A6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15838699-2BA0-4CF1-B3E6-0F80581C8DDD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_210:*:*:*:*:*:*:*:*", + "matchCriteriaId": "62AD839A-5894-4F36-A635-7757E021B42A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_212_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3495C094-A59C-42B4-B4EB-E45DEF5BEAC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_212:*:*:*:*:*:*:*:*", + "matchCriteriaId": "08A3C72C-3965-4B42-9393-75DB5A8DA001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C57BEA9E-2DAD-47E5-9777-DF835C83FC89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65AC22FB-C41B-4255-A4D8-6DB345AA51C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D0C530E-53E7-482B-8522-C632E98E756B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_429:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE109312-33AC-47CE-AEF0-E91B288CDA39" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_439_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5009631F-3632-4AF8-AC1B-A0570778B6D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_439:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F3D9037D-B828-4FA1-B082-52617396550D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4DA61D9-00F0-44AE-9821-41C730D85CA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460:*:*:*:*:*:*:*:*", + "matchCriteriaId": "312FA254-572C-41A2-83F8-F292F862496E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04DAFFC1-9038-4CEB-B181-C555BC0A3CF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC1664B3-034D-4D0A-A792-4ADCA22C575C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BE024DC-38BD-4AD5-8505-C3218C5FCF06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A6B708B-48B9-48CD-9AFB-0A5C892E82DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECA86357-66BD-4356-87DF-5AF445BC8DF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90B80966-2148-45AA-9E7D-EB3994D7DAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B6A9E9-F392-4F44-AC5D-00331C10F038" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_665:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75078FAE-679A-41C3-8DB6-068EE875461F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6976CA-9019-4B8A-84B1-58F73A0E2673" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "618CBEBD-0B1D-4A98-B4E6-1CFC10707A8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FDD354-0044-4BD2-B1B9-B89BE040070D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_678:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FCCD21-39FC-4B68-89E0-B3A9F4B1A932" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7C981FE-CD14-4DA0-86FE-94C34B490A36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CCD3ECCA-575E-4E68-990D-03843C55C5C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0989BA-DEBC-4B45-AC3A-F2033C17B93A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6653E682-718A-4892-BAD6-9B031491BA6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DCF8439-B259-43FE-B797-57C2D62A35E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "150C4223-4560-49A6-9080-AA73A739AB9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "624349A3-DAD6-4C93-A694-AB4CDC0F00EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BF6629A5-FC3F-448C-9BC3-0C88BADBD70B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CB628D4-566E-454D-B2B9-04A5533C6737" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0571FA3B-F1E1-4154-94A3-8F0F31C702AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7A5B684-09BB-4DD0-9F16-D3761EA37D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "32FD60FF-1974-44AC-A0C9-6B8776A18386" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8C1A76A-AD97-4A08-B45A-F9994D5455DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7C019467-2193-4A7B-9CAA-4F44D19EB058" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D8D5607-F0BC-46C9-A94F-1D28EE5A3F0E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8942236-F6DC-4769-89A7-7001093BC234" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F4659B0-547B-4492-9338-90B45B0462FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D579F9FE-7B00-4B19-A9A5-4A2AE9B101D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9D188A-2029-431E-A225-302C7795B891" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "741B4512-2150-4E92-A12F-A3CFBF5717D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A0CFBBA-C906-47AF-AEFF-AA65326A381C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1A45A5F5-ED4B-4D2B-A833-A5605E0A531C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "713B1CB7-985F-49F4-A5A7-23DFD0F4EA04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "35E751E0-C81B-4B77-A639-5C1C177BF303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8657+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B550EEA4-1EC6-4B41-83ED-17EBB0A87DE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8657+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBDA826B-7F77-4144-A73D-9378BD167A86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5B9E4C73-9B08-4D2D-842F-390FE1DB162B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27185AC4-AE5D-4499-98CD-BA4B38EB1205" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B2F707A0-F4F2-45AB-B85D-54CB75563F48" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCBBE02A-1E07-41B3-94B4-8CC9D772069D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g-rf_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A6B8530-70F0-44E7-BC22-6B0F1CA57EB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "158F6ED7-FB30-47BF-BDAE-91BED7A58157" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D745571E-0F4D-4ACB-8CBA-44E8F2A8444A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_1300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8571A7EB-7BF1-4613-8CCB-667995115FC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_1300:*:*:*:*:*:*:*:*", + "matchCriteriaId": "955AE844-00D3-4700-A024-7E8EFD179E95" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA1AEB2C-F420-46A6-8804-A35870153BAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BF05BA19-ABAE-4068-83FA-2E48898CF56E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x12_lte_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD477FCB-4FDE-43AD-8CA9-E64D8C95F8E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x12_lte:*:*:*:*:*:*:*:*", + "matchCriteriaId": "15919125-D919-438B-A95D-9E398E7011A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D3DDD9E-87AB-4FBC-904D-A5EC5EABF70F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B3B2AD2F-5EDC-4B7F-844C-433F2EE59B24" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x5_lte_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03F7EED4-ACB6-4874-8849-D8B43373DC2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x5_lte:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B57765FF-FFDF-4E02-961B-5B3F45F8ACD7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "764E8E4D-587A-468B-B2BA-FAA2B53F3340" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "04BD9762-D6ED-42D8-9EE5-58FC4DCCEB1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x62_5g-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B81E02-3EE7-4580-9026-E22A105372CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x62_5g-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B1A44AF9-6E7F-4DFF-B19B-2B4B7E8B4ADE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21B413F3-9799-4F00-A9FF-438DF1797F86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "779C408E-4FB4-4D96-90AA-75E7397CA082" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FF3FB08-53A3-4AE9-84A1-0D16C009380B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E5932F18-1BE6-4C59-BF16-2B74F01D3CC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A57CB44-C7AF-490B-A5EA-54FCDF30E42D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E0503240-3F68-4065-9109-338C0FE95233" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0182F761-E889-4788-BE65-86166732E618" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B4D9E38-29A0-4375-8C0A-E6ECA5599775" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDDA8319-911D-4689-A28B-AD70EBB23BB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "561382A5-CAAE-44D6-9ECD-A086F1CF44C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A5256482-ED19-4039-98FD-36EF1FCD6D00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11C3A315-D3D9-4CF1-AD61-70A819F1B04E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC012AD0-BCEE-4B1E-9B15-5D77D78CEA01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9306:*:*:*:*:*:*:*:*", + "matchCriteriaId": "466C503A-D8BB-4960-BFAA-771814AD8D6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4528A5B4-A537-4707-8FF8-C9A304776DFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43A90019-4E96-40B5-9E4D-CCBDD51ACA34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9330:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDBDCE15-4EEA-4025-B67F-1B8557F2F031" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:*:*:*:*:*:*:*:*", + "matchCriteriaId": "12D31522-9ECC-4DE0-AC2D-0FB4872A5385" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6E1283-5F67-435C-82B7-6D98BC61A3A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82D516CF-045C-4AFB-9CFA-3BBA108F8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F62D8EF1-71CC-4F40-ADA5-E9835277BF7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2503805B-B2A6-4AEE-8AB1-2B8A040702BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9371:*:*:*:*:*:*:*:*", + "matchCriteriaId": "52E496AD-3A70-434D-954F-D39EA9DE0B83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D44F7AE4-A114-4DFF-884F-EE121D5767A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3610:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9DE068D3-95AA-475D-B997-E679AC5F86B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3615:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9337CEB3-91E9-42D2-A6B0-79EEB159C221" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D99CA230-0694-4898-A06E-9C522CCB86CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1B395C76-2E1F-4DF3-9CB5-2762227FED00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9799B24D-14FF-4BBA-8B02-2857D242F245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F66A898-3C7A-4D44-86BD-89129F04E654" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB3542E-4800-4DD0-B114-98F5DFB5B704" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69C4B0CC-F50D-4793-B638-2B1C99433B6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD712DD-C731-45B4-84AF-5C21BE6299B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D48FCEB1-2D84-4749-A41D-76DB2F2EDDA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B074E7F1-6317-42D1-8468-7A5B3D1F59B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19220ED5-7A56-4B03-B4A5-4FF520670ED6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFC9FA-E6EF-44C5-BD50-2824C7711541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6450:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE831E17-AC45-4C39-9075-49FC7DB7E77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B39273DF-FD6F-4D01-821E-BC5EE26FD502" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFC5073D-4EC8-46DB-BB16-C4A73820934A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E54B5E4-F43F-4779-89CF-B77DD7CF956C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80EFF1CA-03DD-4E81-BAFA-77B5BD67EE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38674.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38674.json index 87f717ef173..afca72b9d39 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38674.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38674.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38674", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-20T08:15:04.980", - "lastModified": "2024-11-21T09:26:36.457", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sktthemes:skt_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2", + "matchCriteriaId": "D24F52C3-2B34-4432-8779-1A3C30C0DF6D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/skt-addons-for-elementor/wordpress-skt-addons-for-elementor-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/skt-addons-for-elementor/wordpress-skt-addons-for-elementor-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38687.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38687.json index 10ef3f2beb2..31b1e101863 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38687.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38687.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38687", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-20T08:15:08.950", - "lastModified": "2024-11-21T09:26:38.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wowdevs:sky_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.5.8", + "matchCriteriaId": "165FCB68-647E-4F92-B379-C4617EF63354" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sky-elementor-addons/wordpress-sky-addons-for-elementor-plugin-2-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/sky-elementor-addons/wordpress-sky-addons-for-elementor-plugin-2-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3874.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3874.json index 475f76a5e29..88d053fe6c7 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3874.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3874", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T16:15:09.240", - "lastModified": "2024-11-21T09:30:36.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,109 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "31C1283D-8DCF-49C0-92FF-34CF842D00BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w20e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25F04924-FB40-4330-B9D9-8597E06DF11B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260908", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260908", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312816", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260908", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260908", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312816", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4020.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4020.json index 84f9c9e487c..744ae181454 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4020.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4020", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-20T23:15:48.183", - "lastModified": "2024-11-21T09:42:02.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\):*:*:*:*:*:*:*", + "matchCriteriaId": "066BD21A-2694-474D-B885-6E9A2A1DBCFF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] } ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromAddressNat_entrys-b04d5356e5f04e30b37cb9037b94e1b2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.261671", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261671", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.316036", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://palm-vertebra-fe9.notion.site/fromAddressNat_entrys-b04d5356e5f04e30b37cb9037b94e1b2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.261671", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261671", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.316036", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42844.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42844.json new file mode 100644 index 00000000000..74d6e39fa83 --- /dev/null +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42844.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42844", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-06T15:15:15.800", + "lastModified": "2025-03-06T15:15:15.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability has been identified in EPICOR Prophet 21 (P21) up to 23.2.5232. This vulnerability allows authenticated remote attackers to execute arbitrary SQL commands through unsanitized user input fields to obtain unauthorized information" + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n SQL en EPICOR Prophet 21 (P21) hasta la versi\u00f3n 23.2.5232. Esta vulnerabilidad permite a atacantes remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s de campos de entrada de usuario no depurados para obtener informaci\u00f3n no autorizada." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/getHecked/dc4ae46526d181d3deb17092815b9bec", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4236.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4236.json index 50bbb983a64..2d67e3012e9 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4236.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4236.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4236", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T18:15:46.803", - "lastModified": "2024-11-21T09:42:26.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T15:00:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,109 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B81C53EE-14CD-426B-ADF3-6D9B4D69DC84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ax1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "413B93A8-6188-4D89-8141-C5B73F4AA071" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1803/formSetSysToolDDNS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262127", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262127", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319230", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1803/formSetSysToolDDNS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262127", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262127", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319230", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43051.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43051.json index e6ef5bfc129..e08f22860b4 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43051.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43051.json @@ -2,13 +2,17 @@ "id": "CVE-2024-43051", "sourceIdentifier": "product-security@qualcomm.com", "published": "2025-03-03T11:15:11.453", - "lastModified": "2025-03-03T11:15:11.453", - "vulnStatus": "Received", + "lastModified": "2025-03-06T15:21:24.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure while deriving keys for a session for any Widevine use case." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n al derivar claves para una sesi\u00f3n para cualquier caso de uso de Widevine." } ], "metrics": { @@ -45,12 +49,6615 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63C2ACAC-BCDC-4453-99C4-56868172ACB0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FCE1ADA9-8042-4CDE-A2B9-E96665CB41BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8031:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D06AAD09-7CBF-4761-A258-EE5B34B7B27C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABACED03-7EB7-40D4-9B93-2036380F441F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "244760FB-DB14-47B0-B301-0891F3ED3CB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C29494C-C342-4B83-B574-ECD706020DF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F6F95AC0-C2B5-4EBF-905A-D3C6D1BD99A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2321AF41-BFED-4567-B61D-EEB445C92511" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:*:*:*:*:*:*:*:*", + "matchCriteriaId": "353DE282-A541-4E6C-90B9-D79D36E179A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "279C3F0E-56E1-4878-9F02-5B71FD356D4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4960983D-7D32-4AE8-AFF9-22FDEEEA1C11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7074D04-5015-45EA-826B-6E0F85F441EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD5C60F1-5B7F-4AB0-9863-720A1972563E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D07B173E-FDAE-4640-B567-2156EFA15A1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE49AA0-F897-43D2-99B3-68A5395C02AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBF28D7-73D0-49B7-8E9E-08F8918D6F31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4770A2-EDC5-4150-866D-37D93FF6EAC8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B5BF721-7307-48A3-9503-7AAE47F6FAFD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A5E10-B158-4393-BF56-C4585A4A0EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0A06870E-8D10-4A4B-8875-0BEE3F4DBA0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FF2B8F41-5B49-4BBA-8FC5-B8EB1905DF94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D5E6782E-CC46-450B-B0DD-B17D9EA7BD51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3108B9-9A5F-4FE9-9E22-13B7A7EDE3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D144B580-1D35-45C5-BC23-0DF4BC466D9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:*:*:*:*:*:*:*:*", + "matchCriteriaId": "351FE14B-CB15-4A9F-9CB7-356C48CB6E92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F84AABA5-6C93-43E8-A4C6-D3C892D735CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "909A12CE-67B6-4C98-8562-26EEC578C2E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19843BB0-DA51-481D-8135-F570E7CD23AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C8F1013-B90A-4F20-8643-6F079002257D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E253913-B6A1-4066-B60B-951BEE92EF6D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0C613D1E-71EE-4730-A388-C1A38921D1DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CBDE31B7-E228-40A7-AC36-480EDA214BF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5EAE2E0F-A4FF-4432-B455-E27BA359DD68" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:*:*:*:*:*:*:*:*", + "matchCriteriaId": "76BDDF47-ADA1-46D7-8AED-3E3AB0F76856" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:*:*:*:*:*:*:*:*", + "matchCriteriaId": "42291FDE-83BD-4EAE-A84D-7CF432A6A61C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "759D3B14-4D4D-4B76-8F7F-C3B2ED03CE3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD2B67E-FDD1-41B9-BBBE-513023BB72BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BABD5D03-6673-4F10-AF02-4D3305D7AE26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22640116-A667-4B7F-B06E-34CF9DDFE682" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C59CBE82-96D8-402D-B313-34948D75D703" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD80B1-6F7C-4685-9B87-DBA5F619B647" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:*:*:*:*:*:*:*:*", + "matchCriteriaId": "575BF23D-1162-4552-827E-D76547152E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9900E07-69F3-4C20-8211-513760BF7F9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A62E8B-549B-4A89-BDCD-EAEF7083B7F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4220BE43-073D-4E0C-A572-0D300E3D85E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DF9FFECE-96F6-4230-A91F-8266AC13EEC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A08879B4-D5E7-426A-A4EC-70E05605E378" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "358ADECD-A006-4444-9EE3-0CF33962DEC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "781E405C-F1AA-4825-9BE1-E091EA432D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B2984B8-0632-48B1-A510-FEB2D4AF33F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9BF5D5A3-E22F-4F0A-B53E-8A66C2ED808E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB71A28-0E31-4052-B8AA-429ED63CEAE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:*:*:*:*:*:*:*:*", + "matchCriteriaId": "374E91E7-4375-4EAF-9718-7FB2B94EE60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C4096902-AAA2-4CD4-863F-DFCB9D5A2887" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F466A5BD-1912-4811-9A93-81555F101D46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn7606:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB60DF6-2C6A-4F58-80C6-708D4832868D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA96DEE-5234-4B16-ADB4-FF21B0FE578D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5EA1B4C-510A-4D92-9BEC-6FAAD8EA227B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5CAD1884-D549-4E40-BF84-A49C49BE2475" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:*:*:*:*:*:*:*:*", + "matchCriteriaId": "77E784C6-1579-407F-B9D8-3DCDC83A97B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9129A244-AB8C-4AA4-BFBB-37F84D66BD3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9274:*:*:*:*:*:*:*:*", + "matchCriteriaId": "84CB74A6-63D9-40FA-AC10-0DFF308E4605" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F85D0833-4F0F-489E-A47D-020D82D5E78F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D22BAC46-9C86-4346-BA5C-B090ABDFF86C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2534DFE0-C26E-4422-B788-DB0A6C3D27A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:*:*:*:*:*:*:*:*", + "matchCriteriaId": "883AB62A-ABD3-4482-9C3C-1CB9CC6C6403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "56D82472-1B6A-486D-A0B9-FDF87DCD5358" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE8BDAAA-B7E1-496B-9F72-791D9A516DF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:*:*:*:*:*:*:*:*", + "matchCriteriaId": "678C51B2-953B-4693-A2AD-9B26B0678EC5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B27389EE-3335-4C72-92AE-8399345FBD8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DBE078A8-1117-4713-A276-1E9599EF7E3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs9100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "057E49CC-28C0-4A82-A895-6E681AB1E22F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs9100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D123577F-6BEA-400B-B608-97ADD28357C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1000:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A81C45-B22A-4B56-BC8E-6ED38186A178" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1010:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69547D69-1A27-4094-BAB6-191E6D319F83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1110:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A2671726-93CB-40D8-B2B8-F6FD011DB95F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1210:*:*:*:*:*:*:*:*", + "matchCriteriaId": "521067A5-E74A-43E6-8321-527C7716FE75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1010:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F7BAB034-67C5-45B8-B6E3-60C54C355F36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1011:*:*:*:*:*:*:*:*", + "matchCriteriaId": "26D532E2-FF3F-4115-B8F6-DE6C87207A9E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:*:*:*:*:*:*:*:*", + "matchCriteriaId": "339B1A30-B78C-4A19-BF37-C402B54D86A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:*:*:*:*:*:*:*:*", + "matchCriteriaId": "69944B37-CCD1-470B-A766-170948AC0AC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65307900-11B4-4374-9656-462DC8059048" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D4562404-F3CD-45B8-8CB4-2528AE1B9CA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C2551312-D07A-49D2-BA91-5176AAF6BD86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1032:*:*:*:*:*:*:*:*", + "matchCriteriaId": "62CBDF54-2DE7-423F-9974-7741D1361AC7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1052:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9165360C-256C-48CB-8239-DA589F33B140" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1062:*:*:*:*:*:*:*:*", + "matchCriteriaId": "982C1E0F-E564-4234-8997-E294706E3E9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C194363-7FDE-43C9-B6FE-2BD6B474816F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F929DF34-D0FF-4A77-91A9-7ED45EA1F303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A314357F-9D15-4645-ABC5-5AA641C37B3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4F674F1B-3A7E-448C-A64C-5FD143B4B68F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "86E9A547-9F3D-453E-B338-01F4D47479A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A3D6E5-8D3B-41D8-A6A6-596F35E34D7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B65F9151-BFDB-40B2-9167-99CCC3E038A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F674AEE0-9AF8-4BA9-A6CF-BBDBCDEB696C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D193E214-8DE0-4334-95D5-512123C0D879" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71CFA659-DE2C-4AA0-8AAD-75033B2F4663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5:*:*:*:*:*:*:*:*", + "matchCriteriaId": "805FF69D-E338-44AE-8B7A-75113272BFB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa2150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23586F55-C82A-4B4C-892A-EDAEE9ECE93D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa2150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2169920C-C658-46EF-93A8-957F3306F11C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82ABE90C-B964-4EB3-AE2B-BB71D0D0F0CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "54F08AEB-AF90-4C8C-8691-5C2E800D9E66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C78C9081-DAEC-4A13-AD63-A9F2B440B4D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CA20C890-AAB8-45FA-B525-82E0CFA175BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80710FCC-C0AE-43AD-8AFD-728E7CBD6CE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "83EB0985-C4DC-45A6-9542-864346C6CF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0E3E9E-C095-4E78-8393-C1F89ED926AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C705133D-3EB4-4882-9354-4CB3A6AE15C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0E917DC4-6881-4276-8A0C-2C90E844D1AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0A25A5-6D93-458F-B445-9D020D043E78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A90E5001-D8BF-4D38-8C7E-3DA37000560C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "44DA1734-82DD-4754-BA3B-01C370432F98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA5CFC1-B3D1-44FD-A686-C35BA1998395" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C9575488-A628-4263-9488-73B44FE3505B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D2868A03-0806-453A-BD7B-C6EFFA03BA4A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6107034C-E0B0-43BD-963B-2B558B913537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8530p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D1EBB4F0-ED67-4096-B49D-14299AC26836" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90F8F138-B964-46D8-B15D-69DC6D3CC414" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EA96408C-8808-42FF-876D-6DD3984FEA44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "63924D7C-01C8-4EAB-8C94-5B4DFB27A517" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "14725E0A-2BF4-42DC-BCC2-EED9BF685FF6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7E11007D-218A-4B31-9640-EF5158233FF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B9D76C25-436A-4D7B-BBCE-0EADE73E00FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8380xp:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C6E486C5-1567-4C1B-B01C-02F6A331CBC9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "788C622C-6D7D-4276-8E9E-833D5596908E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52036768-810C-40C2-9213-8397A4073703" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd460:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4717980E-D8E1-40A1-8ACF-5B1E5F6C0015" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BE7001-5539-4C5E-A064-6E62023803AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd662:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AA5793D3-FF2C-4B0D-B436-30619CD6796D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B8DA94C-23A0-4C99-9F05-144B9B5224B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd670:*:*:*:*:*:*:*:*", + "matchCriteriaId": "24D548CA-593C-485C-A660-100A37EC5D5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB70F81-3A5B-4839-8746-E60ABFA73F08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:*:*:*:*:*:*:*:*", + "matchCriteriaId": "92DBF43F-06EB-4E92-80AC-B5A002B7B322" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2C8511C0-4BF6-45B6-8383-C722C2528CAA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A32638A-D67C-4A43-9C5A-24ED0C632F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx55:*:*:*:*:*:*:*:*", + "matchCriteriaId": "AFB1F551-5ABB-40D7-B4BF-E1913AB25C92" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3125FCBA-94BA-415A-A005-CDC5B2CDBE39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx61:*:*:*:*:*:*:*:*", + "matchCriteriaId": "53DD36F1-19B4-4C48-87BD-03E16DED14FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A990A85A-34B9-4402-9F1E-588B880EE264" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E4D58719-033C-4671-8E50-6012D173D5D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB441C-DCC6-4AF9-B3E6-6DE6305D3AAE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "57ABC4DE-7213-4C0A-ACE2-803F667E78B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "481E3382-E1DB-45A6-9FF7-B86712DFBF0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0F1B8798-4A1F-4FEA-AE81-6C1F299A08F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D264E36-5E39-4ABD-B05D-153C852CE40B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A829FBCE-2F22-4D03-92FA-B6F3FFE30777" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0AB2936E-F3AF-4623-B32B-3D50285AC6D6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EE206B0F-D879-493B-A744-24C20E74344C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28CDE5F9-947E-4EEC-810A-1105060738AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8A598302-1AA1-4D76-A852-700D06DD2296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1723FB1C-CDAC-4579-AD73-FB992A192153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FB033477-9CBA-4373-84F8-EC51343DA77B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7504F41-E4C8-4C43-AA65-C7F67C01E105" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC5DBF41-E232-48D5-AE56-BA2B758B38D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C03E2E4E-A9AD-411A-ABB7-7E87F44D37E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A03C0F57-B266-463B-813F-B6D055AB944A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5501670-56E2-48B6-ACFC-67F908D5ECCA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2D284823-94B0-4DEA-8473-19FE88DC67B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06165461-2AA0-4306-8F72-C8F6A9D5113A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+:*:*:*:*:*:*:*:*", + "matchCriteriaId": "083BEE0F-BE6D-4CE7-A0A3-79CDAAE24EB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_860_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47D193F3-8369-4253-B46A-07DC2D4CC19D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_860:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D30E2C95-7B82-42C9-B1D2-0E9379321C7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "713B1CB7-985F-49F4-A5A7-23DFD0F4EA04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "35E751E0-C81B-4B77-A639-5C1C177BF303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CC661443-FF57-4303-9609-307F103DC5A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5B9E4C73-9B08-4D2D-842F-390FE1DB162B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB133AD-4616-4B0E-82D3-6F579F871D84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3CEBEDFD-EF7F-4A35-8042-D0C04AAB89BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C520263-AE1E-42FF-8F93-9BB2ACC2882B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "648B2096-82C9-4698-A7F4-F9BD786BAACC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7A3C89B-E5B5-43A7-BC69-5C844799127E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute:*:*:*:*:*:*:*:*", + "matchCriteriaId": "64ABDF6E-FD80-4CAD-8344-4729345EFC30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69D9315-2233-4C4E-8651-8E32C4BA5866" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6B99D121-12DD-4A6E-A4A9-718B2021F9CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4B61B9BC-4A8B-4711-B32C-23BA4350F79E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:*:*:*:*:*:*:*:*", + "matchCriteriaId": "84BE3209-9A2D-4D14-A6D3-EA5178A36E63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D277C7D-A04F-4DD2-B0A9-5CFC2F3AAEAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "158F6ED7-FB30-47BF-BDAE-91BED7A58157" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D745571E-0F4D-4ACB-8CBA-44E8F2A8444A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF17BE73-08FC-46C8-8C20-5A72E97AD077" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B31855B3-E8D9-412D-AB79-E568E462DE84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x50_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9C56B06-3D58-4720-835F-103C404D109E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x50_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DFDFD257-3F86-40F4-8B9F-C42CAAD09553" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "504FAFDF-7D53-4495-A0E0-4051AEA2BC31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x62_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43D86C99-E647-4800-A86A-F3207D9D9479" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x62_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "71F6BB4B-3475-4B59-AC34-3680E87C26BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "193DA42A-82EE-4536-A4B4-B6ED03F0D0D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2CC4E695-278F-4A4B-BB0E-E6EFDCB125E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5338CA14-E28C-4AEC-98D1-DC6C57957FCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4291ACCE-22E9-40AB-81C6-BF9E8F5C0504" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "597D0A13-2CA6-4DF4-8684-551B31889CF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9905B493-4C70-45D2-BBF8-69DB60CEFAF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED623126-9BE8-441A-8F5D-397F588FFC48" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "453D4145-BD73-4868-BE89-6F9FEE05C70A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "763EEF62-9EC9-4BF6-8F2D-D603A24AA0F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD779739-5919-43A9-B949-D1FB4A46FA11" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "205D5B11-AEA6-4AA9-81D4-A87CB390FBC2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDDA8319-911D-4689-A28B-AD70EBB23BB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "561382A5-CAAE-44D6-9ECD-A086F1CF44C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "81B0A1CA-5FEE-4D3F-80B1-D1766271FA32" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:*:*:*:*:*:*:*:*", + "matchCriteriaId": "49DCBD66-1D8D-4102-AF6B-5FD15099BC72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:*:*:*:*:*:*:*:*", + "matchCriteriaId": "DDB49104-092C-4031-8BD8-A118C1F89D74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F11BC3C1-993F-42CE-AA2B-41A531CDDCAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0BC123B4-C1F1-4391-8ED7-CD6CE4CFABAB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A5256482-ED19-4039-98FD-36EF1FCD6D00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:*:*:*:*:*:*:*:*", + "matchCriteriaId": "17738B45-947D-4C4F-820C-11C8314338A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE676369-CC9C-4A16-A477-188240861747" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "036F5630-A224-4C27-98E3-F7618FAB3567" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D777F3D4-0707-472E-A768-A00E7AD9D2BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB558B-F8E3-4846-8869-51F0268D1EE1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3BC2E75B-5067-4C10-B66D-71763F744C22" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB505DE-5B4A-4CFA-BA99-1307DBF96A43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "37D06270-BBE2-4C97-9F5F-51EEA79AD8D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D415D6A4-5586-4A9F-8F9C-BFA733A4A3EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5467FEC-5CF7-492A-B792-A7DE345427ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BBCD5A75-497D-4D26-BF35-AF04743FA138" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "094197AC-0D25-480F-B797-06AC9842CD5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33A13707-4866-4016-BAAA-100C16E3F267" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "012C20A8-3F48-48DD-9A77-65C9CB1F6C30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2293C7B3-FB54-41C9-86B1-A9E175111BCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B46F132-4049-40D0-8351-C1C6FD2B47A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7675p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B8E47A4-4558-43D4-8FFB-EAC5A643140A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A485B67-22C4-4906-BB3E-AA6A804D85D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D8919F90-252F-401B-8CB5-76CEEEFF89E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F63D90-4BFC-4EFA-8B74-7A5027A7052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0B7C8F35-52E6-465A-A794-5B4E67A57DC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CAA8D9D-0238-4223-8F7B-134ECBB6FA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8650q:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1458A539-FA35-4E1A-B02C-9391F7262176" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:smart_audio_400_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7A6EE4-D951-480F-8F68-D49983C911D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:smart_audio_400:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82AB582B-5F4B-48E6-BEF4-EE1991407A6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C57BEA9E-2DAD-47E5-9777-DF835C83FC89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1:*:*:*:*:*:*:*:*", + "matchCriteriaId": "65AC22FB-C41B-4255-A4D8-6DB345AA51C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96954CAA-5244-42BF-BCC8-1381D9C45CB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A094C515-42BB-4A54-B19E-F5375E5C2686" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4DA61D9-00F0-44AE-9821-41C730D85CA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460:*:*:*:*:*:*:*:*", + "matchCriteriaId": "312FA254-572C-41A2-83F8-F292F862496E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04DAFFC1-9038-4CEB-B181-C555BC0A3CF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BC1664B3-034D-4D0A-A792-4ADCA22C575C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BE024DC-38BD-4AD5-8505-C3218C5FCF06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6A6B708B-48B9-48CD-9AFB-0A5C892E82DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECA86357-66BD-4356-87DF-5AF445BC8DF9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662:*:*:*:*:*:*:*:*", + "matchCriteriaId": "90B80966-2148-45AA-9E7D-EB3994D7DAC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_665_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B6A9E9-F392-4F44-AC5D-00331C10F038" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_665:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75078FAE-679A-41C3-8DB6-068EE875461F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_670_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D675A8D-0FB3-4B2F-9D60-0DBB521820D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_670:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BB065369-EE36-4273-8168-0E6D0FD72B7F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_675_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6976CA-9019-4B8A-84B1-58F73A0E2673" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_675:*:*:*:*:*:*:*:*", + "matchCriteriaId": "618CBEBD-0B1D-4A98-B4E6-1CFC10707A8E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_678_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FDD354-0044-4BD2-B1B9-B89BE040070D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_678:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FCCD21-39FC-4B68-89E0-B3A9F4B1A932" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7C981FE-CD14-4DA0-86FE-94C34B490A36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CCD3ECCA-575E-4E68-990D-03843C55C5C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0989BA-DEBC-4B45-AC3A-F2033C17B93A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "6653E682-718A-4892-BAD6-9B031491BA6A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DCF8439-B259-43FE-B797-57C2D62A35E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "150C4223-4560-49A6-9080-AA73A739AB9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "624349A3-DAD6-4C93-A694-AB4CDC0F00EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BF6629A5-FC3F-448C-9BC3-0C88BADBD70B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9937F60D-3325-41F8-8F7D-99C1A07016F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_710:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B280C71B-0BC3-458B-A036-B97C2F7291AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EDCFF2B-1713-46E2-AA4A-419FB63ED8A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A91DE4C3-96DD-4DEB-B258-515E83028F1E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CB628D4-566E-454D-B2B9-04A5533C6737" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730:*:*:*:*:*:*:*:*", + "matchCriteriaId": "0571FA3B-F1E1-4154-94A3-8F0F31C702AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7A5B684-09BB-4DD0-9F16-D3761EA37D34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "32FD60FF-1974-44AC-A0C9-6B8776A18386" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8C1A76A-AD97-4A08-B45A-F9994D5455DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7C019467-2193-4A7B-9CAA-4F44D19EB058" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_750g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1DF0CA5-9874-4C25-8357-7E5D9AABACD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_750g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F3850D5D-7AA3-4DC3-84FC-E6F31C6ABA21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D8D5607-F0BC-46C9-A94F-1D28EE5A3F0E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B8942236-F6DC-4769-89A7-7001093BC234" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F4659B0-547B-4492-9338-90B45B0462FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D579F9FE-7B00-4B19-A9A5-4A2AE9B101D9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9D188A-2029-431E-A225-302C7795B891" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "741B4512-2150-4E92-A12F-A3CFBF5717D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB958799-6C95-4066-A564-2440B94EA064" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g:*:*:*:*:*:*:*:*", + "matchCriteriaId": "61260043-6FB2-49CD-B8F5-AC896D95276E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11C3A315-D3D9-4CF1-AD61-70A819F1B04E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF839E24-6542-4C5D-A1B7-FD3BA00683CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1120:*:*:*:*:*:*:*:*", + "matchCriteriaId": "00CB2F5C-C09A-4989-9265-284432739274" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "508D9A36-1928-44D8-9957-E4281D87301B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB89808-3037-489D-BDB3-B8F5CF0ED3B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "998FA676-5F4D-4366-B27F-81983A148D9F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A93ED1-F509-439E-AE7B-F0EC87AE759F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2250p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD7650-7CF8-4752-89A4-89A917E110F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "568C5B08-AC42-48D3-8029-A65689EEBE75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2330p:*:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D80271-D460-47D7-A52E-93D58BB47ABD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D2CEB90-83F6-4A96-A666-18F81533F67D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:talynplus:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BD582373-558B-4DC8-8862-7BF2670262AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4528A5B4-A537-4707-8FF8-C9A304776DFA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:*:*:*:*:*:*:*:*", + "matchCriteriaId": "12D31522-9ECC-4DE0-AC2D-0FB4872A5385" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:*:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6E1283-5F67-435C-82B7-6D98BC61A3A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:*:*:*:*:*:*:*:*", + "matchCriteriaId": "82D516CF-045C-4AFB-9CFA-3BBA108F8426" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F62D8EF1-71CC-4F40-ADA5-E9835277BF7C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D44F7AE4-A114-4DFF-884F-EE121D5767A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:*:*:*:*:*:*:*:*", + "matchCriteriaId": "320D99BA-0F35-4D6C-BA1F-F17635F91DA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7866947A-ADE3-432A-81C5-8C51A82929C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:*:*:*:*:*:*:*:*", + "matchCriteriaId": "07B47B08-E12E-4846-822E-EB16FE42A181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1DDFBF5F-3B2B-45DB-9615-ACD91C750683" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19928ECE-85EE-4A64-B0BD-780F5CE24327" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CFD712DD-C731-45B4-84AF-5C21BE6299B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D48FCEB1-2D84-4749-A41D-76DB2F2EDDA4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8E9749E-AE29-4C38-A2EE-8D35921E563F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B074E7F1-6317-42D1-8468-7A5B3D1F59B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19220ED5-7A56-4B03-B4A5-4FF520670ED6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF49BC31-A332-4B9A-A826-F63116D7029F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3999:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F06DDF3B-EF6C-4F4D-803C-0528AA1577A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAFC9FA-E6EF-44C5-BD50-2824C7711541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6450:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FE831E17-AC45-4C39-9075-49FC7DB7E77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93398092-AF7C-4F04-874C-7E5B4CF7AB00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6650:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B39273DF-FD6F-4D01-821E-BC5EE26FD502" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:*:*:*:*:*:*:*:*", + "matchCriteriaId": "19379AEB-8F1C-43E8-8489-BFAAC63DBC71" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFC5073D-4EC8-46DB-BB16-C4A73820934A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57608D47-894C-4895-B4B3-4733D55D57DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7861:*:*:*:*:*:*:*:*", + "matchCriteriaId": "D7A7DAE3-5844-4112-B93F-3D07880D6AB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D765C392-5F38-4E6A-9E88-59629E7A6911" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn7881:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80F227C1-7D2B-48B5-BCC3-071DEA1FD8DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5E54B5E4-F43F-4779-89CF-B77DD7CF956C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80EFF1CA-03DD-4E81-BAFA-77B5BD67EE5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDA6307-9509-41DB-9C34-218816462A08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9EBD3ADB-D073-42E5-A8FA-27B19D9058FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:*:*:*:*:*:*:*:*", + "matchCriteriaId": "33B026F0-559D-4042-8594-DCF155F58CCF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:*:*:*:*:*:*:*:*", + "matchCriteriaId": "109D7C08-566D-4F9D-B706-ADB232C3DB23" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:*:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B187B8-56FB-4DC5-A4FC-9B9E09B9EA7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:*:*:*:*:*:*:*:*", + "matchCriteriaId": "75F541E7-A11E-4403-81E3-D991E4DCA724" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48246.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48246.json index 84eaa9f436f..19b9c9fc31e 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48246.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48246.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48246", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T19:15:37.453", - "lastModified": "2025-03-05T19:15:37.453", + "lastModified": "2025-03-06T15:15:15.917", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vehicle Management System 1.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the \"Name\" parameter of /vehicle-management/booking.php." + }, + { + "lang": "es", + "value": "Vehicle Management System 1.0 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Almacenados en el par\u00e1metro \"Nombre\" de /vehicle-management/booking.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ShadowByte1/CVE-2024-48246", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json index cccd3205603..8278987fe84 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4862", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-09T11:15:15.537", - "lastModified": "2024-11-21T09:43:45.060", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:24:40.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,97 +36,213 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbits:wpbits_addons_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "C6B0FF1F-21E9-4545-BA19-8869211B5E62" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/accordion.php#L868", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/business_hours.php#L560", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/logo_grid.php#L716", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/price_table.php#L2040", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/tabs.php#L824", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/accordion.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/business_hours.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/logo_grid.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/price_table.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/tabs.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f459033-1c95-4781-93f4-1ee5e310933a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/accordion.php#L868", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/business_hours.php#L560", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/logo_grid.php#L716", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/price_table.php#L2040", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/tabs.php#L824", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/accordion.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/business_hours.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/logo_grid.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/price_table.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3113578/wpbits-addons-for-elementor/trunk/includes/widgets/tabs.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f459033-1c95-4781-93f4-1ee5e310933a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49292.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49292.json index 0bbbebb8862..46e93a7e719 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49292.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49292", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T19:15:22.763", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.7.2", + "matchCriteriaId": "DE3E0103-45F6-44A2-AA8A-F25257C974A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-7-1-cross-site-scripting-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51144.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51144.json index 48a84e7ccff..487ee337de0 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51144.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51144.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51144", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T20:16:05.603", - "lastModified": "2025-03-05T20:16:05.603", + "lastModified": "2025-03-06T15:15:16.080", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery (CSRF) vulnerability exists in the 'pvmsg.php?action=add_message', pvmsg.php?action=confirm_delete , and ajax.server.php?page=user&action=flip_follow endpoints in Ampache <= 6.6.0." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross Site Request Forgery (CSRF) en los endpoints 'pvmsg.php?action=add_message', pvmsg.php?action=confirm_delete y ajax.server.php?page=user&action=flip_follow en Ampache <= 6.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ampache/ampache", diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5427.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5427.json index 3cfa2699f00..e26db425ec4 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5427.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5427", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-31T07:15:10.797", - "lastModified": "2024-11-21T09:47:38.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themewinter:wpcafe:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.26", + "matchCriteriaId": "21183AF5-9242-496C-B193-9CDA648BC233" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-cafe/trunk/core/shortcodes/views/reservation/reservation-form-template.php#L22", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3095135/#file8", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wp-cafe/#description", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/336e2429-97ab-4948-9d21-f0121216d2d1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-cafe/trunk/core/shortcodes/views/reservation/reservation-form-template.php#L22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3095135/#file8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wp-cafe/#description", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/336e2429-97ab-4948-9d21-f0121216d2d1?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5431.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5431.json index 154636c6367..bb5aacd5f66 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5431.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5431.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5431", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-25T06:15:11.800", - "lastModified": "2024-11-21T09:47:40.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themewinter:wpcafe:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.26", + "matchCriteriaId": "21183AF5-9242-496C-B193-9CDA648BC233" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-cafe/tags/2.2.25/core/shortcodes/views/reservation/reservation-form-template.php#L178", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c5e7ed1-7eb8-4ce7-9dd6-0f7937b6f671?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-cafe/tags/2.2.25/core/shortcodes/views/reservation/reservation-form-template.php#L178", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c5e7ed1-7eb8-4ce7-9dd6-0f7937b6f671?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56063.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56063.json index bd53770e439..b3c8c926c74 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56063.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56063", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-31T23:15:41.393", - "lastModified": "2024-12-31T23:15:41.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-06T14:25:09.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "6.0.8", + "matchCriteriaId": "4BDBFD0C-D092-44F1-A23F-0BEF99D9CFE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/essential-addons-for-elementor-lite/vulnerability/wordpress-essential-addons-for-elementor-plugin-6-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56195.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56195.json index 25b9c567a99..f0b3fae0f83 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56195.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56195.json @@ -2,20 +2,47 @@ "id": "CVE-2024-56195", "sourceIdentifier": "security@apache.org", "published": "2025-03-06T12:15:35.373", - "lastModified": "2025-03-06T12:15:35.373", + "lastModified": "2025-03-06T16:15:49.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Access Control vulnerability in Apache Traffic Server.\n\nThis issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3.\n\nUsers are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de acceso inadecuado en Apache Traffic Server. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 9.2.0 hasta la 9.2.8, desde la versi\u00f3n 10.0.0 hasta la 10.0.3. Se recomienda a los usuarios actualizar a la versi\u00f3n 9.2.9 o 10.0.4, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56196.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56196.json index 06a008ee847..c437fe92a8a 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56196.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56196.json @@ -2,20 +2,47 @@ "id": "CVE-2024-56196", "sourceIdentifier": "security@apache.org", "published": "2025-03-06T12:15:35.523", - "lastModified": "2025-03-06T12:15:35.523", + "lastModified": "2025-03-06T16:15:49.637", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Access Control vulnerability in Apache Traffic Server.\n\nThis issue affects Apache Traffic Server: from 10.0.0 through 10.0.3.\n\nUsers are recommended to upgrade to version 10.0.4, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de control de acceso inadecuado en Apache Traffic Server. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 10.0.0 hasta la 10.0.3. Se recomienda a los usuarios que actualicen a la versi\u00f3n 10.0.4, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56202.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56202.json index 17020f44914..8a304e51231 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56202.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56202.json @@ -2,20 +2,47 @@ "id": "CVE-2024-56202", "sourceIdentifier": "security@apache.org", "published": "2025-03-06T11:15:11.423", - "lastModified": "2025-03-06T11:15:11.423", + "lastModified": "2025-03-06T16:15:50.053", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Expected Behavior Violation vulnerability in Apache Traffic Server.\n\nThis issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3.\n\nUsers are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de violaci\u00f3n de comportamiento esperado en Apache Traffic Server. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 9.0.0 hasta la 9.2.8, desde la versi\u00f3n 10.0.0 hasta la 10.0.3. Se recomienda a los usuarios que actualicen a las versiones 9.2.9 o 10.0.4 o posteriores, que solucionan el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58051.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58051.json new file mode 100644 index 00000000000..2e1654ce1f6 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58051.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58051", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:51.247", + "lastModified": "2025-03-06T16:15:51.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: ipmb: Add check devm_kasprintf() returned value\n\ndevm_kasprintf() can return a NULL pointer on failure but this\nreturned value is not checked." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2378bd0b264ad3a1f76bd957caf33ee0c7945351", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/312a6445036d692bc5665307eeafa4508c33c4b5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4c9caf86d04dcb10e9fd8cd9db8eb79b5bfcc4d8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a63284d415d4d114abd8be6e66a9558f3ca0702d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e529fbcf1f35f5fc3c839df7f06c3e3d02579715", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58052.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58052.json new file mode 100644 index 00000000000..4cddab10660 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58052.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58052", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:51.367", + "lastModified": "2025-03-06T16:15:51.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table\n\nThe function atomctrl_get_smc_sclk_range_table() does not check the return\nvalue of smu_atom_get_data_table(). If smu_atom_get_data_table() fails to\nretrieve SMU_Info table, it returns NULL which is later dereferenced.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\nIn practice this should never happen as this code only gets called\non polaris chips and the vbios data table will always be present on\nthose chips." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0b97cd8a61b2b40fd73cf92a4bb2256462d22adb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/357445e28ff004d7f10967aa93ddb4bffa5c3688", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/396350adf0e5ad4bf05f01e4d79bfb82f0f6c41a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6a30634a2e0f1dd3c6b39fd0f114c32893a9907a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ae522ad211ec4b72eaf742b25f24b0a406afcba1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58053.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58053.json new file mode 100644 index 00000000000..608b4790171 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58053.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-58053", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:51.490", + "lastModified": "2025-03-06T16:15:51.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix handling of received connection abort\n\nFix the handling of a connection abort that we've received. Though the\nabort is at the connection level, it needs propagating to the calls on that\nconnection. Whilst the propagation bit is performed, the calls aren't then\nwoken up to go and process their termination, and as no further input is\nforthcoming, they just hang.\n\nAlso add some tracing for the logging of connection aborts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0e56ebde245e4799ce74d38419426f2a80d39950", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5842ce7b120c65624052a8da04460d35b26caac0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/96d1d927c4d03ee9dcee7640bca70b74e63504fc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9c6702260557c0183d8417c79a37777a3d3e58e8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58054.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58054.json new file mode 100644 index 00000000000..bdf18b1a35a --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58054.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58054", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:51.600", + "lastModified": "2025-03-06T16:15:51.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: media: max96712: fix kernel oops when removing module\n\nThe following kernel oops is thrown when trying to remove the max96712\nmodule:\n\nUnable to handle kernel paging request at virtual address 00007375746174db\nMem abort info:\n ESR = 0x0000000096000004\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x04: level 0 translation fault\nData abort info:\n ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=000000010af89000\n[00007375746174db] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 0000000096000004 [#1] PREEMPT SMP\nModules linked in: crct10dif_ce polyval_ce mxc_jpeg_encdec flexcan\n snd_soc_fsl_sai snd_soc_fsl_asoc_card snd_soc_fsl_micfil dwc_mipi_csi2\n imx_csi_formatter polyval_generic v4l2_jpeg imx_pcm_dma can_dev\n snd_soc_imx_audmux snd_soc_wm8962 snd_soc_imx_card snd_soc_fsl_utils\n max96712(C-) rpmsg_ctrl rpmsg_char pwm_fan fuse\n [last unloaded: imx8_isi]\nCPU: 0 UID: 0 PID: 754 Comm: rmmod\n\t Tainted: G C 6.12.0-rc6-06364-g327fec852c31 #17\nTainted: [C]=CRAP\nHardware name: NXP i.MX95 19X19 board (DT)\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : led_put+0x1c/0x40\nlr : v4l2_subdev_put_privacy_led+0x48/0x58\nsp : ffff80008699bbb0\nx29: ffff80008699bbb0 x28: ffff00008ac233c0 x27: 0000000000000000\nx26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000\nx23: ffff000080cf1170 x22: ffff00008b53bd00 x21: ffff8000822ad1c8\nx20: ffff000080ff5c00 x19: ffff00008b53be40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000004 x13: ffff0000800f8010 x12: 0000000000000000\nx11: ffff000082acf5c0 x10: ffff000082acf478 x9 : ffff0000800f8010\nx8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff6364626d\nx5 : 8080808000000000 x4 : 0000000000000020 x3 : 00000000553a3dc1\nx2 : ffff00008ac233c0 x1 : ffff00008ac233c0 x0 : ff00737574617473\nCall trace:\n led_put+0x1c/0x40\n v4l2_subdev_put_privacy_led+0x48/0x58\n v4l2_async_unregister_subdev+0x2c/0x1a4\n max96712_remove+0x1c/0x38 [max96712]\n i2c_device_remove+0x2c/0x9c\n device_remove+0x4c/0x80\n device_release_driver_internal+0x1cc/0x228\n driver_detach+0x4c/0x98\n bus_remove_driver+0x6c/0xbc\n driver_unregister+0x30/0x60\n i2c_del_driver+0x54/0x64\n max96712_i2c_driver_exit+0x18/0x1d0 [max96712]\n __arm64_sys_delete_module+0x1a4/0x290\n invoke_syscall+0x48/0x10c\n el0_svc_common.constprop.0+0xc0/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xd8\n el0t_64_sync_handler+0x120/0x12c\n el0t_64_sync+0x190/0x194\nCode: f9000bf3 aa0003f3 f9402800 f9402000 (f9403400)\n---[ end trace 0000000000000000 ]---\n\nThis happens because in v4l2_i2c_subdev_init(), the i2c_set_cliendata()\nis called again and the data is overwritten to point to sd, instead of\npriv. So, in remove(), the wrong pointer is passed to\nv4l2_async_unregister_subdev(), leading to a crash." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1556b9149b81cc549c13f5e56e81e89404d8a666", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/278a98f6d8a7bbe1110433b057333536e4490edf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3311c5395e7322298b659b8addc704b39fb3a59c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dfde3d63afbaae664c4d36e53cfb4045d5374561", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ee1b5046d5cd892a0754ab982aeaaad3702083a5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json new file mode 100644 index 00000000000..3ae9d7df65a --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58055.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58055", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:51.730", + "lastModified": "2025-03-06T16:15:51.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_tcm: Don't free command immediately\n\nDon't prematurely free the command. Wait for the status completion of\nthe sense status. It can be freed then. Otherwise we will double-free\nthe command." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/16907219ad6763f401700e1b57b2da4f3e07f047", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/929b69810eec132b284ffd19047a85d961df9e4d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c225d006a31949d673e646d585d9569bc28feeb9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e6693595bd1b55af62d057a4136a89d5c2ddf0e9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f0c33e7d387ccbb6870e73a43c558fefede06614", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58056.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58056.json new file mode 100644 index 00000000000..47406b09288 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58056.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58056", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:51.837", + "lastModified": "2025-03-06T16:15:51.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: core: Fix ida_free call while not allocated\n\nIn the rproc_alloc() function, on error, put_device(&rproc->dev) is\ncalled, leading to the call of the rproc_type_release() function.\nAn error can occurs before ida_alloc is called.\n\nIn such case in rproc_type_release(), the condition (rproc->index >= 0) is\ntrue as rproc->index has been initialized to 0.\nida_free() is called reporting a warning:\n[ 4.181906] WARNING: CPU: 1 PID: 24 at lib/idr.c:525 ida_free+0x100/0x164\n[ 4.186378] stm32-display-dsi 5a000000.dsi: Fixed dependency cycle(s) with /soc/dsi@5a000000/panel@0\n[ 4.188854] ida_free called for id=0 which is not allocated.\n[ 4.198256] mipi-dsi 5a000000.dsi.0: Fixed dependency cycle(s) with /soc/dsi@5a000000\n[ 4.203556] Modules linked in: panel_orisetech_otm8009a dw_mipi_dsi_stm(+) gpu_sched dw_mipi_dsi stm32_rproc stm32_crc32 stm32_ipcc(+) optee(+)\n[ 4.224307] CPU: 1 UID: 0 PID: 24 Comm: kworker/u10:0 Not tainted 6.12.0 #442\n[ 4.231481] Hardware name: STM32 (Device Tree Support)\n[ 4.236627] Workqueue: events_unbound deferred_probe_work_func\n[ 4.242504] Call trace:\n[ 4.242522] unwind_backtrace from show_stack+0x10/0x14\n[ 4.250218] show_stack from dump_stack_lvl+0x50/0x64\n[ 4.255274] dump_stack_lvl from __warn+0x80/0x12c\n[ 4.260134] __warn from warn_slowpath_fmt+0x114/0x188\n[ 4.265199] warn_slowpath_fmt from ida_free+0x100/0x164\n[ 4.270565] ida_free from rproc_type_release+0x38/0x60\n[ 4.275832] rproc_type_release from device_release+0x30/0xa0\n[ 4.281601] device_release from kobject_put+0xc4/0x294\n[ 4.286762] kobject_put from rproc_alloc.part.0+0x208/0x28c\n[ 4.292430] rproc_alloc.part.0 from devm_rproc_alloc+0x80/0xc4\n[ 4.298393] devm_rproc_alloc from stm32_rproc_probe+0xd0/0x844 [stm32_rproc]\n[ 4.305575] stm32_rproc_probe [stm32_rproc] from platform_probe+0x5c/0xbc\n\nCalling ida_alloc earlier in rproc_alloc ensures that the rproc->index is\nproperly set." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2cf54928e7e32362215c69b68a6a53d110323bf3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7378aeb664e5ebc396950b36a1f2dedf5aabec20", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b32d60a852bb3952886625d0c3b1c9a88c3ceb7c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e9efd9fa4679803fe23188d7b47119cf7bc2de6f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f2013d19b7704cd723ab42664b8d9408ea8cc77c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58057.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58057.json new file mode 100644 index 00000000000..7bee3e37edb --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58057.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-58057", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:51.940", + "lastModified": "2025-03-06T16:15:51.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: convert workqueues to unbound\n\nWhen a workqueue is created with `WQ_UNBOUND`, its work items are\nserved by special worker-pools, whose host workers are not bound to\nany specific CPU. In the default configuration (i.e. when\n`queue_delayed_work` and friends do not specify which CPU to run the\nwork item on), `WQ_UNBOUND` allows the work item to be executed on any\nCPU in the same node of the CPU it was enqueued on. While this\nsolution potentially sacrifices locality, it avoids contention with\nother processes that might dominate the CPU time of the processor the\nwork item was scheduled on.\n\nThis is not just a theoretical problem: in a particular scenario\nmisconfigured process was hogging most of the time from CPU0, leaving\nless than 0.5% of its CPU time to the kworker. The IDPF workqueues\nthat were using the kworker on CPU0 suffered large completion delays\nas a result, causing performance degradation, timeouts and eventual\nsystem crash.\n\n\n* I have also run a manual test to gauge the performance\n improvement. The test consists of an antagonist process\n (`./stress --cpu 2`) consuming as much of CPU 0 as possible. This\n process is run under `taskset 01` to bind it to CPU0, and its\n priority is changed with `chrt -pQ 9900 10000 ${pid}` and\n `renice -n -20 ${pid}` after start.\n\n Then, the IDPF driver is forced to prefer CPU0 by editing all calls\n to `queue_delayed_work`, `mod_delayed_work`, etc... to use CPU 0.\n\n Finally, `ktraces` for the workqueue events are collected.\n\n Without the current patch, the antagonist process can force\n arbitrary delays between `workqueue_queue_work` and\n `workqueue_execute_start`, that in my tests were as high as\n `30ms`. With the current patch applied, the workqueue can be\n migrated to another unloaded CPU in the same node, and, keeping\n everything else equal, the maximum delay I could see was `6us`." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/66bf9b3d9e1658333741f075320dc8e7cd6f8d09", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/868202ec3854e13de1164e4a3e25521194c5af72", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9a5b021cb8186f1854bac2812bd4f396bb1e881c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json new file mode 100644 index 00000000000..15d99288d7f --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58058.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58058", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.037", + "lastModified": "2025-03-06T16:15:52.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nubifs: skip dumping tnc tree when zroot is null\n\nClearing slab cache will free all znode in memory and make\nc->zroot.znode = NULL, then dumping tnc tree will access\nc->zroot.znode which cause null pointer dereference." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2a987950df825d0144370e700dc5fb337684ffba", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/40e25a3c0063935763717877bb2a814c081509ff", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/77e5266e3d3faa6bdcf20d9c68a8972f6aa06522", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bdb0ca39e0acccf6771db49c3f94ed787d05f2d7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e01b55f261ccc96e347eba4931e4429d080d879d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json new file mode 100644 index 00000000000..d2bd929fcd5 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58059.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58059", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.140", + "lastModified": "2025-03-06T16:15:52.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix deadlock during uvc_probe\n\nIf uvc_probe() fails, it can end up calling uvc_status_unregister() before\nuvc_status_init() is called.\n\nFix this by checking if dev->status is NULL or not in\nuvc_status_unregister()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/a67f75c2b5ecf534eab416ce16c11fe780c4f8f6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/db577ededf3a18b39567fc1a6209f12a0c4a3c52", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json new file mode 100644 index 00000000000..ad3c67505a4 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58060.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-58060", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.230", + "lastModified": "2025-03-06T16:15:52.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject struct_ops registration that uses module ptr and the module btf_id is missing\n\nThere is a UAF report in the bpf_struct_ops when CONFIG_MODULES=n.\nIn particular, the report is on tcp_congestion_ops that has\na \"struct module *owner\" member.\n\nFor struct_ops that has a \"struct module *owner\" member,\nit can be extended either by the regular kernel module or\nby the bpf_struct_ops. bpf_try_module_get() will be used\nto do the refcounting and different refcount is done\nbased on the owner pointer. When CONFIG_MODULES=n,\nthe btf_id of the \"struct module\" is missing:\n\nWARN: resolve_btfids: unresolved symbol module\n\nThus, the bpf_try_module_get() cannot do the correct refcounting.\n\nNot all subsystem's struct_ops requires the \"struct module *owner\" member.\ne.g. the recent sched_ext_ops.\n\nThis patch is to disable bpf_struct_ops registration if\nthe struct_ops has the \"struct module *\" member and the\n\"struct module\" btf_id is missing. The btf_type_is_fwd() helper\nis moved to the btf.h header file for this test.\n\nThis has happened since the beginning of bpf_struct_ops which has gone\nthrough many changes. The Fixes tag is set to a recent commit that this\npatch can apply cleanly. Considering CONFIG_MODULES=n is not\ncommon and the age of the issue, targeting for bpf-next also." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://git.kernel.org/stable/c/2324fb4e92092837ee278fdd8d60c48ee1a619ce", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/96ea081ed52bf077cad6d00153b6fba68e510767", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b777b14c2a4a4e2322daf8e8ffd42d2b88831b17", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58061.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58061.json new file mode 100644 index 00000000000..990c35cd578 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58061.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58061", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.390", + "lastModified": "2025-03-06T16:15:52.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: prohibit deactivating all links\n\nIn the internal API this calls this is a WARN_ON, but that\nshould remain since internally we want to know about bugs\nthat may cause this. Prevent deactivating all links in the\ndebugfs write directly." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/18100796c11dfdea9101fdc95d2428b2093477ee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/270ad6776e7cf1be3b769e0447070f9d0e8269db", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7553477cbfd784b128297f9ed43751688415bbaa", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d36e48a4d81c647df8a76cc58fd4d2442ba10744", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dfe9a043300261afe5eadc07b867a6810c4e999a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json new file mode 100644 index 00000000000..962679f2cdb --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58062.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-58062", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.490", + "lastModified": "2025-03-06T16:15:52.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: avoid NULL pointer dereference\n\nWhen iterating over the links of a vif, we need to make sure that the\npointer is valid (in other words - that the link exists) before\ndereferncing it.\nUse for_each_vif_active_link that also does the check." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/7f6fb4b7611eb6371c493c42fefad84a1742bcbb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cf704a7624f99eb2ffca1a16c69183e85544a613", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fbb563ad5032a07ac83c746ce5c8de5f25b5ffd0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json new file mode 100644 index 00000000000..9a2a8372424 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58063.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58063", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.583", + "lastModified": "2025-03-06T16:15:52.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: fix memory leaks and invalid access at probe error path\n\nDeinitialize at reverse order when probe fails.\n\nWhen init_sw_vars fails, rtl_deinit_core should not be called, specially\nnow that it destroys the rtl_wq workqueue.\n\nAnd call rtl_pci_deinit and deinit_sw_vars, otherwise, memory will be\nleaked.\n\nRemove pci_set_drvdata call as it will already be cleaned up by the core\ndriver code and could lead to memory leaks too. cf. commit 8d450935ae7f\n(\"wireless: rtlwifi: remove unnecessary pci_set_drvdata()\") and\ncommit 3d86b93064c7 (\"rtlwifi: Fix PCI probe error path orphaned memory\")." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/32acebca0a51f5e372536bfdc0d7d332ab749013", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/624cea89a0865a2bc3e00182a6b0f954a94328b4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6b76bab5c257463302c9e97f5d84d524457468eb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e7ceefbfd8d447abc8aca8ab993a942803522c06", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ee0b0d7baa8a6d42c7988f6e50c8f164cdf3fa47", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json new file mode 100644 index 00000000000..b1f7bcc1342 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58064.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-58064", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.733", + "lastModified": "2025-03-06T16:15:52.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap()\n\nkunit_kzalloc() may return NULL, dereferencing it without NULL check may\nlead to NULL dereference.\nAdd a NULL check for ies." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0d17d81143f5aa56ee87e60bb1000a2372a0ada8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/13c4f7714c6a1ecf748a2f22099447c14fe6ed8c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/886271409603956edd09df229dde7442c410a872", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json new file mode 100644 index 00000000000..388d0887120 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58065.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58065", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.830", + "lastModified": "2025-03-06T16:15:52.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mmp: pxa1908-apbc: Fix NULL vs IS_ERR() check\n\nThe devm_kzalloc() function returns NULL on error, not error pointers.\nFix the check." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/6628f7f88de5f65f01adef5a63c707cb49d0fddb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e5ca5d7b4d7c29246d957dc45d63610584ae3a54", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json new file mode 100644 index 00000000000..c9803ba3263 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58066.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58066", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:52.997", + "lastModified": "2025-03-06T16:15:52.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mmp: pxa1908-apbcp: Fix a NULL vs IS_ERR() check\n\nThe devm_kzalloc() function doesn't return error pointers, it returns\nNULL on error. Update the check to match." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2b3a36fb572caf9fb72f158be328395b1c938bf7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3acea81be689b77b3ceac6ff345ff0366734d967", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json new file mode 100644 index 00000000000..e6de969d9fb --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58067.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58067", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:53.150", + "lastModified": "2025-03-06T16:15:53.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: mmp: pxa1908-mpmu: Fix a NULL vs IS_ERR() check\n\nThe devm_kzalloc() function returns NULL on error, not error pointers.\nUpdate the check to match." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0869a7b2afdfcdd2beb0a5fb683119bcf39c0e9d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7def56f841af22e07977e193eea002e085facbdb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json new file mode 100644 index 00000000000..b9316a90935 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58068.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58068", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:53.257", + "lastModified": "2025-03-06T16:15:53.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nOPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized\n\nIf a driver calls dev_pm_opp_find_bw_ceil/floor() the retrieve bandwidth\nfrom the OPP table but the bandwidth table was not created because the\ninterconnect properties were missing in the OPP consumer node, the\nkernel will crash with:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000004\n...\npc : _read_bw+0x8/0x10\nlr : _opp_table_find_key+0x9c/0x174\n...\nCall trace:\n _read_bw+0x8/0x10 (P)\n _opp_table_find_key+0x9c/0x174 (L)\n _find_key+0x98/0x168\n dev_pm_opp_find_bw_ceil+0x50/0x88\n...\n\nIn order to fix the crash, create an assert function to check\nif the bandwidth table was created before trying to get a\nbandwidth with _read_bw()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5165486681dbd67b61b975c63125f2a5cb7f96d1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/84ff05c9bd577157baed711a4f0b41206593978b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8532fd078d2a5286915d03bb0a0893ee1955acef", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b44b9bc7cab2967c3d6a791b1cd542c89fc07f0e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ff2def251849133be6076a7c2d427d8eb963c223", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json new file mode 100644 index 00000000000..ea313143fa9 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58069.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58069", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:53.373", + "lastModified": "2025-03-06T16:15:53.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read\n\nThe nvmem interface supports variable buffer sizes, while the regmap\ninterface operates with fixed-size storage. If an nvmem client uses a\nbuffer size less than 4 bytes, regmap_read will write out of bounds\nas it expects the buffer to point at an unsigned int.\n\nFix this by using an intermediary unsigned int to hold the value." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/517aedb365f2c94e2d7e0b908ac7127df76203a1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9adefa7b9559d0f21034a5d5ec1b55840c9348b9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c72b7a474d3f445bf0c5bcf8ffed332c78eb28a1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e5e06455760f2995b16a176033909347929d1128", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json new file mode 100644 index 00000000000..fd4238707cb --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58070.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-58070", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:53.480", + "lastModified": "2025-03-06T16:15:53.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT\n\nIn PREEMPT_RT, kmalloc(GFP_ATOMIC) is still not safe in non preemptible\ncontext. bpf_mem_alloc must be used in PREEMPT_RT. This patch is\nto enforce bpf_mem_alloc in the bpf_local_storage when CONFIG_PREEMPT_RT\nis enabled.\n\n[ 35.118559] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n[ 35.118566] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1832, name: test_progs\n[ 35.118569] preempt_count: 1, expected: 0\n[ 35.118571] RCU nest depth: 1, expected: 1\n[ 35.118577] INFO: lockdep is turned off.\n ...\n[ 35.118647] __might_resched+0x433/0x5b0\n[ 35.118677] rt_spin_lock+0xc3/0x290\n[ 35.118700] ___slab_alloc+0x72/0xc40\n[ 35.118723] __kmalloc_noprof+0x13f/0x4e0\n[ 35.118732] bpf_map_kzalloc+0xe5/0x220\n[ 35.118740] bpf_selem_alloc+0x1d2/0x7b0\n[ 35.118755] bpf_local_storage_update+0x2fa/0x8b0\n[ 35.118784] bpf_sk_storage_get_tracing+0x15a/0x1d0\n[ 35.118791] bpf_prog_9a118d86fca78ebb_trace_inet_sock_set_state+0x44/0x66\n[ 35.118795] bpf_trace_run3+0x222/0x400\n[ 35.118820] __bpf_trace_inet_sock_set_state+0x11/0x20\n[ 35.118824] trace_inet_sock_set_state+0x112/0x130\n[ 35.118830] inet_sk_state_store+0x41/0x90\n[ 35.118836] tcp_set_state+0x3b3/0x640\n\nThere is no need to adjust the gfp_flags passing to the\nbpf_mem_cache_alloc_flags() which only honors the GFP_KERNEL.\nThe verifier has ensured GFP_KERNEL is passed only in sleepable context.\n\nIt has been an old issue since the first introduction of the\nbpf_local_storage ~5 years ago, so this patch targets the bpf-next.\n\nbpf_mem_alloc is needed to solve it, so the Fixes tag is set\nto the commit when bpf_mem_alloc was first used in the bpf_local_storage." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3392fa605d7c5708c5fbe02e4fbdac547c3b7352", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8eef6ac4d70eb1f0099fff93321d90ce8fa49ee1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b0027500000dfcb8ee952557d565064cea22c43e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c1d398a3af7e59d7fef351c84fed7ebb575d1f1a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json new file mode 100644 index 00000000000..a3b92051634 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58071.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58071", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:53.593", + "lastModified": "2025-03-06T16:15:53.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: prevent adding a device which is already a team device lower\n\nPrevent adding a device which is already a team device lower,\ne.g. adding veth0 if vlan1 was already added and veth0 is a lower of\nvlan1.\n\nThis is not useful in practice and can lead to recursive locking:\n\n$ ip link add veth0 type veth peer name veth1\n$ ip link set veth0 up\n$ ip link set veth1 up\n$ ip link add link veth0 name veth0.1 type vlan protocol 802.1Q id 1\n$ ip link add team0 type team\n$ ip link set veth0.1 down\n$ ip link set veth0.1 master team0\nteam0: Port device veth0.1 added\n$ ip link set veth0 down\n$ ip link set veth0 master team0\n\n============================================\nWARNING: possible recursive locking detected\n6.13.0-rc2-virtme-00441-ga14a429069bb #46 Not tainted\n--------------------------------------------\nip/7684 is trying to acquire lock:\nffff888016848e00 (team->team_lock_key){+.+.}-{4:4}, at: team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n\nbut task is already holding lock:\nffff888016848e00 (team->team_lock_key){+.+.}-{4:4}, at: team_add_slave (drivers/net/team/team_core.c:1147 drivers/net/team/team_core.c:1977)\n\nother info that might help us debug this:\nPossible unsafe locking scenario:\n\nCPU0\n----\nlock(team->team_lock_key);\nlock(team->team_lock_key);\n\n*** DEADLOCK ***\n\nMay be due to missing lock nesting notation\n\n2 locks held by ip/7684:\n\nstack backtrace:\nCPU: 3 UID: 0 PID: 7684 Comm: ip Not tainted 6.13.0-rc2-virtme-00441-ga14a429069bb #46\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nCall Trace:\n\ndump_stack_lvl (lib/dump_stack.c:122)\nprint_deadlock_bug.cold (kernel/locking/lockdep.c:3040)\n__lock_acquire (kernel/locking/lockdep.c:3893 kernel/locking/lockdep.c:5226)\n? netlink_broadcast_filtered (net/netlink/af_netlink.c:1548)\nlock_acquire.part.0 (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 2))\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? lock_acquire (kernel/locking/lockdep.c:5822)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n__mutex_lock (kernel/locking/mutex.c:587 kernel/locking/mutex.c:735)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? fib_sync_up (net/ipv4/fib_semantics.c:2167)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\nteam_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\nnotifier_call_chain (kernel/notifier.c:85)\ncall_netdevice_notifiers_info (net/core/dev.c:1996)\n__dev_notify_flags (net/core/dev.c:8993)\n? __dev_change_flags (net/core/dev.c:8975)\ndev_change_flags (net/core/dev.c:9027)\nvlan_device_event (net/8021q/vlan.c:85 net/8021q/vlan.c:470)\n? br_device_event (net/bridge/br.c:143)\nnotifier_call_chain (kernel/notifier.c:85)\ncall_netdevice_notifiers_info (net/core/dev.c:1996)\ndev_open (net/core/dev.c:1519 net/core/dev.c:1505)\nteam_add_slave (drivers/net/team/team_core.c:1219 drivers/net/team/team_core.c:1977)\n? __pfx_team_add_slave (drivers/net/team/team_core.c:1972)\ndo_set_master (net/core/rtnetlink.c:2917)\ndo_setlink.isra.0 (net/core/rtnetlink.c:3117)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/184a564e6000b41582f160a5be9a9b5aabe22ac1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1bb06f919fa5bec77ad9b6002525c3dcc5c1fd6c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3fff5da4ca2164bb4d0f1e6cd33f6eb8a0e73e50", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/adff6ac889e16d97abd1e4543f533221127e978a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d9bce1310c0e2a55888e3e08c9f69d8377b3a377", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58072.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58072.json new file mode 100644 index 00000000000..16f60ed4817 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58072.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-58072", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:53.703", + "lastModified": "2025-03-06T16:15:53.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: remove unused check_buddy_priv\n\nCommit 2461c7d60f9f (\"rtlwifi: Update header file\") introduced a global\nlist of private data structures.\n\nLater on, commit 26634c4b1868 (\"rtlwifi Modify existing bits to match\nvendor version 2013.02.07\") started adding the private data to that list at\nprobe time and added a hook, check_buddy_priv to find the private data from\na similar device.\n\nHowever, that function was never used.\n\nBesides, though there is a lock for that list, it is never used. And when\nthe probe fails, the private data is never removed from the list. This\nwould cause a second probe to access freed memory.\n\nRemove the unused hook, structures and members, which will prevent the\npotential race condition on the list and its corruption during a second\nprobe when probe fails." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/006e803af7408c3fc815b0654fc5ab43d34f0154", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1e39b0486cdb496cdfba3bc89886150e46acf6f4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2fdac64c3c35858aa8ac5caa70b232e03456e120", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/465d01ef6962b82b1f0ad1f3e58b398dbd35c1c1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/543e3e9f2e9e47ded774c74e680f28a0ca362aee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json new file mode 100644 index 00000000000..8e54a1b6c06 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58073.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58073", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:53.833", + "lastModified": "2025-03-06T16:15:53.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: check dpu_plane_atomic_print_state() for valid sspp\n\nSimilar to the r_pipe sspp protect, add a check to protect\nthe pipe state prints to avoid NULL ptr dereference for cases when\nthe state is dumped without a corresponding atomic_check() where the\npipe->sspp is assigned.\n\nPatchwork: https://patchwork.freedesktop.org/patch/628404/" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/008af2074e4b91d34440102501b710c235a3b245", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/789384eb1437aed94155dc0eac8a8a6ba1baf578", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58074.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58074.json new file mode 100644 index 00000000000..a072b90ea07 --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58074.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-58074", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:53.943", + "lastModified": "2025-03-06T16:15:53.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Grab intel_display from the encoder to avoid potential oopsies\n\nGrab the intel_display from 'encoder' rather than 'state'\nin the encoder hooks to avoid the massive footgun that is\nintel_sanitize_encoder(), which passes NULL as the 'state'\nargument to encoder .disable() and .post_disable().\n\nTODO: figure out how to actually fix intel_sanitize_encoder()..." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1885401569f24eb35c631bcc4e6543360dbe9292", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dc3806d9eb66d0105f8d55d462d4ef681d9eac59", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-580xx/CVE-2024-58075.json b/CVE-2024/CVE-2024-580xx/CVE-2024-58075.json new file mode 100644 index 00000000000..16535f44a0b --- /dev/null +++ b/CVE-2024/CVE-2024-580xx/CVE-2024-58075.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-58075", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:54.040", + "lastModified": "2025-03-06T16:15:54.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: tegra - do not transfer req when tegra init fails\n\nThe tegra_cmac_init or tegra_sha_init function may return an error when\nmemory is exhausted. It should not transfer the request when they return\nan error." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/15589bda46830695a3261518bb7627afac61f519", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1dbc270f9df7f0ae1e591323431869059cee1b7d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5eaa7c916e1ec4b122a1c3a8a20e692d9d9e174e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7150.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7150.json index 66b887a87b2..baf8bcc0776 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7150.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7150.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7150", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-08T06:15:41.727", - "lastModified": "2024-08-08T13:04:18.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-06T16:24:25.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,64 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:10web:slider:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.58", + "matchCriteriaId": "6BD302A4-3DF6-4392-898F-18D9DBA76A8C" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/slider-wd/tags/1.2.57/frontend/models/WDSModelSlider.php#L6", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3131688/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/slider-wd/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/74d635b6-2b4a-49af-af5c-6bfa1b5d220e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8420.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8420.json index bf91a5752ae..a8c8fa02a45 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8420.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8420.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8420", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:10.910", - "lastModified": "2025-02-28T09:15:10.910", - "vulnStatus": "Received", + "lastModified": "2025-03-06T16:36:34.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DHVC Form plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.4.7. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on sites." + }, + { + "lang": "es", + "value": "El complemento DHVC Form para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 2.4.7 incluida. Esto se debe a que el complemento permite que un usuario proporcione el campo \"rol\" al registrarse. Esto hace posible que atacantes no autenticados se registren como administradores en los sitios." } ], "metrics": { @@ -45,16 +49,50 @@ "value": "CWE-266" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sitesao:dhvc_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.8", + "matchCriteriaId": "2AACF73A-1F57-480C-853C-EDEF4F0F0BB9" + } + ] + } + ] } ], "references": [ { "url": "https://codecanyon.net/item/dhvc-form-wordpress-form-for-visual-composer/8326593", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4d51a0c-c625-4732-b345-df02971fbffa?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1319.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1319.json index c49143236bf..4fbb59797f6 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1319.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1319.json @@ -2,20 +2,24 @@ "id": "CVE-2025-1319", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T13:15:27.267", - "lastModified": "2025-02-28T13:15:27.267", - "vulnStatus": "Received", + "lastModified": "2025-03-06T15:00:16.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Site Mailer \u2013 SMTP Replacement, Email API Deliverability & Email Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Site Mailer \u2013 SMTP Replacement, Email API Deliverability & Email Log para WordPress es vulnerable a cross site scripting almacenado en todas las versiones hasta la 1.2.3 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,20 +69,57 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementor:site_mailer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.4", + "matchCriteriaId": "29FBF7F5-D3F1-459C-8039-15513DCE1737" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3247059/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/site-mailer/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9fe3574-f338-474c-af78-f843501d422c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1560.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1560.json index 5a10bce6eac..45382004eed 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1560.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1560.json @@ -2,20 +2,24 @@ "id": "CVE-2025-1560", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:12.040", - "lastModified": "2025-02-28T09:15:12.040", - "vulnStatus": "Received", + "lastModified": "2025-03-06T15:00:16.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WOW Entrance Effects (WEE!) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wee' shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WOW Entrance Effects (WEE!) para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo corto \"wee\" del complemento en todas las versiones hasta la 0.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,20 +69,56 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:darkosxrc:wow_entrance_effects_\\(wee\\!\\):0.1:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "2C2A0EB6-E55B-4D0C-86C1-DFCDD8C738FE" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wow-entrance-effects-wee/trunk/wee.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/wow-entrance-effects-wee/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/423e840e-0bc2-4481-afff-61ace85788d3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1570.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1570.json index b8a5095c3d8..d746d9d8734 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1570.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1570.json @@ -2,20 +2,24 @@ "id": "CVE-2025-1570", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:12.203", - "lastModified": "2025-02-28T09:15:12.203", - "vulnStatus": "Received", + "lastModified": "2025-03-06T15:00:16.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 8.1. This is due to the directorist_generate_password_reset_pin_code() and reset_user_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator." + }, + { + "lang": "es", + "value": "El complemento Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings para WordPress es vulnerable a la escalada de privilegios mediante la apropiaci\u00f3n de cuentas en todas las versiones hasta la 8.1 incluida. Esto se debe a que las funciones directorist_generate_password_reset_pin_code() y reset_user_password() no tienen suficientes controles para evitar un ataque de fuerza bruta exitoso de la OTP para cambiar una contrase\u00f1a o verificar que una solicitud de restablecimiento de contrase\u00f1a provino de un usuario autorizado. Esto hace posible que atacantes no autenticados generen y usen la fuerza bruta para generar una OTP que permita cambiar la contrase\u00f1a de cualquier usuario, incluido un administrador." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,16 +69,50 @@ "value": "CWE-640" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.2", + "matchCriteriaId": "B363B683-72E0-4CE7-AEA9-2CA6D0712A42" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3246340/directorist", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/853562ed-7f2e-453c-b3d0-67c90bd0231f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1662.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1662.json index e0ad5d76818..763de047537 100644 --- a/CVE-2025/CVE-2025-16xx/CVE-2025-1662.json +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1662.json @@ -2,19 +2,43 @@ "id": "CVE-2025-1662", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-28T09:15:12.373", - "lastModified": "2025-02-28T09:15:12.373", - "vulnStatus": "Received", + "lastModified": "2025-03-06T15:00:16.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The URL Media Uploader plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.0 via the 'url_media_uploader_url_upload' action. This makes it possible for authenticated attackers, with author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento URL Media Uploader para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 1.0.0 incluida a trav\u00e9s de la acci\u00f3n 'url_media_uploader_url_upload'. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y se pueden usar para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -45,16 +69,50 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apprhyme:url_media_uploader:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.1", + "matchCriteriaId": "5C111034-6EE6-45F8-AE16-9152B3819DEB" + } + ] + } + ] } ], "references": [ { "url": "https://wordpress.org/plugins/url-media-uploader/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8f1852-2d67-4ed9-ab3d-5b3bf4083e06?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1979.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1979.json index 5c9eff157ef..701a22fbfb1 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1979.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1979.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1979", "sourceIdentifier": "report@snyk.io", "published": "2025-03-06T05:15:16.213", - "lastModified": "2025-03-06T05:15:16.213", + "lastModified": "2025-03-06T16:15:54.187", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password.\r\rThis is only exploitable if:\r\r1) Logging is enabled;\r\r2) Redis is using password authentication;\r\r3) Those logs are accessible to an attacker, who can reach that redis instance.\r\r**Note:**\r\rIt is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password." + }, + { + "lang": "es", + "value": "Las versiones del paquete ray anteriores a la 2.43.0 son vulnerables a la inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro donde se registra la contrase\u00f1a de Redis en el registro est\u00e1ndar. Si la contrase\u00f1a de Redis se pasa como argumento, se registrar\u00e1 y podr\u00eda filtrarse la contrase\u00f1a. Esto solo se puede explotar si: 1) el registro est\u00e1 habilitado; 2) Redis est\u00e1 utilizando la autenticaci\u00f3n de contrase\u00f1a; 3) esos registros son accesibles para un atacante, que puede llegar a esa instancia de Redis. **Nota:** Se recomienda que cualquier persona que est\u00e9 ejecutando esta configuraci\u00f3n actualice a la \u00faltima versi\u00f3n de Ray y luego rote su contrase\u00f1a de Redis." } ], "metrics": { @@ -89,6 +93,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2029.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2029.json new file mode 100644 index 00000000000..4260ad0aea7 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2029.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-2029", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-06T15:15:17.943", + "lastModified": "2025-03-06T15:15:17.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in MicroDicom DICOM Viewer 2025.1 Build 3321. It has been classified as critical. Affected is an unknown function of the file mDicom.exe. The manipulation leads to memory corruption. The attack needs to be approached locally. It is recommended to upgrade the affected component. The vendor quickly confirmed the existence of the vulnerability and fixed it in the latest beta." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.298770", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298770", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.506579", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.microdicom.com/beta.html", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json new file mode 100644 index 00000000000..d6d4c0862ce --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2030.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-2030", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-06T15:15:18.127", + "lastModified": "2025-03-06T16:15:55.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Seeyon Zhiyuan Interconnect FE Collaborative Office Platform up to 20250224. It has been rated as critical. Affected by this issue is some unknown functionality of the file /security/addUser.jsp. The manipulation of the argument groupId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CloudRoam7/CVE/blob/main/CVE_1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298772", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298772", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.505638", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/CloudRoam7/CVE/blob/main/CVE_1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json new file mode 100644 index 00000000000..aa8a717aece --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2031.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2031", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-06T16:15:55.727", + "lastModified": "2025-03-06T16:15:55.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in ChestnutCMS up to 1.5.2. This affects the function uploadFile of the file /dev-api/cms/file/upload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/IceFoxH/VULN/issues/6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.298773", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.298773", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.512029", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21825.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21825.json new file mode 100644 index 00000000000..2a1ba87f3f6 --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21825.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-21825", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:54.753", + "lastModified": "2025-03-06T16:15:54.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Cancel the running bpf_timer through kworker for PREEMPT_RT\n\nDuring the update procedure, when overwrite element in a pre-allocated\nhtab, the freeing of old_element is protected by the bucket lock. The\nreason why the bucket lock is necessary is that the old_element has\nalready been stashed in htab->extra_elems after alloc_htab_elem()\nreturns. If freeing the old_element after the bucket lock is unlocked,\nthe stashed element may be reused by concurrent update procedure and the\nfreeing of old_element will run concurrently with the reuse of the\nold_element. However, the invocation of check_and_free_fields() may\nacquire a spin-lock which violates the lockdep rule because its caller\nhas already held a raw-spin-lock (bucket lock). The following warning\nwill be reported when such race happens:\n\n BUG: scheduling while atomic: test_progs/676/0x00000003\n 3 locks held by test_progs/676:\n #0: ffffffff864b0240 (rcu_read_lock_trace){....}-{0:0}, at: bpf_prog_test_run_syscall+0x2c0/0x830\n #1: ffff88810e961188 (&htab->lockdep_key){....}-{2:2}, at: htab_map_update_elem+0x306/0x1500\n #2: ffff8881f4eac1b8 (&base->softirq_expiry_lock){....}-{2:2}, at: hrtimer_cancel_wait_running+0xe9/0x1b0\n Modules linked in: bpf_testmod(O)\n Preemption disabled at:\n [] htab_map_update_elem+0x293/0x1500\n CPU: 0 UID: 0 PID: 676 Comm: test_progs Tainted: G ... 6.12.0+ #11\n Tainted: [W]=WARN, [O]=OOT_MODULE\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)...\n Call Trace:\n \n dump_stack_lvl+0x57/0x70\n dump_stack+0x10/0x20\n __schedule_bug+0x120/0x170\n __schedule+0x300c/0x4800\n schedule_rtlock+0x37/0x60\n rtlock_slowlock_locked+0x6d9/0x54c0\n rt_spin_lock+0x168/0x230\n hrtimer_cancel_wait_running+0xe9/0x1b0\n hrtimer_cancel+0x24/0x30\n bpf_timer_delete_work+0x1d/0x40\n bpf_timer_cancel_and_free+0x5e/0x80\n bpf_obj_free_fields+0x262/0x4a0\n check_and_free_fields+0x1d0/0x280\n htab_map_update_elem+0x7fc/0x1500\n bpf_prog_9f90bc20768e0cb9_overwrite_cb+0x3f/0x43\n bpf_prog_ea601c4649694dbd_overwrite_timer+0x5d/0x7e\n bpf_prog_test_run_syscall+0x322/0x830\n __sys_bpf+0x135d/0x3ca0\n __x64_sys_bpf+0x75/0xb0\n x64_sys_call+0x1b5/0xa10\n do_syscall_64+0x3b/0xc0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n ...\n \n\nIt seems feasible to break the reuse and refill of per-cpu extra_elems\ninto two independent parts: reuse the per-cpu extra_elems with bucket\nlock being held and refill the old_element as per-cpu extra_elems after\nthe bucket lock is unlocked. However, it will make the concurrent\noverwrite procedures on the same CPU return unexpected -E2BIG error when\nthe map is full.\n\nTherefore, the patch fixes the lock problem by breaking the cancelling\nof bpf_timer into two steps for PREEMPT_RT:\n1) use hrtimer_try_to_cancel() and check its return value\n2) if the timer is running, use hrtimer_cancel() through a kworker to\n cancel it again\nConsidering that the current implementation of hrtimer_cancel() will try\nto acquire a being held softirq_expiry_lock when the current timer is\nrunning, these steps above are reasonable. However, it also has\ndownside. When the timer is running, the cancelling of the timer is\ndelayed when releasing the last map uref. The delay is also fixable\n(e.g., break the cancelling of bpf timer into two parts: one part in\nlocked scope, another one in unlocked scope), it can be revised later if\nnecessary.\n\nIt is a bit hard to decide the right fix tag. One reason is that the\nproblem depends on PREEMPT_RT which is enabled in v6.12. Considering the\nsoftirq_expiry_lock lock exists since v5.4 and bpf_timer is introduced\nin v5.15, the bpf_timer commit is used in the fixes tag and an extra\ndepends-on tag is added to state the dependency on PREEMPT_RT.\n\nDepends-on: v6.12+ with PREEMPT_RT enabled" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/33e47d9573075342a41783a55c8c67bc71246fc1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/58f038e6d209d2dd862fcf5de55407855856794d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fbeda3d939ca10063aafa7a77cc0f409d82cda88", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21826.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21826.json new file mode 100644 index 00000000000..69a8f8de1f3 --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21826.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-21826", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:54.863", + "lastModified": "2025-03-06T16:15:54.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: reject mismatching sum of field_len with set key length\n\nThe field length description provides the length of each separated key\nfield in the concatenation, each field gets rounded up to 32-bits to\ncalculate the pipapo rule width from pipapo_init(). The set key length\nprovides the total size of the key aligned to 32-bits.\n\nRegister-based arithmetics still allows for combining mismatching set\nkey length and field length description, eg. set key length 10 and field\ndescription [ 5, 4 ] leading to pipapo width of 12." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1b9335a8000fb70742f7db10af314104b6ace220", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2ac254343d3cf228ae0738b2615fedf85d000752", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/49b7182b97bafbd5645414aff054b4a65d05823d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/82e491e085719068179ff6a5466b7387cc4bbf32", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ab50d0eff4a939d20c37721fd9766347efcdb6f6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21827.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21827.json new file mode 100644 index 00000000000..6b2d7fd0a8a --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21827.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-21827", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:54.967", + "lastModified": "2025-03-06T16:15:54.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: mediatek: Add locks for usb_driver_claim_interface()\n\nThe documentation for usb_driver_claim_interface() says that \"the\ndevice lock\" is needed when the function is called from places other\nthan probe(). This appears to be the lock for the USB interface\ndevice. The Mediatek btusb code gets called via this path:\n\n Workqueue: hci0 hci_power_on [bluetooth]\n Call trace:\n usb_driver_claim_interface\n btusb_mtk_claim_iso_intf\n btusb_mtk_setup\n hci_dev_open_sync\n hci_power_on\n process_scheduled_works\n worker_thread\n kthread\n\nWith the above call trace the device lock hasn't been claimed. Claim\nit.\n\nWithout this fix, we'd sometimes see the error \"Failed to claim iso\ninterface\". Sometimes we'd even see worse errors, like a NULL pointer\ndereference (where `intf->dev.driver` was NULL) with a trace like:\n\n Call trace:\n usb_suspend_both\n usb_runtime_suspend\n __rpm_callback\n rpm_suspend\n pm_runtime_work\n process_scheduled_works\n\nBoth errors appear to be fixed with the proper locking." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/4194766ec8756f4f654d595ae49962acbac49490", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/930e1790b99e5839e1af69d2f7fd808f1fba2df9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e9087e828827e5a5c85e124ce77503f2b81c3491", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21828.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21828.json new file mode 100644 index 00000000000..3f8d9b622bc --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21828.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-21828", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-06T16:15:55.070", + "lastModified": "2025-03-06T16:15:55.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't flush non-uploaded STAs\n\nIf STA state is pre-moved to AUTHORIZED (such as in IBSS\nscenarios) and insertion fails, the station is freed.\nIn this case, the driver never knew about the station,\nso trying to flush it is unexpected and may crash.\n\nCheck if the sta was uploaded to the driver before and\nfix this." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/9efb5531271fa7ebae993b2a33a705d9947c7ce6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/aa3ce3f8fafa0b8fb062f28024855ea8cb3f3450", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cd10b7fcb95a6a86c67adc54304c59a578ab16af", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cf21ef3d430847ba864bbc9b2774fffcc03ce321", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25362.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25362.json index b583acc6abe..a4322ba6eaa 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25362.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25362.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25362", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T21:15:19.803", - "lastModified": "2025-03-05T21:15:19.803", + "lastModified": "2025-03-06T15:15:17.277", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to execute arbitrary code via injecting a crafted payload into the template field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/explosion/spacy-llm/issues/492", diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25450.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25450.json new file mode 100644 index 00000000000..6a082bc8592 --- /dev/null +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25450.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25450", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-06T15:15:17.443", + "lastModified": "2025-03-06T15:15:17.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the deactivation of the activated second factor to the /session endpoint" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25451.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25451.json new file mode 100644 index 00000000000..6315517b207 --- /dev/null +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25451.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25451", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-06T15:15:17.553", + "lastModified": "2025-03-06T15:15:17.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a physically proximate attacker to escalate privileges via the \"2fa_authorized\" Local Storage key" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25452.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25452.json new file mode 100644 index 00000000000..e30d1b07cba --- /dev/null +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25452.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25452", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-06T15:15:17.667", + "lastModified": "2025-03-06T15:15:17.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the \"/user\" endpoint" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json index b9e01b16395..cbf2780270f 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25632", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T21:15:19.890", - "lastModified": "2025-03-05T21:15:19.890", + "lastModified": "2025-03-06T15:15:17.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Tenda AC15 v15.03.05.19 is vulnerable to Command Injection via the handler function in /goform/telnet." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19telnet.md", diff --git a/README.md b/README.md index cfe44185ef8..bf7d3480be7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-06T15:00:20.642350+00:00 +2025-03-06T17:00:20.693536+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-06T14:23:26.167000+00:00 +2025-03-06T16:36:34.470000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284314 +284351 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `37` -- [CVE-2024-12144](CVE-2024/CVE-2024-121xx/CVE-2024-12144.json) (`2025-03-06T14:15:35.297`) -- [CVE-2024-13892](CVE-2024/CVE-2024-138xx/CVE-2024-13892.json) (`2025-03-06T14:15:35.453`) -- [CVE-2024-13893](CVE-2024/CVE-2024-138xx/CVE-2024-13893.json) (`2025-03-06T14:15:35.630`) -- [CVE-2024-13894](CVE-2024/CVE-2024-138xx/CVE-2024-13894.json) (`2025-03-06T14:15:35.777`) -- [CVE-2025-0877](CVE-2025/CVE-2025-08xx/CVE-2025-0877.json) (`2025-03-06T14:15:36.107`) -- [CVE-2025-2045](CVE-2025/CVE-2025-20xx/CVE-2025-2045.json) (`2025-03-06T13:15:12.553`) +- [CVE-2024-58061](CVE-2024/CVE-2024-580xx/CVE-2024-58061.json) (`2025-03-06T16:15:52.390`) +- [CVE-2024-58062](CVE-2024/CVE-2024-580xx/CVE-2024-58062.json) (`2025-03-06T16:15:52.490`) +- [CVE-2024-58063](CVE-2024/CVE-2024-580xx/CVE-2024-58063.json) (`2025-03-06T16:15:52.583`) +- [CVE-2024-58064](CVE-2024/CVE-2024-580xx/CVE-2024-58064.json) (`2025-03-06T16:15:52.733`) +- [CVE-2024-58065](CVE-2024/CVE-2024-580xx/CVE-2024-58065.json) (`2025-03-06T16:15:52.830`) +- [CVE-2024-58066](CVE-2024/CVE-2024-580xx/CVE-2024-58066.json) (`2025-03-06T16:15:52.997`) +- [CVE-2024-58067](CVE-2024/CVE-2024-580xx/CVE-2024-58067.json) (`2025-03-06T16:15:53.150`) +- [CVE-2024-58068](CVE-2024/CVE-2024-580xx/CVE-2024-58068.json) (`2025-03-06T16:15:53.257`) +- [CVE-2024-58069](CVE-2024/CVE-2024-580xx/CVE-2024-58069.json) (`2025-03-06T16:15:53.373`) +- [CVE-2024-58070](CVE-2024/CVE-2024-580xx/CVE-2024-58070.json) (`2025-03-06T16:15:53.480`) +- [CVE-2024-58071](CVE-2024/CVE-2024-580xx/CVE-2024-58071.json) (`2025-03-06T16:15:53.593`) +- [CVE-2024-58072](CVE-2024/CVE-2024-580xx/CVE-2024-58072.json) (`2025-03-06T16:15:53.703`) +- [CVE-2024-58073](CVE-2024/CVE-2024-580xx/CVE-2024-58073.json) (`2025-03-06T16:15:53.833`) +- [CVE-2024-58074](CVE-2024/CVE-2024-580xx/CVE-2024-58074.json) (`2025-03-06T16:15:53.943`) +- [CVE-2024-58075](CVE-2024/CVE-2024-580xx/CVE-2024-58075.json) (`2025-03-06T16:15:54.040`) +- [CVE-2025-2029](CVE-2025/CVE-2025-20xx/CVE-2025-2029.json) (`2025-03-06T15:15:17.943`) +- [CVE-2025-2030](CVE-2025/CVE-2025-20xx/CVE-2025-2030.json) (`2025-03-06T15:15:18.127`) +- [CVE-2025-2031](CVE-2025/CVE-2025-20xx/CVE-2025-2031.json) (`2025-03-06T16:15:55.727`) +- [CVE-2025-21825](CVE-2025/CVE-2025-218xx/CVE-2025-21825.json) (`2025-03-06T16:15:54.753`) +- [CVE-2025-21826](CVE-2025/CVE-2025-218xx/CVE-2025-21826.json) (`2025-03-06T16:15:54.863`) +- [CVE-2025-21827](CVE-2025/CVE-2025-218xx/CVE-2025-21827.json) (`2025-03-06T16:15:54.967`) +- [CVE-2025-21828](CVE-2025/CVE-2025-218xx/CVE-2025-21828.json) (`2025-03-06T16:15:55.070`) +- [CVE-2025-25450](CVE-2025/CVE-2025-254xx/CVE-2025-25450.json) (`2025-03-06T15:15:17.443`) +- [CVE-2025-25451](CVE-2025/CVE-2025-254xx/CVE-2025-25451.json) (`2025-03-06T15:15:17.553`) +- [CVE-2025-25452](CVE-2025/CVE-2025-254xx/CVE-2025-25452.json) (`2025-03-06T15:15:17.667`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `105` -- [CVE-2024-49807](CVE-2024/CVE-2024-498xx/CVE-2024-49807.json) (`2025-03-06T13:30:34.893`) -- [CVE-2024-51945](CVE-2024/CVE-2024-519xx/CVE-2024-51945.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51946](CVE-2024/CVE-2024-519xx/CVE-2024-51946.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51947](CVE-2024/CVE-2024-519xx/CVE-2024-51947.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51948](CVE-2024/CVE-2024-519xx/CVE-2024-51948.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51949](CVE-2024/CVE-2024-519xx/CVE-2024-51949.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51950](CVE-2024/CVE-2024-519xx/CVE-2024-51950.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51951](CVE-2024/CVE-2024-519xx/CVE-2024-51951.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51952](CVE-2024/CVE-2024-519xx/CVE-2024-51952.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51953](CVE-2024/CVE-2024-519xx/CVE-2024-51953.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51954](CVE-2024/CVE-2024-519xx/CVE-2024-51954.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51956](CVE-2024/CVE-2024-519xx/CVE-2024-51956.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51957](CVE-2024/CVE-2024-519xx/CVE-2024-51957.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51958](CVE-2024/CVE-2024-519xx/CVE-2024-51958.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51959](CVE-2024/CVE-2024-519xx/CVE-2024-51959.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51960](CVE-2024/CVE-2024-519xx/CVE-2024-51960.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51961](CVE-2024/CVE-2024-519xx/CVE-2024-51961.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51962](CVE-2024/CVE-2024-519xx/CVE-2024-51962.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51963](CVE-2024/CVE-2024-519xx/CVE-2024-51963.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-51966](CVE-2024/CVE-2024-519xx/CVE-2024-51966.json) (`2025-03-06T14:23:26.167`) -- [CVE-2024-56411](CVE-2024/CVE-2024-564xx/CVE-2024-56411.json) (`2025-03-06T13:30:34.893`) -- [CVE-2024-56412](CVE-2024/CVE-2024-564xx/CVE-2024-56412.json) (`2025-03-06T13:30:34.893`) -- [CVE-2024-5888](CVE-2024/CVE-2024-58xx/CVE-2024-5888.json) (`2025-03-06T14:23:26.167`) -- [CVE-2025-0848](CVE-2025/CVE-2025-08xx/CVE-2025-0848.json) (`2025-03-06T13:30:34.893`) -- [CVE-2025-22131](CVE-2025/CVE-2025-221xx/CVE-2025-22131.json) (`2025-03-06T13:30:34.893`) +- [CVE-2024-38674](CVE-2024/CVE-2024-386xx/CVE-2024-38674.json) (`2025-03-06T14:25:09.843`) +- [CVE-2024-38687](CVE-2024/CVE-2024-386xx/CVE-2024-38687.json) (`2025-03-06T14:24:40.890`) +- [CVE-2024-3874](CVE-2024/CVE-2024-38xx/CVE-2024-3874.json) (`2025-03-06T15:00:11.560`) +- [CVE-2024-4020](CVE-2024/CVE-2024-40xx/CVE-2024-4020.json) (`2025-03-06T15:00:11.560`) +- [CVE-2024-4236](CVE-2024/CVE-2024-42xx/CVE-2024-4236.json) (`2025-03-06T15:00:11.560`) +- [CVE-2024-43051](CVE-2024/CVE-2024-430xx/CVE-2024-43051.json) (`2025-03-06T15:21:24.387`) +- [CVE-2024-48246](CVE-2024/CVE-2024-482xx/CVE-2024-48246.json) (`2025-03-06T15:15:15.917`) +- [CVE-2024-4862](CVE-2024/CVE-2024-48xx/CVE-2024-4862.json) (`2025-03-06T14:24:40.890`) +- [CVE-2024-49292](CVE-2024/CVE-2024-492xx/CVE-2024-49292.json) (`2025-03-06T14:25:09.843`) +- [CVE-2024-51144](CVE-2024/CVE-2024-511xx/CVE-2024-51144.json) (`2025-03-06T15:15:16.080`) +- [CVE-2024-5427](CVE-2024/CVE-2024-54xx/CVE-2024-5427.json) (`2025-03-06T14:25:09.843`) +- [CVE-2024-5431](CVE-2024/CVE-2024-54xx/CVE-2024-5431.json) (`2025-03-06T14:25:09.843`) +- [CVE-2024-56063](CVE-2024/CVE-2024-560xx/CVE-2024-56063.json) (`2025-03-06T14:25:09.843`) +- [CVE-2024-56195](CVE-2024/CVE-2024-561xx/CVE-2024-56195.json) (`2025-03-06T16:15:49.230`) +- [CVE-2024-56196](CVE-2024/CVE-2024-561xx/CVE-2024-56196.json) (`2025-03-06T16:15:49.637`) +- [CVE-2024-56202](CVE-2024/CVE-2024-562xx/CVE-2024-56202.json) (`2025-03-06T16:15:50.053`) +- [CVE-2024-7150](CVE-2024/CVE-2024-71xx/CVE-2024-7150.json) (`2025-03-06T16:24:25.053`) +- [CVE-2024-8420](CVE-2024/CVE-2024-84xx/CVE-2024-8420.json) (`2025-03-06T16:36:34.470`) +- [CVE-2025-1319](CVE-2025/CVE-2025-13xx/CVE-2025-1319.json) (`2025-03-06T15:00:16.447`) +- [CVE-2025-1560](CVE-2025/CVE-2025-15xx/CVE-2025-1560.json) (`2025-03-06T15:00:16.447`) +- [CVE-2025-1570](CVE-2025/CVE-2025-15xx/CVE-2025-1570.json) (`2025-03-06T15:00:16.447`) +- [CVE-2025-1662](CVE-2025/CVE-2025-16xx/CVE-2025-1662.json) (`2025-03-06T15:00:16.447`) +- [CVE-2025-1979](CVE-2025/CVE-2025-19xx/CVE-2025-1979.json) (`2025-03-06T16:15:54.187`) +- [CVE-2025-25362](CVE-2025/CVE-2025-253xx/CVE-2025-25362.json) (`2025-03-06T15:15:17.277`) +- [CVE-2025-25632](CVE-2025/CVE-2025-256xx/CVE-2025-25632.json) (`2025-03-06T15:15:17.770`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5a39b992986..b2a1704ffcb 100644 --- a/_state.csv +++ b/_state.csv @@ -179422,7 +179422,7 @@ CVE-2021-36389,0,0,439d8865d3aae753b0e301277dc1b5d8d07a9c31cab481f39569dc536ad3f CVE-2021-3639,0,0,1ce8a21aa5d2f7a4fbba33cd1aacb053a5a2e631eae436d4bc981dfeaa50aa0a,2024-11-21T06:22:02.930000 CVE-2021-36392,0,0,dafd751fb751532ca183faaa5cd9eadb25113ee95568ca182dc17715f2843d28,2024-11-21T06:13:40.217000 CVE-2021-36393,0,0,7c4cb40fb09fbe4f7555a9fb60d5a806cdc3977ab2056f27668df9f629175a62,2024-11-21T06:13:40.337000 -CVE-2021-36394,0,0,ff6f4e5f5419882d259376fa27ffb3ec24bb43e11bba2deff04207c77183c78e,2024-11-21T06:13:40.443000 +CVE-2021-36394,0,1,3dd2f32e9013df7c84fbf1b1a38cc9e20375b98be27d21d6545c1c2363939d6d,2025-03-06T16:15:37.300000 CVE-2021-36395,0,0,ebbeb40a22f1fdca47a6c286ffed449443ec2f8803ffaeb3607548db5bc6295c,2024-11-21T06:13:40.557000 CVE-2021-36396,0,0,88ae47709a6bbde66b382959dcb20b2fde2250fbd13c3746271df62eebc3151e,2025-03-05T16:15:35.433000 CVE-2021-36397,0,0,eebf3717bb6d7a75919581e9690ded27175cc43d0e0ae84aad7e9fc635cccd2c,2024-11-21T06:13:40.793000 @@ -208544,7 +208544,7 @@ CVE-2022-4260,0,0,ee8f096f0d8a3355b542d1fe42358cf53426cf0f9c74e35e21145446363f1a CVE-2022-4261,0,0,f3ea8fa04a826c810d7c11a81d1a2eb57dc66ca87dd7fa34d25ba3d72ca65991,2024-11-21T07:34:53.797000 CVE-2022-4262,0,0,3f46ff2abe5e3a6b173bc24940053d39599d67a394f29911490dc411d2a895fd,2025-02-19T19:39:42.963000 CVE-2022-4264,0,0,6e9c9191bcb2e4227a9683fd2ad7545762b7af98bacbcf085a177a7b291032dc,2024-11-21T07:34:54.050000 -CVE-2022-4265,0,0,d4fc3bf03de824123639efd34aee081bf3da729510bd6fd0d9db85774cb4ab90,2024-11-21T07:34:54.190000 +CVE-2022-4265,0,1,e0665014eaf02201aa094a0af673fce18d7eb49f51d02402ffa0b4a8e103ea38,2025-03-06T16:15:39.280000 CVE-2022-4266,0,0,e93286bb1d277696fa139681d8d5b6a89c7a738e871d31529d0a1ed21cc63007,2024-11-21T07:34:54.307000 CVE-2022-4267,0,0,49b1995577721f848edd800036b41f8cb432ceecbfc076e67b6aa8a1394a170e,2024-11-21T07:34:54.420000 CVE-2022-4268,0,0,3035ab9381654c059b335789faac47f434be3715828f3135b4a7ef2721562826,2024-11-21T07:34:54.530000 @@ -209606,7 +209606,7 @@ CVE-2022-43970,0,0,557fbcda71ab38a32691a688b2fa0218fea9d7602613214e96c011ed7448f CVE-2022-43971,0,0,7add645eff71d088604788c474912242b919c9f4249701a23d0ee76a0a0cdbe5,2024-11-21T07:27:27.293000 CVE-2022-43972,0,0,b1fcc1938d467344bfe6f3d21bd18c4b131f134ffa2cb5cba9f3d77b9d458aca,2024-11-21T07:27:27.420000 CVE-2022-43973,0,0,fbf58f67e6150c85f77a8fcc0dbe067db0cf425d405092d33943297cca1f90ca,2024-11-21T07:27:27.560000 -CVE-2022-43974,0,0,3f485db4057f285d8f2e41a6f4978cf3bf872e4c9a4699bc2e5525558b1ad60e,2024-11-21T07:27:27.703000 +CVE-2022-43974,0,1,69919e0e7167905137470b42346d9514d9f5ad392ebade71b415f92da98d24ae,2025-03-06T16:15:37.880000 CVE-2022-43975,0,0,3d47110113cc8a54459debf524756efecc6e5af214bc607c4e9ee754675e7855,2024-11-21T07:27:27.873000 CVE-2022-43976,0,0,3dcd63badba8d833fad00134b91979ce3707af51148a8968ea2cdd5a4d8bce95,2024-11-21T07:27:28.013000 CVE-2022-43977,0,0,871f20691e0f649b27fa670416d3aae8731f054d31e24a163c764cf222e1609e,2024-11-21T07:27:28.160000 @@ -211987,10 +211987,10 @@ CVE-2022-47472,0,0,9fedf2ddd34ef86d1b864027fd832881ccf70fced06accfd8af23ca518fa7 CVE-2022-47473,0,0,3335e5f0084985a2959a6836570a809e2a4bc068ee73d7232407f36e7fb1f62e,2024-11-21T07:32:02.103000 CVE-2022-47474,0,0,7cb8d6dc18b68527fd19e5a353ea6129c7ca357436d294fb6ef65adcce5d4099,2024-11-21T07:32:02.217000 CVE-2022-47475,0,0,d7a94a98d0e9b69247d909283302b483ba39c3209624fade1f3763378b140cc7,2024-11-21T07:32:02.330000 -CVE-2022-47476,0,0,3d7b234fe8f2050f27e9c4e5d6affc26bde1aa2310baffea0d9fac07db363eb3,2024-11-21T07:32:02.470000 +CVE-2022-47476,0,1,9031e7c2ca06b021bf95e84e341e464b0078e7daa64a9d8e1a43f5244d5cd478,2025-03-06T16:15:38.127000 CVE-2022-47477,0,0,27c1709db353e72d8574008fc997b3c35461453cd114777eee1f13d9902b68a9,2024-11-21T07:32:02.597000 CVE-2022-47478,0,0,aa28bc26cae78f6924e17ded517950cde9059d1b892de98854c670291561d6ba,2024-11-21T07:32:02.717000 -CVE-2022-47479,0,0,a426ed8be78132bfd5aa325fff4c075b2b22e3501cc75035b596563396c74056,2024-11-21T07:32:02.840000 +CVE-2022-47479,0,1,71d5e9dafebc972c1236e061fd361e99a4b570f1b8a92d5da491037ea761985c,2025-03-06T16:15:38.340000 CVE-2022-4748,0,0,ef3280be296917f093d7b5252769d8875b626bc3bcad498f72668da48999a400,2024-11-21T07:35:51.937000 CVE-2022-47480,0,0,76a40e4c0a09df9bf69b4b9ade9ab4eabfc98c306705734307952abd63fc7c1f,2025-03-05T21:15:14.917000 CVE-2022-47481,0,0,1d68dd0cd9aacffdb0a0015ab0415ef87ad1def43a11f0aea071156b30b36afa,2025-03-05T21:15:15.067000 @@ -213787,7 +213787,7 @@ CVE-2022-49610,0,0,11b5a741a8054dcf8044636dde3381cfa8eac599bbb5ea22242896e6e1679 CVE-2022-49611,0,0,344d38f5eab50eea56caa9422631db07ee9671baffd8abf944c9db4ed0aee250,2025-02-26T07:01:36.553000 CVE-2022-49612,0,0,2304ed49ca77900bbe6ecb264baeb49d9a781e8df8e6bb309cd271ed227476d6,2025-02-26T07:01:36.653000 CVE-2022-49613,0,0,da1a5bf1db738f16b89390b6e2be1b8d2a6beeabebad38e0c4b03ad5c9f896d6,2025-02-26T07:01:36.747000 -CVE-2022-49614,0,0,31bc2da9a31b78866c230b57e05541cb2313e7dde3c29e99b9c6a0af22ff5208,2025-02-26T07:01:36.837000 +CVE-2022-49614,0,1,0c0cc93db34eafc8b46e404b2ade125e91ff81e0ea0c0d87408e17b6f9894992,2025-03-06T16:15:39.210000 CVE-2022-49615,0,0,a88266d354085e1f96d25159fa3a20937819653dfacffa5ca2d6f580833df806,2025-02-26T07:01:36.927000 CVE-2022-49616,0,0,a4611de63852c409b6a8f685741acf172ec192405385f97e33645e097bc948f7,2025-02-26T07:01:37.017000 CVE-2022-49617,0,0,5b4bf5ee3ce7fea08e636f4ed9b4e7855593e6366c99a2330427ae648aeb3904,2025-02-26T07:01:37.107000 @@ -213980,12 +213980,12 @@ CVE-2023-0059,0,0,44aa447c40fe10be5f3c84b017260c6212db07b8e7d3a1f91b46497cabf97d CVE-2023-0060,0,0,cdd54e8b342a3a1f6f68b7ac47c43777884835e87ed1694141b407ee7c60cc2c,2024-11-21T07:36:28.833000 CVE-2023-0061,0,0,b385224cc61bac2b08e018151dd3d9aa20412462b9c728bb3d0262d3bb260cef,2024-11-21T07:36:28.933000 CVE-2023-0062,0,0,14cb22392ee2e891b0ce9bfe5eecdbff8c91c0f88e0ea8d60be75b771f9ae48f,2024-11-21T07:36:29.033000 -CVE-2023-0063,0,0,1f7b6128cb47df0cbbfa2196f5befca0545ca890f416be74558c21fad3ebe85c,2024-11-21T07:36:29.137000 -CVE-2023-0064,0,0,76a91f9a2e46507fe49bb8b5509e3183dd91edfcadf3fa08b69dc160abf45a43,2024-11-21T07:36:29.240000 +CVE-2023-0063,0,1,e0d8f4ec9f56a5a6ed50547711273383d0479f10d3ef641384e7d7e8508dd506,2025-03-06T15:15:12.663000 +CVE-2023-0064,0,1,32bf06de3e8b09fb1a5c27cce04b2f457d43634b0bad149770f75062d6bbfadb,2025-03-06T15:15:13.337000 CVE-2023-0065,0,0,1af42c9630237adefe532d5e7d6c03134844119157520f1dae4aad3d5003e3ad,2024-11-21T07:36:29.343000 CVE-2023-0066,0,0,66abd1188955921a4f586244d11ac2aed7ba37215a66a107b40ed1984614d870,2025-02-27T21:15:16.620000 CVE-2023-0067,0,0,d9b9c7e73ab578382d2a88b409033e01b0277359a48f063cf20738d009ed0036,2024-11-21T07:36:29.547000 -CVE-2023-0068,0,0,09b587937209aec78ff4e464b77cb9d1b780912e276b385bb5b75adb2cb8a003,2024-11-21T07:36:29.650000 +CVE-2023-0068,0,1,595f7f6244176a72aa33ed40d695e496bc7c9316006716b32c1466cbd00ed810,2025-03-06T15:15:13.520000 CVE-2023-0069,0,0,bb4a67e87a89a16e9214b1f062e8f6924eef987d6dc74878eb3573b76c99a092,2025-03-05T20:15:39.917000 CVE-2023-0070,0,0,8af155f487a0101fddbe52c416440c5cd676cf772f8d175d008a6b3bfb7c26c8,2024-11-21T07:36:29.850000 CVE-2023-0071,0,0,63f3711ec31ece4e46d0d19fcee20f3780808fb2036b3c7df3c8e5f5031c035a,2024-11-21T07:36:29.953000 @@ -214082,7 +214082,7 @@ CVE-2023-0161,0,0,2d565afc2a392d75d863e5fdf784db6696b2ebade8f447f4c56c766437755f CVE-2023-0162,0,0,a78adc583dc52703aecf41560a1768c9925a4d13332c5efa0d7d22f56def82e9,2024-11-21T07:36:40.040000 CVE-2023-0163,0,0,92c5c47d0b844d863693b4b0e085adc34334371440bbd95c65e36a0913370428,2024-11-27T16:15:06.757000 CVE-2023-0164,0,0,51c32b819fc67e3646f865fa77c64f2d24aa44508624e04b02c13c4864862d65,2024-11-21T07:36:40.150000 -CVE-2023-0165,0,0,21b9f9dad67361a2f226adb73d776e9ce75204430e8a96350515e3552203d4f7,2024-11-21T07:36:40.253000 +CVE-2023-0165,0,1,7fcc3d9ed0c5d6428efa2bb074b9f90b7adb08040882994dabf7a3834cb08354,2025-03-06T15:15:13.633000 CVE-2023-0166,0,0,49b2ded7625387b1a13e7ac4f3c5d2fe1b752791752732fc35601586b7acbb56,2024-11-21T07:36:40.357000 CVE-2023-0167,0,0,459d4943ae7f6093e0c08e93f0df454bd6f8fc1ef44e06359463c8da2022995d,2025-02-26T19:15:14.690000 CVE-2023-0168,0,0,480bb72aebfb6db5bc6de2fc7749a7dfe9ec422fccde53fd6ce097e3e084f78f,2024-11-21T07:36:40.573000 @@ -214128,7 +214128,7 @@ CVE-2023-0207,0,0,64984549e794c8b3345fba50109428e553562795562ca0bd04510cdffc48c7 CVE-2023-0208,0,0,ae541cea65b69ae589a0f27e271ee0c6dee76549a4f88a60062e20220566bb9b,2024-11-21T07:36:45.100000 CVE-2023-0209,0,0,039dcebdd8fffb3c5d912bacd23e44110d548aaad2e45f26cbb39657e1615240,2024-11-21T07:36:45.217000 CVE-2023-0210,0,0,af407103d0c3067664a7aa22418135e8a5c1fe83e72f88d8acc7d63b1caab777,2024-11-21T07:36:45.360000 -CVE-2023-0212,0,0,250924d4d681548f4043ac805448e748c66f1aaf72498011e7476d59bf821027,2024-11-21T07:36:45.487000 +CVE-2023-0212,0,1,db350673c120e247fa84fa1aa004d05a0b5c6de187724c33762d8fce777b2f53,2025-03-06T15:15:13.757000 CVE-2023-0213,0,0,6150d16f15a42b48c31fa66dbd1387e2099a15d634c77c2d4f4accc62568835c,2024-11-21T07:36:45.587000 CVE-2023-0214,0,0,0a3cfa34ea51b3dc5d3d80ad4db72f9e7b5d75a78a5c14804c8a714e4761871d,2024-11-21T07:36:45.717000 CVE-2023-0215,0,0,d9a4101a729f368df1ac05268f8b987a45a4c78941f2543af10ea2a9cefed8b4,2025-02-13T17:15:53.690000 @@ -214239,7 +214239,7 @@ CVE-2023-0324,0,0,d5cfbe02e3dc2b4bae0ea4621f6f505deade1c4d5f4bd77648f3c6c8283c52 CVE-2023-0325,0,0,4ff7aa7922b1e7be70db8422a95e14fde29f06c593783cf6534d24eaf04c7c04,2025-02-13T17:15:54.513000 CVE-2023-0326,0,0,10b56521dc7550d5d193872219ce775d78cb00c9f93884299a94cbd24907eeb2,2024-11-21T07:36:58.627000 CVE-2023-0327,0,0,6167212aceb2c31f3e634ebdc5e2fe015ef028aba2344b99409195bff6437f26,2024-11-21T07:36:58.747000 -CVE-2023-0328,0,0,27b3f4e5213beee5b37d52389d0d266b9841b6ef7b01e28ead0eccd9f3892365,2024-11-21T07:36:58.870000 +CVE-2023-0328,0,1,60a5e418def05aeec452bb62d499808225e4c06d3b621376c68675e29c3adf28,2025-03-06T16:15:39.403000 CVE-2023-0329,0,0,af8a57f60cebf22d5e961642189108c9b03a601bdcdaac0ddd34e75b44e97c27,2024-11-21T07:36:58.970000 CVE-2023-0330,0,0,0597b42289577da5a8502854ac2fe29c28b08c8707968cf90382e1363234f929,2024-11-21T07:36:59.077000 CVE-2023-0331,0,0,6bc9688deeae710cbf744fa07feeea2933d7392453d27f8553fbe1cb355de2dc,2024-11-21T07:36:59.217000 @@ -215075,7 +215075,7 @@ CVE-2023-1198,0,0,007352a77f8be86abc9014a5228157699faa100b2d96c0aa11fbfdebb3b2fd CVE-2023-1200,0,0,cb5805db4a921d68bdf953c1e086ad953a942ed94e0e68ad6b2ae124e1cf6cd7,2024-11-21T07:38:39.437000 CVE-2023-1201,0,0,f4764263a23a32d0db12c78e0cf32f66698f52de21b5dd3f805ae2d534552a96,2024-11-21T07:38:39.553000 CVE-2023-1202,0,0,e995e212ebe63e7f0467b64e16d67f68aa9e5461a685e3b0d682958b41fe5915,2025-02-20T21:15:24.633000 -CVE-2023-1203,0,0,2c91a011fc8bd4ea016cf3e67f1e6f2936594e64abfa5a016428f0a01e709b9b,2024-11-21T07:38:39.760000 +CVE-2023-1203,0,1,0752c09acbf68ed55484643ac2059b5bac4dfd013639f567a2ed14b433a38598,2025-03-06T15:15:13.977000 CVE-2023-1204,0,0,c2aa540d011907285fafc8b079b7b56473284d8f0c49ffb1b78642f39b244f98,2025-01-30T16:15:28.937000 CVE-2023-1205,0,0,7664848268797b770afb2d9857c52c62b388924b546ea4cdebbf8dc8b5f1f08f,2025-02-28T17:15:13.583000 CVE-2023-1206,0,0,61a6d8638c87f97f2726781e2179014defc8f0359aad79a22aeca86d4eb775a3,2024-11-21T07:38:40.070000 @@ -217017,7 +217017,7 @@ CVE-2023-21372,0,0,3a8412fe290becf710e19579f2bfe45ccd28d8f537b7f8099062d083dc0ef CVE-2023-21373,0,0,e1ebb544fbc713bdbdcadd9bce09ba44bb05fe1759525f9f3d3885d22e93526d,2024-11-21T07:42:44.197000 CVE-2023-21374,0,0,abaec44ff0fe59955382519a58b9b4169c1815daa8f7bf22b8d666535dc84ce9,2024-11-21T07:42:44.303000 CVE-2023-21375,0,0,d7271a10c598dffb195fb98c4cd29ccab2da6cb9338cad71c857f09b737e247a,2024-11-21T07:42:44.417000 -CVE-2023-21376,0,0,69367081182b7950095866280fbb68df61f95c6547175f16e525b6b2d92b436f,2024-11-21T07:42:44.527000 +CVE-2023-21376,0,1,bdab51ebe2b1848acc2a2be69331b293ff076e475f6775af4c875090b155ed14,2025-03-06T16:15:39.520000 CVE-2023-21377,0,0,4b429fea6b1d15a1f7f6be0d023b9ca996fc2c97572e978edfadaf415aea3066,2024-11-21T07:42:44.630000 CVE-2023-21378,0,0,5800f2c7c242d81d1f96f2514358398b134e8b4180c3d82cb936b3682d0b6b7d,2024-11-21T07:42:44.727000 CVE-2023-21379,0,0,360653de5f39e2607554974a1a65bd193e8c598b07c580610ad4cc70d74518b5,2024-11-21T07:42:44.840000 @@ -217724,11 +217724,11 @@ CVE-2023-22065,0,0,77efaa3f24855c6af91ff4b59b7b4b41a08281e54bf2e2232461707e7156f CVE-2023-22066,0,0,686d26684af35b2d91ba5682456197c66a2648fa11707f707629c7ab84bf04a3,2024-11-21T07:44:12.557000 CVE-2023-22067,0,0,bad76f2a48f771ccd8be97c2dd01b5dd0ee037a01e5c8347cca968282b147d4f,2024-11-21T07:44:12.673000 CVE-2023-22068,0,0,149c3090de36a73c71e89bb1f5240fa6123b98197d467ce13b0c5f074b4f7b9f,2024-11-21T07:44:12.793000 -CVE-2023-22069,0,0,ca5c5e5c93349bf512a05c565380c9b799c0862a530194960a5652853f956cdb,2024-11-21T07:44:12.910000 +CVE-2023-22069,0,1,30f6b95b38c9b9b197af46276e964c324eef1c8592b69948ec0ea76274a0b6ff,2025-03-06T16:15:39.710000 CVE-2023-2207,0,0,9dbef90be58bf8f37463907ffe30bc40a3d7ba2c1bb1dbe6ad3c433cd36118e0,2024-11-21T07:58:09.347000 CVE-2023-22070,0,0,b5a88bcc3ae6222dca14e3ba7afb28546d969444d259916c275bd30fb2818885,2024-11-21T07:44:13.020000 CVE-2023-22071,0,0,e4a7b2aa61e386a2e1cdae3ed62cfee2ecdb729564de41fffd23b7cd1cf8c01d,2024-11-21T07:44:13.133000 -CVE-2023-22072,0,0,7cc1aa30e676ef30fe65e05f02584c4f72a5e3ae46d7907f6f54fa618d689dfd,2024-11-21T07:44:13.260000 +CVE-2023-22072,0,1,3f4df1f6aa288165925734f754f5622366d3b8428ef754add5e6b6d7f71d014a,2025-03-06T16:15:39.877000 CVE-2023-22073,0,0,190e8a6e36e49663c701ad19c0984f28bfe405bf475e6f5584b16bbc05810087,2024-11-21T07:44:13.387000 CVE-2023-22074,0,0,668058e99d278262651a7cd7e95730190a87e651063fdd360a1f456bc30b3049,2024-11-21T07:44:13.507000 CVE-2023-22075,0,0,063c11825a6bfb4ffde745ee57dff2345a545dcbd2b381e7d280f253ebbc6dcf,2024-11-21T07:44:13.637000 @@ -218095,7 +218095,7 @@ CVE-2023-22508,0,0,025a8b6686fac397e0be875d3eff08947330e24a2741d8f677d0048a66c88 CVE-2023-2251,0,0,7074e1cc6f181fe6e60c053fdd1b25d246d4630a51626bbe6a34476d29827815,2024-11-21T07:58:14.463000 CVE-2023-22510,0,0,38d30730c5e8469e4213ddc4af4d979fe2b3cf6dc59d9fd49be1de40d36686cc,2024-01-16T18:15:09.080000 CVE-2023-22512,0,0,430067aff48c4477cb1405d1591f95dc9a707765098b5518559b75833a321a4f,2024-01-16T18:15:09.130000 -CVE-2023-22513,0,0,a169388bccaa82837ba3deb96e0eaf8f3330fab8271a22d3e8249d1f38852e1f,2024-11-21T07:44:57.667000 +CVE-2023-22513,0,1,d1d5d1b202ce20d05345e39cea416a9fec7a297999b594a85af13f30835d0912,2025-03-06T16:15:40.103000 CVE-2023-22514,0,0,4b9e88e625d812470dbdb870eea97ea4e0882d0b7b1d71ab0068a97e7448e8c4,2024-01-16T18:15:09.170000 CVE-2023-22515,0,0,e1b3a5c24dec069d33c73f20bc1e55691c01a674db9c1c72e0df3398fa55e1d8,2025-02-09T20:49:55.073000 CVE-2023-22516,0,0,001864230f9bc370fdca0f79ab8ffe9d7082f111d6a1d9cf3af59d82a0bf4574,2024-11-21T07:44:58.067000 @@ -219848,7 +219848,7 @@ CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc CVE-2023-24773,0,0,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000 CVE-2023-24774,0,0,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000 CVE-2023-24775,0,0,370e52e17f228ac5b00111d084ae9525ce1a2e22d3eea9b60c4e85f7644c8192,2025-03-05T15:15:12.233000 -CVE-2023-24776,0,0,de29802d611b377fda64ea3600ecffda20ec3bfaeee35b9a5967cdf2a0fba02b,2024-11-21T07:48:23.833000 +CVE-2023-24776,0,1,0a5f5709e205dd9226376644553b486dea56437f189c294a8080391f52998384,2025-03-06T16:15:40.317000 CVE-2023-24777,0,0,a00b279e478c451a27881293d2469f6eae0019065247a670b5fb4f948be6bc73,2025-03-05T19:15:29.630000 CVE-2023-2478,0,0,e91b233a353d459fe8bdebf4b2ba61948a17e504cd67f12404049ad129f433dc,2025-01-29T18:15:44.907000 CVE-2023-24780,0,0,a70e6811128672d0ff689b485eeaa75ae829acf7b17513334d6f6cc6f8dadc0a,2024-11-21T07:48:24.097000 @@ -220205,7 +220205,7 @@ CVE-2023-2514,0,0,c0a74aabdf612338b5c2bbf99973c4dcf772d38ab9efc3bea1b0156e23e965 CVE-2023-25140,0,0,74362372391b31264001eb955c5daf2c2b9c8c748cdabd288baea2cf0557b135,2024-11-21T07:49:11.220000 CVE-2023-25141,0,0,6dc3c22bac02c920d3d25c63074609179b1ea370d4da9ecff5b21b830c61359a,2024-11-21T07:49:11.340000 CVE-2023-25143,0,0,f14793445037582372555d13411197b8aef60ff7d37d181eb93091b88030c258,2025-03-05T15:15:12.443000 -CVE-2023-25144,0,0,ab7d84d2f165ab21b0b1f9ed1abfd79fb52c70cb16fd0a8455b22ed951ca3fc4,2024-11-21T07:49:11.603000 +CVE-2023-25144,0,1,31d1251f7c4c1c756ddbd5a92934728af4974392f21d4a2332ac16e23b56cf80,2025-03-06T16:15:40.503000 CVE-2023-25145,0,0,71e62e20409077ec917ec9a494564df62e5a03e10fab96fa74817a2db3525c8c,2025-03-05T21:15:16.993000 CVE-2023-25146,0,0,b2d7efa3a19c0ed8ead8336e6b5ebce9a7c3889978c9ca6185fc1f12a51279dc,2025-03-05T21:15:17.160000 CVE-2023-25147,0,0,3f3be06805fca693d13306572db1e19af0d3aa94905d692b5b0da8ba725aecc4,2025-03-05T21:15:17.313000 @@ -221458,7 +221458,7 @@ CVE-2023-26596,0,0,473d756e5fc103c72c25cb52f36d58f77ec5ae61a2a53c9a3dc335fe84d6a CVE-2023-26597,0,0,aacf593fde559d15ce4638d00292bbc24591756418f0523c6654e6c81acd48a7,2024-11-21T07:51:49.657000 CVE-2023-26599,0,0,c5e1c6a4e42725cee36588845ac1a7fc3d032881dab1d5f8abf0c196155e5cc9,2025-02-05T17:15:19.107000 CVE-2023-2660,0,0,7ad14df71bd6f47a8139201861f3abc151d1b6fe342fd8128dd0f1b57656134e,2025-01-24T17:15:13.147000 -CVE-2023-26600,0,0,fc886529aff42ccdb72f3f96931777e9e70a1824ffc00cacb571e65058ac20b7,2024-11-21T07:51:49.920000 +CVE-2023-26600,0,1,3837b133a282bf456abacb2fa744d8708012bf9caab68a89a3e7d04483d38643,2025-03-06T16:15:40.740000 CVE-2023-26601,0,0,a5885f284434b5f08eb9e7edc10d2032bb0cda5c5996581471528822ba1aee62,2024-11-21T07:51:50.100000 CVE-2023-26602,0,0,6b0e3fbb7db010761dc530c451b95f462476cafda0ba70599528d74ebf165b88,2024-11-21T07:51:50.250000 CVE-2023-26603,0,0,da0ea56691af772b0f5dfed4b9a6045657b5ba6cc005f62227c719c99c26200d,2024-11-21T07:51:50.400000 @@ -224961,7 +224961,7 @@ CVE-2023-31076,0,0,36bac3067e015c0b66ec2372ce6f587ae23e3728a833faffceb614da67fc0 CVE-2023-31077,0,0,e24ced2f70a3032ddc3b2af8f09927d8b3711d6cc86cfafe5375d47b48ffdbc6,2024-11-21T08:01:22.073000 CVE-2023-31078,0,0,fbdf7f7231b8eff5bab359b91c97139c07de6f4e006a1a6ec72fcb6fcac1de06,2024-11-21T08:01:22.183000 CVE-2023-31079,0,0,0ee5e9b842f3db2d32d79ab8fb43a4787f096c8cc6b34af17bbc61bddfad4fbb,2024-11-21T08:01:22.297000 -CVE-2023-3108,0,0,f5521bffc07c8e8a4332336b0804cab4391fd59d30a67ec3028f8a28d8497991,2024-11-21T08:16:28.583000 +CVE-2023-3108,0,1,b1558bf7aec6215d0ff14bf10f30306440c255be6f63579c15dfa6828721cd6d,2025-03-06T16:15:42.473000 CVE-2023-31080,0,0,39a26574f36ed8dd0c9fd3a387a9dd657d7d5ad3d809d3e00a3a74a4b19efbbf,2024-11-21T08:01:22.417000 CVE-2023-31081,0,0,d13875ba401a922862d07e377f4731883ace7ec34bcc115717207fa57c36fae4,2025-02-04T20:15:48.993000 CVE-2023-31082,0,0,622eb9692074f84ebebf1f6ccc63dfc5594b511731b33469e7c3fc69ecbf8e80,2024-11-21T08:01:22.690000 @@ -226119,9 +226119,9 @@ CVE-2023-32557,0,0,4610a54a482f955f3b94e7274db9d879cb2b691166c714fe8994d35b3a462 CVE-2023-32558,0,0,60ad4ddbb1220a3ce9ba4efc190af04be51492e32acf9905e5db2ba6854eb11d,2024-11-21T08:03:35.867000 CVE-2023-32559,0,0,571185391c7054bb4441dd3b65914f2281602e8ca365181a4df6ccb4e42ccb41,2024-11-21T08:03:35.990000 CVE-2023-3256,0,0,a92fa62cf61958d54177c7850dcc03d5b1bc70f5bcd837a496328bc06300fd26,2024-11-21T08:16:48.780000 -CVE-2023-32560,0,0,b144fd88a661895bf6ebaad16e08ffa65b38d9a75a3c88eedd389dc48dddbd8b,2024-11-21T08:03:36.150000 -CVE-2023-32561,0,0,5875ee9f52dd55a9dde1f5905e37936032f64b97c3755e034bce5eb8be46fa1a,2024-11-21T08:03:36.280000 -CVE-2023-32562,0,0,9363b265cf606f9816eca688b4f87ca60cecb88148d7c9526e3c7381aee34940,2024-11-21T08:03:36.400000 +CVE-2023-32560,0,1,a5d634658cc7a874df37e91a2b18c36de245a11adc53b0d0146151f1dc0d0df2,2025-03-06T16:15:41.303000 +CVE-2023-32561,0,1,4727ed861abbae007a69386bbac521dc71d40735d6275d13140d4b3dc59f2484,2025-03-06T16:15:41.460000 +CVE-2023-32562,0,1,c5aea3318b67375870339ebb5ae5004ef4b3a21e9c52743d507002866915ccae,2025-03-06T16:15:41.573000 CVE-2023-32563,0,0,98690f12b8374208182fb4e4258074214d1a1c7fc365e0fd322088aca2705bdf,2024-11-21T08:03:36.527000 CVE-2023-32564,0,0,0110939bbbb296f8a1f1c00eaf9f1d011e42a76f4d099cf6325379b063f2fae3,2024-11-21T08:03:36.653000 CVE-2023-32565,0,0,c758dc41ed02cd23af8831add347bf021d7a6870c2092336f155e1024b96d95c,2024-11-21T08:03:36.767000 @@ -227335,9 +227335,9 @@ CVE-2023-34053,0,0,5ae81959572b70290db0620248a24971b183da06bcf2b3d45b687f0513f5b CVE-2023-34054,0,0,54500b21f2354894f709d5aaaad6b7ca7d00a2320d0e85a660f187b6a0c1a8ee,2024-11-21T08:06:29.087000 CVE-2023-34055,0,0,63c9b47aea5e3276830467960d55017cc9db53b3e62afce329d8601be1afd12d,2025-02-13T17:16:34.187000 CVE-2023-34056,0,0,14d3c031ca9e7007f761abd8416e245959ae8261bd94404120378234965069d1,2024-11-21T08:06:29.343000 -CVE-2023-34057,0,0,284944c4d4f0ab2aa8c3a4d449d13855efcb27bb29ccff0323ac704be09ffccb,2024-11-21T08:06:29.487000 -CVE-2023-34058,0,0,8d899ff610a86ae75ca6d956e0187b481136f353b698731c33e121a5fb14f05e,2024-11-21T08:06:29.613000 -CVE-2023-34059,0,0,89afe20e7ce5f8794cd3f14f817b0cc63e4b48cab542ac83e11126ff6fea7b0e,2024-11-21T08:06:29.770000 +CVE-2023-34057,0,1,fe13f25a590c897e9278fe1e31233dc8fe31216d2f195ddacf2dbf34bcde92c4,2025-03-06T16:15:41.690000 +CVE-2023-34058,0,1,a0d110aa3005667043c6cc6fda4058edfc29f5aec6a59d90d13839ef54f7715d,2025-03-06T16:15:41.840000 +CVE-2023-34059,0,1,973b3e3aa24fb1da7f85a92d2bb757b23faf3999164d42dd87bb0ae425656feb,2025-03-06T16:15:42.033000 CVE-2023-3406,0,0,932f55ab16fb6316d15d1bcc321abb01d6031539906cd4d55424f8f89bfb1504,2024-11-21T08:17:12.073000 CVE-2023-34060,0,0,3e5a9882e83d81f853f8b71eeb1694bc2ff8ad4f0c10273aaf0873d1d85d02cf,2024-11-21T08:06:29.930000 CVE-2023-34061,0,0,06d7c75de09eb9adcce12a4d4977539a997e0f8c87108057d925c9e02894d369,2024-11-21T08:06:30.063000 @@ -229728,7 +229728,7 @@ CVE-2023-37359,0,0,f02625974ed9354ede7ae2f59a32dda01c9ba2ef82ea5d39f957bfe558268 CVE-2023-3736,0,0,dedafd6877d26f0fd9c122ea355f658fc7c7b4f2ec3e77dacbfc62facc85cd35,2024-11-21T08:17:56.810000 CVE-2023-37360,0,0,a924b07516dea5ea55366c15ee25306723cb158985e96268ee4dc29522a23de4,2024-11-21T08:11:34.787000 CVE-2023-37361,0,0,19f0591a98743be38ef4b9d2856f125450962cad4b2cc4b48619c1779fd7a2e3,2024-11-21T08:11:34.950000 -CVE-2023-37362,0,0,5a83607ba951183c2bc8ee0b0fb38978c95ebfba71c7b39b8a91635407423c3e,2024-11-21T08:11:35.107000 +CVE-2023-37362,0,1,aa44fd3c0258bcc9d876470889224b6128b9eb9d1097bd87fe51f83f770a3c38,2025-03-06T15:15:14.640000 CVE-2023-37364,0,0,d5c55ace2d7cc463ee55d1b0e62f9401dca35cb21f12f6fefd05764cfc3d11ab,2024-11-21T08:11:35.237000 CVE-2023-37365,0,0,9e780399abccdae1564a73b0cf5a6e3def6a18d4d14ee1798d8820edbb0921e4,2024-11-21T08:11:35.397000 CVE-2023-37367,0,0,76359d1f04beb8292d5c3157cf7c1e7dce70d10c2116c1a0d80eba70a20432b6,2024-11-21T08:11:35.543000 @@ -230371,7 +230371,7 @@ CVE-2023-38136,0,0,cc4955f78f48feea52a8ff9bece7ccf895118e79124cbc89767e10212b3e4 CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000 CVE-2023-38138,0,0,265118541aedab6ba410564980d475efb6b1cc3413d9a0d65fd07fdd99402bf9,2024-11-21T08:12:56.123000 CVE-2023-38139,0,0,28ae972bc6c292c9dd7822dd5342d5b1431b1b6fdb4601c453b88cb6d465c678,2025-01-01T02:16:26.357000 -CVE-2023-3814,0,0,d40424dc5cdb442ffa10c4b530f9ec3fb4ff1303377698194d97909134cdaf65,2024-11-21T08:18:07.877000 +CVE-2023-3814,0,1,50c8b1f6ff11b5c3809021368f87eeb1fa75ea2568cbc65a64c1135349534f2c,2025-03-06T16:15:42.640000 CVE-2023-38140,0,0,a34a747b89d3dcdfe8ad85324181d3e8f9bab543b4b57dbc3136d213216a9e4a,2025-01-01T02:16:26.500000 CVE-2023-38141,0,0,738a18f3924c7c7a418c243d5f24cf5673e8b3034ee1e019b1313fe7e01db4d6,2025-01-01T02:16:26.637000 CVE-2023-38142,0,0,884787762ba22e2f7aa32255c43142dea70f99b7c3aae4a90b5d62bc3dd70d25,2024-11-21T08:12:56.763000 @@ -230771,8 +230771,8 @@ CVE-2023-38543,0,0,9e3af4531e43f5677526b7f10f6c415eed9d42534cf2e2ec7e7acb1480c04 CVE-2023-38544,0,0,8dbb1a660034a252199bf3aba268cd48e857709594f614422deafbb9308a766a,2024-11-21T08:13:47.867000 CVE-2023-38545,0,0,f9271564da96af86fdebc39a0aa493a80f85ca57e13f2db6b740c24e066529f6,2025-02-13T17:16:47.823000 CVE-2023-38546,0,0,b5df3fb7387fa5c1fb6da642f5327a6a3ec6222b99cff3e506373299769294f8,2025-02-13T17:16:48.027000 -CVE-2023-38547,0,0,48668950339963396982832118b6335b7216d129a3afeedc43abb43189efce20,2024-11-21T08:13:48.367000 -CVE-2023-38548,0,0,9584382461e0b126bdd91d2f4a5be74c31586232c6196353d068a644fc8a0919,2024-11-21T08:13:48.483000 +CVE-2023-38547,0,1,2b2d99dc0b12a17e84ec9c9cf2241317051c7fea7f54e71bd1cddbbb60e5297a,2025-03-06T16:15:42.203000 +CVE-2023-38548,0,1,94a619ea0c0739293919cd8abcc38048ec1910e65463718b4b27b4b29ad08636,2025-03-06T16:15:42.350000 CVE-2023-38549,0,0,223f4da3ef138e6118d09094cdb53d07b647a42b8ce5c54b50f75768a9451617,2024-11-21T08:13:48.593000 CVE-2023-3855,0,0,3fa7c2c96667132385f9e93f131c3f823b77b6bf879f2fd372afb1b648775efe,2024-11-21T08:18:13.613000 CVE-2023-38551,0,0,192d3411bb909e5538c7acd67c719431efc5fafe865c7e56d0ec31d44c3f71bc,2024-11-21T08:13:48.717000 @@ -232431,7 +232431,7 @@ CVE-2023-40586,0,0,719c188b1093cc66a5e37b560626e3284e5e1e2069c84dc2c54e12f1a1f25 CVE-2023-40587,0,0,a8761c1922b81175d8185d4bb24db2787e94cd8a2bd28a2696ec2c4903b688d0,2024-11-21T08:19:46.277000 CVE-2023-40588,0,0,edc6f88a1e87c0cad15aea7f7762e660a5fdb7d930a87a7a44eff8430fc6433f,2024-11-21T08:19:46.417000 CVE-2023-40589,0,0,b4fbf3335603108bd816c4828fa7f5c28328a56880c21745c0ded46831b57b92,2024-11-21T08:19:46.583000 -CVE-2023-4059,0,0,090711f79cd36d2dc9a0cdaf6469a42c2437cacf195901e9087e528c830205aa,2024-11-21T08:34:19.340000 +CVE-2023-4059,0,1,9d6db5e26d8986f99a875a3960586af827d7c9368cc33518b177e44a85c063ff,2025-03-06T16:15:43.977000 CVE-2023-40590,0,0,a4294d30d7ff66a37ceae3631ba9e1de337caffcdfa33c94063a8f679dd167f1,2024-11-21T08:19:46.723000 CVE-2023-40591,0,0,17decb38b943a307ec65fcbdde09f3634630f51a5c9b9d06c26af7d692c33dcc,2024-11-21T08:19:46.860000 CVE-2023-40592,0,0,ec0809b3ef31f10960945c2239566afeb74a477e1f00d43065ae029f6a1ff61c,2024-11-21T08:19:46.990000 @@ -233120,7 +233120,7 @@ CVE-2023-41505,0,0,542892c6e9a5b11b222cd59017abff36cdf4a98ed7c8639aab3d6766aa874 CVE-2023-41506,0,0,7a8dca2e3366085c44580d19785cad1e729ca5b1f5e59b8a15aaffe2cf84d224,2024-11-21T08:21:15.190000 CVE-2023-41507,0,0,5f979ea0d45c236a90b02e844b6c4cb504d32fcad222700f17481ff17ba4f917,2024-11-21T08:21:15.417000 CVE-2023-41508,0,0,731c1bec0b5200878921d3336877eeddf3b26b9255a8e10ccf110ad9f68effc2,2024-11-21T08:21:15.573000 -CVE-2023-4151,0,0,a4697b2eec21214d6a46bdc4f69fee4a9ca80efa0ef9e7db50d9928a6a6c98a2,2024-11-21T08:34:29.463000 +CVE-2023-4151,0,1,d1ce01bb4f25f5f2855fe350f38c2808e36f55f2ad09017b6777fcb497165a99,2025-03-06T16:15:44.243000 CVE-2023-4152,0,0,80f83c53fa8ba0d2d947715fa4f40354139cafe3d0bd129ef193f1a40f4e16ad,2024-11-21T08:34:29.573000 CVE-2023-4153,0,0,8a5d6c42cba6526b7c8430f1798da45dace4994dc5f29622c78d5d3374df9fd7,2024-11-21T08:34:29.707000 CVE-2023-41537,0,0,813b26f0a3e3bef990940e4d9e606bc5cc0e0c25abd1bfc7bdf7496a2c6d33cd,2024-11-21T08:21:15.730000 @@ -233463,7 +233463,7 @@ CVE-2023-41923,0,0,6672794e5b086207eaf32ac240d40692a0102f7605db3c52d67f753345487 CVE-2023-41926,0,0,a2e5c0fb14e8850260ec917f93bf6e5b87afca0838bcf3d87b397d60dc731335,2024-11-21T08:21:56.017000 CVE-2023-41927,0,0,e3f34ee931cc1f0f2ef348f96477db51082d1bff326b084042922b7c19afc3e3,2024-11-21T08:21:56.140000 CVE-2023-41928,0,0,4ab999ee652bc20bf103a242dd3775a43abbbf7a8a62dee6498ed9a6c272fbc0,2024-11-21T08:21:56.267000 -CVE-2023-41929,0,0,69ffc530a72d20c4e97cb01b699697d1dbb23127025cea628abd2b147a097b39,2024-11-21T08:21:56.380000 +CVE-2023-41929,0,1,b97a9d919c638369d466a5b8e924652847cdf4716bc8196e16a745fa52d8eeef,2025-03-06T16:15:42.883000 CVE-2023-4193,0,0,7f2229873156e67d499162dd0a4e3d2ad5a942d8cef3eaa8b94fa0b2a6ef0210,2024-11-21T08:34:35.543000 CVE-2023-41930,0,0,f4c20118c7278e3cd28c6daa90fc4cd8f16f19a26fa6477337a81bf1b5106c90,2024-11-21T08:21:56.547000 CVE-2023-41931,0,0,1a2fca091d3fe986c5ad3ecb1818a2fd61a0c76792713bc99e7f634eb5333a0a,2024-11-21T08:21:56.680000 @@ -233492,7 +233492,7 @@ CVE-2023-41951,0,0,98e70f2472c272eab38b34ff997e9178d05c1c4057e095403658a377d31ee CVE-2023-41952,0,0,28dc140abbdafd809d8605f6c0e6d9c06ca12a6fabb3fdbb96324006875f8e5a,2024-12-13T15:15:26.233000 CVE-2023-41953,0,0,bc4865e668ac127b8f36fcd8e693fc25399960e08a5b85379c7fad016bbbdde4,2024-12-09T14:15:08.710000 CVE-2023-41954,0,0,d8c277806dfc384ce4e926004798dd8109e8f7c434571cd96d044ee59f5e1440,2024-11-21T08:21:59.187000 -CVE-2023-41955,0,0,c69d1f7282295e4d9587762a09cf7696d4c2a34c391bcd7a4913a67b8a61ea5f,2024-11-21T08:21:59.300000 +CVE-2023-41955,0,1,7872a953650b23f290bfc9b369a025bffb2fc00b36397ce4af4bc717dbc32fdb,2025-03-06T14:25:09.843000 CVE-2023-41956,0,0,3282aedd80768b55256122ab701e734c381a5dbdfa9d40baad17e088167db9aa,2024-11-21T08:21:59.407000 CVE-2023-41957,0,0,a29f516d99af407c126a5e7ad417d81ce357dcbef8ae20e5c515d3719d1d6e20,2024-11-21T08:21:59.523000 CVE-2023-4196,0,0,ef9c1646e137c44dab7abcf516cdc093158d8d226c4a6c8193984fb89aad5817,2024-11-21T08:34:36.033000 @@ -233894,9 +233894,9 @@ CVE-2023-42537,0,0,f8c46a51e356e557a2055cbce5cdb7f64e93d05c6ba3b5b8f6282610c02f6 CVE-2023-42538,0,0,a965a3a2bd34db10e5d7a145939a6e3a815398113fe2d90ed39b1bd73c6a052a,2024-11-21T08:22:44.693000 CVE-2023-42539,0,0,90e9b64cc69c53cf02d59065f49db5c198bece6910c4677da9c65fc217a8f6e6,2024-11-21T08:22:44.823000 CVE-2023-4254,0,0,4fbd16f327db8ef3dddf3f9d997f02e67733f6be91aa3b6552b6d17a05a0d34a,2024-11-21T08:34:44.127000 -CVE-2023-42540,0,0,18054ff87006efe055a5c2cb9db4b39828a2be5a11ba767efcac1c1e19b2a44f,2024-11-21T08:22:44.950000 -CVE-2023-42541,0,0,414c08c861b4a85a8b4221f7f9f2a6ac67c6108ea03d10c5054c5e822e9469be,2024-11-21T08:22:45.060000 -CVE-2023-42542,0,0,61ceaec161c83299bcf711b8548cddda41633a1e6c722a8a8277d8df81996307,2024-11-21T08:22:45.167000 +CVE-2023-42540,0,1,157c1465ad1a11dae33490426110bf3cd340f247258da486cea37205c2bee11c,2025-03-06T16:15:43.070000 +CVE-2023-42541,0,1,a27409519278bbf3b68828e1c3bed0970f8ade9f5c8e68115fdf46911f82456c,2025-03-06T16:15:43.210000 +CVE-2023-42542,0,1,a5532dc0a3a9723a3783c97e275bc878a8a24848d4866110e72fd553c34bb365,2025-03-06T16:15:43.343000 CVE-2023-42543,0,0,a53769c714af0214b1487178b63dcda6e2559f73aa5f625cf02f63a296981d11,2024-11-21T08:22:45.267000 CVE-2023-42544,0,0,76d857404ab8d34c9c09c13101ac377541ffb21a614ee5b54f86c965cba96956,2024-11-21T08:22:45.380000 CVE-2023-42545,0,0,b98421ed2e2e8c61ae4123b1a712c26b1feda452fa409c55a5d046fbb9566d2f,2024-11-21T08:22:45.483000 @@ -233908,8 +233908,8 @@ CVE-2023-4255,0,0,c5b2e40c012cf803cabd84b7778f7dd86ad2fee973518a2094733a22bac3f5 CVE-2023-42550,0,0,f5909b83c66a428df0847de6b9bb4c422f631e9a69ee69bf5794daebceb8471a,2024-11-21T08:22:46.050000 CVE-2023-42551,0,0,3dea46979b28b7f805199c941a7d4b05feb3ca71fbbdef1080eedad13cb820e8,2024-11-21T08:22:46.167000 CVE-2023-42552,0,0,9a4aa8166c46c6ad621f0cd3d3e4be2041a6f974ec08b5f5e1c2d02d5a5abd71,2024-11-21T08:22:46.290000 -CVE-2023-42553,0,0,b988e2773625fad1b25931b5f891e94f9abd02cad2f3823a551b128b7a9ebbe5,2024-11-21T08:22:46.417000 -CVE-2023-42554,0,0,b3208be93913198101e2c4730902a053cc2b3984587e25788e50609ce88b89ca,2024-11-21T08:22:46.537000 +CVE-2023-42553,0,1,c5c90c4219ae9f38b33685ebe6bb6227f80bf9646bdd065d1b8cdd1df783cc35,2025-03-06T16:15:43.477000 +CVE-2023-42554,0,1,30761b3bea242bf46791f615e604bc7fea4c361be44f0d58db7ce7d07a498d9c,2025-03-06T16:15:43.610000 CVE-2023-42555,0,0,d538383024e32be4906c7b35e1115de1a92bf5c6334c56309ebfaab223f9acc9,2024-11-21T08:22:46.673000 CVE-2023-42556,0,0,a8f236b67850056434f98fb83faaf8916d0dca59e2e05c589baf9a06b35c4c7f,2024-11-21T08:22:46.823000 CVE-2023-42557,0,0,d84c5a894c1e0aa60b57cba3ff441d683b8d527d9e9d9815b82a377730b1eb2b,2024-11-21T08:22:46.960000 @@ -234159,7 +234159,7 @@ CVE-2023-42835,0,0,9956dc456ba41773404d8f44ad7b269b3f7a358f4e5a280c805b86e2ebbfd CVE-2023-42836,0,0,41392f6b460b4e057e3bcec26a92d2622dbe2bbf4f90e1b65389263aa691c08d,2024-12-06T13:56:19.023000 CVE-2023-42838,0,0,5f38c10fa599c8161f30883b8dcf218bf82058392e8253a87f2a3eddeca9c76d,2024-12-06T13:51:35.313000 CVE-2023-42839,0,0,39ea04a2699b0f7e4c5dcb0cdb48039dc64ac9c18539c7db4f5ded80049365b0,2024-12-06T13:49:37.623000 -CVE-2023-4284,0,0,c4ab50dadca066929775b8387ee656a654281631de5770b1cae455ea4ba50fa9,2024-11-21T08:34:47.370000 +CVE-2023-4284,0,1,15176d46fdb145d510668ccfb2d9ac22595d3aca1f56214b3c6d1631b9dcc24b,2025-03-06T16:15:44.440000 CVE-2023-42840,0,0,f1f04b9061bdce447f5753f3876abfe458e8bb3d9b95843639858d111f70f4da,2024-12-06T13:28:41.990000 CVE-2023-42841,0,0,65b7e1ad315406896de3c94e87d786f7cf003f4d9bd5ce0d8e6ab6a5e0c24dc0,2024-11-21T08:23:20.427000 CVE-2023-42842,0,0,c8bff024b90962ecc0632c5f07ce14f349a9e38fec2708ad4ebbc5895167d3fd,2024-11-21T08:23:20.637000 @@ -235479,7 +235479,7 @@ CVE-2023-44997,0,0,efbd2633cf4347525166f108807458b201a5cfcefdac55279eb2d650a026e CVE-2023-44998,0,0,50baa0ccce55be5da3f2afc62b780f6cf72c18ddd9a484e733a4e2b5811c8601,2024-11-21T08:26:12.340000 CVE-2023-44999,0,0,444952b9efd04a83fadbe72fa090e1791590098ccae3a889bb1d8154d7d29fa4,2024-11-21T08:26:12.467000 CVE-2023-4500,0,0,e4e876677a323f721a42330b69404f9a5cdfbe31eb40b4ecc2dba9c49b3187ea,2024-11-21T08:35:17.893000 -CVE-2023-45000,0,0,7a09e7624ca8028ff80f7c032e535fc64ad47c04054da47f50e27aee9fe404ee,2024-11-21T08:26:12.577000 +CVE-2023-45000,0,1,1a50b84c316432a912c8ad314433163a1b43fd68afe89719d2cb955ced2944c6,2025-03-06T15:00:11.560000 CVE-2023-45001,0,0,98537898ba3424c877ebf2faa54c0135532a4d94495084e2ad604b6c259509d9,2024-11-21T08:26:12.707000 CVE-2023-45002,0,0,5320798fbd2b6cf53aa78078c115da061d7e65424387effda8ebfea1926eea6b,2025-01-02T12:15:08.213000 CVE-2023-45003,0,0,54c4416fd646a73fb4862704ea1b8aa5b14ca76f6e6a2edddd3ef1a10193f8ae,2024-11-21T08:26:12.900000 @@ -235717,7 +235717,7 @@ CVE-2023-45269,0,0,df30a628c2355b826a0763802258a5717003353b30d77a1d50a39de3f073d CVE-2023-4527,0,0,943afa930acf035675be7abef1ad8853061357478138f6af4a913f2370031464,2024-11-21T08:35:21.017000 CVE-2023-45270,0,0,69d74393fbe2c6d6f764fac8b38d4261442e7ff349a1e5cd07739334d44fa0ca,2024-11-21T08:26:39.900000 CVE-2023-45271,0,0,d75e51b6dd57dcfcce9b03d22ae28c695e096579f540b51970cf4627f049d40f,2025-01-02T12:15:09.087000 -CVE-2023-45272,0,0,c2558a0944fb73b242e92986fa7e6d74854cdb8403fa186866d6684bd50fe59f,2025-01-02T15:15:19.400000 +CVE-2023-45272,0,1,bf0988ac9b16569bb134920602736441ec15ed9293fd8a85e018bcc00d15731a,2025-03-06T16:24:25.053000 CVE-2023-45273,0,0,880597879d86c39cfc7345a16e74549f291701eac300d25ab5053f72e06e8841,2024-11-21T08:26:40.033000 CVE-2023-45274,0,0,eaccf5088e491ebf40d3565e1cee1a9b753d3967d51ec070419a6f3208b48de9,2024-11-21T08:26:40.177000 CVE-2023-45275,0,0,2901fe4dcd54f92c3f3b84fd16fab2304413d9a095e3291db7ddfa2e35398ca3,2025-01-02T12:15:09.253000 @@ -237223,7 +237223,7 @@ CVE-2023-47229,0,0,3adb994ca6cdcad8eb83b9151b12f156582ee2417351a650229d82f3cb1c5 CVE-2023-4723,0,0,3cad2c4753548cfe0589bb544126de571736ddc4cf1fc44a5e937c6334c989ec,2024-11-21T08:35:49.953000 CVE-2023-47230,0,0,88ff3f363a211b06fe1348d1b61025c40e9925d4d36e5b0fd08ba9cea9a8537c,2024-11-21T08:29:59.890000 CVE-2023-47231,0,0,3520b005dea272031d64804dadf228fdb08af13f48073a2be1c26500bff4965c,2024-11-21T08:30:00.010000 -CVE-2023-47233,0,0,0bbe621f1cff11c2d12a4893b587d36ed6f19c9734305291b3ac67c91e302dd2,2024-11-21T08:30:00.123000 +CVE-2023-47233,0,1,a9a2684cd0785f1a7b9e1e6c8995687395ba6848a967631d2a10efb06008c9f6,2025-03-06T16:15:43.747000 CVE-2023-47234,0,0,11c566f8efd0ad86ac1a32709c15f8ffa1109cc696e21d28fc76ac2a831dad15,2024-11-21T08:30:00.290000 CVE-2023-47235,0,0,421ae36ce22132f02c01ccfd324bb89699c78531f40346aa7a58f1139495c804,2024-11-21T08:30:00.550000 CVE-2023-47236,0,0,2b482540ccea2af6d5776c7a4953d4ea2e9b74d73913ad9d07d970f5783c72d6,2024-11-21T08:30:00.773000 @@ -237637,7 +237637,7 @@ CVE-2023-47803,0,0,c49de6e54ad79301c655a131558ab3ecfd613b8f091c559078a77637e6507 CVE-2023-47804,0,0,6205142f7b14e239ef92fef2b1ac44f9d1e9b48dff0ed3b2e07500fdcf8f815a,2025-02-13T18:15:39.070000 CVE-2023-47805,0,0,a0525de6234d3b1e9bdc7e814d4514ded58e7b5fbeedb2b4ce90abaa3b961354,2024-12-09T13:15:30.923000 CVE-2023-47806,0,0,b0cdbd3a00354474ea134767ba68204fac150af82620653bb81d9b5e16a93e04,2024-11-21T08:30:50.427000 -CVE-2023-47807,0,0,173b73657735d0949f338e3428f0dbfd2e0a8707928eec5ae8ac520c74d10c10,2025-01-02T15:15:20.607000 +CVE-2023-47807,0,1,a89a754294e6a18768abc4ebafd8889155ccb0ad11bb4d71b15464a69f9d6967,2025-03-06T16:24:25.053000 CVE-2023-47808,0,0,327617dcfd8384900f916ba988789bf4115df1547b61d304fce6a00025e1fde7,2024-11-21T08:30:50.547000 CVE-2023-47809,0,0,59a8f7100bfafe9b654572824ff69d52b6615f04c537336d08143834e2f8bb5d,2024-11-21T08:30:50.663000 CVE-2023-4781,0,0,1dda192eed24f229ea670ca6261d785c282a6441d361d6249e497921f5e00664,2024-11-21T08:35:58.263000 @@ -237726,7 +237726,7 @@ CVE-2023-47994,0,0,2407410d7ded4d367a026e01fddb621dfd45ee7da03ef596706b72aa354b0 CVE-2023-47995,0,0,41535b8005f55226bfe09c7387ca5fca2008636be7e90857db9ae84df1ea6ae9,2024-11-21T08:30:58.580000 CVE-2023-47996,0,0,cbac3b53939e4af700bbf3e8343625bc5dbfa35beae326b063e92331617e7883,2024-11-21T08:30:58.743000 CVE-2023-47997,0,0,12c5b586b678f710d3488c6ea0bce408a7fe54f1116b3c5b1079fafd971845e4,2024-11-21T08:30:58.883000 -CVE-2023-4800,0,0,401278beedadcdd4fa5081887eb268f7ffef99a4f3aec258870a6c584fe762f2,2024-11-21T08:35:59.570000 +CVE-2023-4800,0,1,9219a8d689175c8d23a477f020fd49ec8ed19f426bdc6d7efdfde3cebd54d0c9,2025-03-06T16:15:44.567000 CVE-2023-48003,0,0,39e2d8087ac8da7a3c050c642a95f0b99731fa2299f4641ccbdf29b34156ea6a,2024-11-21T08:30:59.023000 CVE-2023-4801,0,0,1612b8ad8a100bd0095834f8cf820b43c1529313117b5922e35f752cf57742d4,2024-11-21T08:35:59.690000 CVE-2023-48010,0,0,e1fe89213ce90a7900e1f6a7994354bf24a589b18d4933ffb40f5731aa4ca2d7,2024-12-11T17:15:13.820000 @@ -240160,7 +240160,7 @@ CVE-2023-51426,0,0,f605e0808f885d471a26c00eccdef9ad580294aad4cf8fef2ddd9f572d5d6 CVE-2023-51427,0,0,1c606009f2dbdb86c1ee3b033970433db07185dc9e5e3e8db3161f3d9e798679,2024-11-21T08:38:05.667000 CVE-2023-51428,0,0,198f747e1368516dcbd419fd1745392ba334ed61d2ca5da116a3d4cfd4df8d80,2024-11-21T08:38:05.783000 CVE-2023-51429,0,0,31f34cc9ea0aec6d96c2e301a373bd9df9cb337bb791cd73e2935dfe221d972b,2024-11-21T08:38:05.910000 -CVE-2023-5143,0,0,50aab65f14b050bc14520192a2320de7028f20643247e93e10ebdfc9a44c4e4e,2024-11-21T08:41:08.990000 +CVE-2023-5143,0,1,2d491a0f3c8a3cfb2336905a4b899d2e815bc61381c705f4a6a0519413961544,2025-03-06T16:15:45.333000 CVE-2023-51430,0,0,ec8c74d8cbd5c3f9f706b4bab06cf91cfc1c914e7ee0316ee3d90739abc7c00a,2024-11-21T08:38:06.050000 CVE-2023-51431,0,0,25c27e7af7aed5b83e003bcbe13a98f21c332e93ee76fb6d167b264854c2e05d,2024-11-21T08:38:06.160000 CVE-2023-51432,0,0,29febc5eadbecf1ddfecf6cf2a0433c2b3c244ef25eeda84ad87c55157b659d5,2024-11-21T08:38:06.277000 @@ -241235,7 +241235,7 @@ CVE-2023-52686,0,0,78f996d2013a9096341f0d1c834ac1c73fb05606dc6f557d6437920121b61 CVE-2023-52687,0,0,bbc8fc1dedb818bce118b2c7db04aab7b8059594413eb22394ab804738b96713,2024-11-21T08:40:21.700000 CVE-2023-52688,0,0,9dc230fe3db4a9be36210348538add296ace0ab48c31cd4e90194d9bd1a909f0,2024-11-21T08:40:21.923000 CVE-2023-52689,0,0,790089ccb5dbca94271b582a4ae66681f2a34b377a106c082c546248aa1dbe89,2024-11-21T08:40:22.033000 -CVE-2023-5269,0,0,2f2a4efe621a5675b9a63aa96c02a20209837ca62c7a17342476c5eb89d9d193,2024-12-23T15:18:44.853000 +CVE-2023-5269,0,1,62ef4056afab45d0c95a031eeec681aea89f1a71d3adae5c7cfd3da3f7ee0ed9,2025-03-06T15:15:14.830000 CVE-2023-52690,0,0,aa56fec2ae1f31c32ae4d61e5f7c9e40549ac31b2bf239b1391ddac0420ac0a3,2024-11-21T08:40:22.153000 CVE-2023-52691,0,0,a64baa25fadffa1557a15dc817d7f8c834b516c14cdd512d500df9f6752c0946,2025-01-10T17:59:11.383000 CVE-2023-52692,0,0,35e83f69530051d0eafe3b62cf812c667004e80a63c768d5530a91d5f9405ce5,2024-11-21T08:40:22.410000 @@ -244881,7 +244881,7 @@ CVE-2024-1069,0,0,e0471f0c714f902c31bc433a8b0d70841b0e8ce0fe684171f01f3f7a66ed02 CVE-2024-10690,0,0,921c261c24c74d1d2b944c306e80e222d1c824694456e626aa271c43cca537d1,2024-12-14T06:15:19.057000 CVE-2024-10691,0,0,db2c0688a52bf60c2a1055a856c5f32b6875efacbb339285fcf0094be8a5d17a,2024-11-15T15:15:05.943000 CVE-2024-10692,0,0,5e1146f423cde68a63e7a22493125c7688543e1095f09d080a759f6046e2d5a3,2024-12-06T09:15:05.190000 -CVE-2024-10693,0,0,05b06d72893b9e51863e18abef44d1abb0966aa02409860216a6d0d41fe433e0,2024-11-12T13:56:24.513000 +CVE-2024-10693,0,1,9c0cf23dec8f5ac933a6156670a623f4dfbdaac0e5e551f7e1c1b7dc926b2e56,2025-03-06T14:25:09.843000 CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000 CVE-2024-10695,0,0,35cef9e33246637d49e253b33fc95d5b5806d427aec3c4244d5b26dc1b28de11,2024-11-14T19:44:16.020000 CVE-2024-10696,0,0,2720d210d1520d7ccb05bf778730d93163c6d42c81c74f25ce11c5d9757ea63d,2025-02-05T14:55:34.007000 @@ -245031,7 +245031,7 @@ CVE-2024-10856,0,0,7e9eb9b0320a824a6f22312f21c483e6a20231d2b64419ecd83ac1284ebe6 CVE-2024-10857,0,0,957ae8afb2b021b5a39096260dcb79ccdc7e257258c659d883b9a23a31df5c0b,2024-11-26T07:15:05.003000 CVE-2024-10858,0,0,42b123ba3b0529f7fcd2fe96eb2bcf8b1478b777f663ea90f1bede156318a16a,2024-12-26T20:15:20.080000 CVE-2024-1086,0,0,ed3b4cc9e937086bf7bd2a6eab945784d7bd20c1d6f9c68b6b3e2f0cc3cb68b3,2025-02-13T18:16:21.507000 -CVE-2024-10860,0,0,7c3c00f3072a2c47fdca547d3cc1a0275081d893f39926917a8c68219e57d0f9,2025-02-28T10:15:09.963000 +CVE-2024-10860,0,1,47867645c49a8cde2f92505e8e41e41148c27753d4c7d1b26dda95cd56506975,2025-03-06T15:00:16.447000 CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f88110b,2024-11-18T17:11:17.393000 CVE-2024-10862,0,0,8d0469751c4a45e9a11849af14ded70548f7b3b67c046bcdbd1a895c0f05bb5b,2025-01-17T14:53:51.413000 CVE-2024-10863,0,0,fa750afffd0b392605cdbed30d48a9a358d17d11b122f96d8a7cdff9526b9044,2024-11-22T16:15:21.257000 @@ -246230,7 +246230,8 @@ CVE-2024-12138,0,0,da6ee7fbee0e9075f414529b46a16ebad54f1168ad899da7c1771d5519a5d CVE-2024-1214,0,0,de1b224b633b4f15934a6c113718a0fee219da295a9b4587f21a72c198d9d833,2025-01-29T16:26:04.440000 CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 CVE-2024-12142,0,0,082b26a389086f6acfe4cbd0f3b415209a939b071b952054449ce1192c408bcb,2025-01-17T11:15:08.683000 -CVE-2024-12144,1,1,cec64ed5df893b36c716ccaa9732f43fe24735c95c202fe96f3362a66870aae7,2025-03-06T14:15:35.297000 +CVE-2024-12144,0,0,cec64ed5df893b36c716ccaa9732f43fe24735c95c202fe96f3362a66870aae7,2025-03-06T14:15:35.297000 +CVE-2024-12146,1,1,512abd5fc04925787d0e14e872b64baa6991ccbf60d90df7c70ff4e2902133ac,2025-03-06T15:15:15.137000 CVE-2024-12147,0,0,c562efe56e0c0cece525db9ad15e5bc08bd9593dfc976acd1410d7219e1d4e99,2025-01-14T14:15:28.163000 CVE-2024-12148,0,0,2d82ecdcd1ae8b06b2bbc4387f4ec8d5588d3a1672ec54422fedc0a9fcb34bf5,2024-12-05T19:15:07.473000 CVE-2024-12149,0,0,6cea541fb8390eb73924fcce3986b6c54a0134049e02ebc343dd9227319eb6b2,2024-12-05T19:15:07.627000 @@ -247756,7 +247757,7 @@ CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-13866,0,0,7b6522806f9fda20a87affc69ae1455066ad3672ed7237b6480428aa11037ef9,2025-03-05T09:15:09.587000 CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000 -CVE-2024-13868,0,0,01282352025192d89cb78e275647952c2fc34343530e7fd3626f707fafb8b5b5,2025-03-06T06:15:34.720000 +CVE-2024-13868,0,1,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000 CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 CVE-2024-13873,0,0,ef7d81633c3243b5a662796d38d39a610ff44d855cd436a1a77aa5716496d20c,2025-02-22T04:15:09.567000 @@ -247765,9 +247766,9 @@ CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e CVE-2024-13883,0,0,1e82cdf8d40eea1cf0fdba117374eff50482e8082835729e73b8298b4bf2a5eb,2025-02-25T03:39:21.267000 CVE-2024-13888,0,0,45ea465fd1196bf38b8c341b411c16c5302500649feb2c402e910f2e8aae7f79,2025-02-25T20:39:44.927000 CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000 -CVE-2024-13892,1,1,ba0368883c2ac157aa0b89e8621108c536bde0ab709b9f9a40478f1765f6e3de,2025-03-06T14:15:35.453000 -CVE-2024-13893,1,1,6f74c79e0ddcf27b881db98cdd572d3b259cd7cc0ec9c224906e3f24eca39b98,2025-03-06T14:15:35.630000 -CVE-2024-13894,1,1,c08825403e20d9b7d3a5a72ea2c2234dcb1ca09965a1b602a57d161ad708794d,2025-03-06T14:15:35.777000 +CVE-2024-13892,0,0,ba0368883c2ac157aa0b89e8621108c536bde0ab709b9f9a40478f1765f6e3de,2025-03-06T14:15:35.453000 +CVE-2024-13893,0,0,6f74c79e0ddcf27b881db98cdd572d3b259cd7cc0ec9c224906e3f24eca39b98,2025-03-06T14:15:35.630000 +CVE-2024-13894,0,0,c08825403e20d9b7d3a5a72ea2c2234dcb1ca09965a1b602a57d161ad708794d,2025-03-06T14:15:35.777000 CVE-2024-13897,0,0,07f598b96e670ba19e3823cc39b2ae054e4338a7f34c42c2715bbbd41cb120b3,2025-03-06T09:15:25.787000 CVE-2024-13899,0,0,372540a329e3dd48ea203e26ad119a2f49b08582c995a840b88c85b67384dc50,2025-02-22T04:15:09.720000 CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000 @@ -247865,7 +247866,7 @@ CVE-2024-1475,0,0,2943f7a10ccc21b695d339dbb5cd2fa720adddf26c7b6ffd0baab0bd23bdb9 CVE-2024-1476,0,0,e178d9cfb726d4cf00b181cfb25ba5280836c613196cee5eacdfc79e432c1bee,2024-11-21T08:50:39.913000 CVE-2024-1477,0,0,74348eadb6214ad07d05d1e235932a474c51a995984a56d966fc8b6d5d3bb97c,2024-11-21T08:50:40.047000 CVE-2024-1478,0,0,9b2c9ccb149f278f720fe97b0937c0a2f45e9dd8ea2423171dbb0d6662d41386,2025-01-08T17:07:21.747000 -CVE-2024-1479,0,0,96512a4edba5e46558aee17d0747cf99f31ee7671cb0d6ee0ddf8f04e974e16b,2024-11-21T08:50:40.303000 +CVE-2024-1479,0,1,c7283f34b845ac740b46bb86e6e9152daa93daf0e50e0fc93e6ca6218c144124,2025-03-06T14:24:40.890000 CVE-2024-1480,0,0,03d3f4ccf7da39137b14bb7df631d0ca8dfa9b9937250b5474f8035d12beb0fd,2024-11-21T08:50:40.430000 CVE-2024-1481,0,0,7fd58e745dc38e4d7e47d117d56c6f445eed7fa5191f3735a2692d3de2dee70a,2024-11-21T08:50:40.563000 CVE-2024-1482,0,0,60272768c52b423065e24b6229c88409ec8bdcb6bc81af7dfbe638244c7c7d48,2025-01-23T19:53:54.957000 @@ -248214,7 +248215,7 @@ CVE-2024-1851,0,0,d990844085aa7fa399508e38913b4a91b00ad7673d1acf254c137c16d32111 CVE-2024-1852,0,0,b9d683f5957eff25406d3f28768343d0f941f69d129acd817b869c293ba088f0,2024-11-21T08:51:27.510000 CVE-2024-1853,0,0,6a68689fcd79fefcde169f14e1209eaf1cec9e306cb6544a77f67f77747e937e,2024-11-21T08:51:27.640000 CVE-2024-1854,0,0,2e36222f21a81e0f7467ee7199d8dd61bd94227662e032a1167e453ae3bd3eb4,2025-01-22T20:04:10.890000 -CVE-2024-1855,0,0,5da118eea0cc13494480a1e1ca01f87ce624311ad317555a282db08ea9acd47d,2024-11-21T08:51:27.897000 +CVE-2024-1855,0,1,16975806cf573393036f77db9914a8bfb65532348dd0ad181a80bcf675440e00,2025-03-06T14:25:09.843000 CVE-2024-1856,0,0,e7e84d2ffc2542d366b810418f9a74b608acbb369f4f1196ae3112dfdd4ef3fc,2025-01-16T18:06:29.870000 CVE-2024-1857,0,0,c5708d7f5b9aa52c50a089d9d955a2ad47405cd7286310e3cff153bb8ed9df7a,2024-11-21T08:51:28.163000 CVE-2024-1858,0,0,37ac7b6ae641e6c33c9b784bc122314ccc3244d9e54ac1ed1c1eb9ce9272259b,2024-11-21T08:51:28.283000 @@ -249331,7 +249332,7 @@ CVE-2024-21116,0,0,37f57d56f4a480d238dbb22920cc5d24d95c2d6d67c36c3cddb7272c00327 CVE-2024-21117,0,0,5d43a21324183b9d6abac7bf386e13c102239eb07d87d78b640f0340e813f8d2,2024-11-21T19:15:07.527000 CVE-2024-21118,0,0,ee956c65c0f596bf879ae157a9080e555d70b2a93ec18374492190d05f6c6d59,2025-02-10T23:15:12.130000 CVE-2024-21119,0,0,8adc7d67731590ceb3d3f5e8f1f4a1bfe581882c771a4b0d6d46bb1dee9f759b,2024-12-06T20:26:42.563000 -CVE-2024-2112,0,0,73ab2e67116de1ae8fd71aa2007bd5187fe4c0758cbd45fdb553925f7db731b1,2024-11-21T09:09:03.413000 +CVE-2024-2112,0,1,19961ee37e07c6ff50d26af0d7e2149d93883e667bfbf269e3aa40af42147ae0,2025-03-06T15:00:11.560000 CVE-2024-21120,0,0,9a17f31ae00741afbe78fe1de8126b80393b2d436777540d9a68aa70b8ecf420,2024-11-21T08:53:49.407000 CVE-2024-21121,0,0,99f79218ae521d437536ca7e6a1fedd9a94c9b20081d485c127c95ae087afb7a,2024-12-05T15:16:24.950000 CVE-2024-21122,0,0,3c119f53f951a34b6f285ab076d3d99b946734b11d0251f0d44ac51ca3fced6e,2024-11-21T20:15:39.223000 @@ -250635,7 +250636,7 @@ CVE-2024-22568,0,0,3880556bf46833b64579e87b398833833f840f929944234dc82abb9760bd1 CVE-2024-22569,0,0,42fd9ca9ed87e62cc25c4850ea2254cb9fad0d6e7965206698b71242faea3c84,2024-11-21T08:56:27.863000 CVE-2024-2257,0,0,6326751678e552f2a5b329ffd28dd832a7b3b3968f1851a84cee129e01bef6d8,2024-11-21T09:09:21.760000 CVE-2024-22570,0,0,65580444980a65a34d69901ad8e01d49f9d506ba9bc8d07492ebc248698a38bb,2024-11-21T08:56:28.010000 -CVE-2024-2258,0,0,740e4aca96e6cd129a84a5327f2c798c46f15a9271c255fa63c692f12e8fd980,2024-11-21T09:09:21.960000 +CVE-2024-2258,0,1,16bd9b0d3a00e70b4b0ffe59409b9e43749f7fde6377ea06d3cf811470febc94,2025-03-06T15:00:11.560000 CVE-2024-22588,0,0,8e2502298f7c6b135485bc5396597a78ea89ffb55c12fc0b95b7b4561f1ece72,2024-11-21T08:56:28.157000 CVE-2024-2259,0,0,a3104431d195b990188b0eaf6770bbdd7744abb2cc67108311ab43825c1510de,2024-08-13T12:58:25.437000 CVE-2024-22590,0,0,c61f02103dabd4fe4ee1e4744aa85defca93b5aa3ffb20a4fea1a1e022feb844,2024-11-21T08:56:28.390000 @@ -250719,7 +250720,7 @@ CVE-2024-2278,0,0,afc218644888ddfdbfc0ee64d2dbcff5719c87ddda676fd55b5f4ebef946ea CVE-2024-22780,0,0,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000 CVE-2024-2279,0,0,15594de242362166ba4fcc677c674c35e566adb6da76d65bb4bb570b8c49add8,2024-12-11T19:29:27.377000 CVE-2024-22795,0,0,4b871fe15d673131e56820fa86db7a52e60ec35118fbfcd9a32eee5736e087d9,2024-11-21T08:56:39.250000 -CVE-2024-2280,0,0,ee01e33ad8c8e15890c2537e3a2ce31e47602f1cab0dfcd5928f922e440ae8d7,2024-11-21T09:09:25.187000 +CVE-2024-2280,0,1,4e060a74cbfe021b52f00d80dfa39c9de5de805ab2c9872e00f673c28121d73c,2025-03-06T14:25:09.843000 CVE-2024-22807,0,0,c63e56e80af4c58ae1f7129e86f946e6c72bfda64cfef4929c6ab6ca5fc4096d,2024-11-21T08:56:39.420000 CVE-2024-22808,0,0,b7e1e2d1bde9d89678abdad137c019036d81abaecf559d82e47aac2d5b04907e,2024-11-21T08:56:39.650000 CVE-2024-22809,0,0,e9fe8aef5ac1ba3cd4b969001e1df2ac70f8505d2e7540807c33653fbefe6671,2024-11-21T08:56:39.870000 @@ -250756,7 +250757,7 @@ CVE-2024-22876,0,0,7b64300d77b839c22e56dafc52a8b282c24d807d3e1138deb97774c53ad9e CVE-2024-22877,0,0,869857cd8b9a44e1d528c28503ad46b7c531212f5054c9f21fd2618927c6b492,2024-11-21T08:56:44.530000 CVE-2024-2288,0,0,f6ed54bcc2b3e715f6f7f1bc8122a65aceb675402a6406a77355fa6ec0523110,2024-11-21T09:09:26.250000 CVE-2024-22889,0,0,bc789a72f7d1e24bd814b0b6d2146517cc600e2afe43b498499dda222266b149,2025-01-21T16:53:16.990000 -CVE-2024-2289,0,0,c71f5983c0bf547b398fb0b8361fe27eab982800f5400910fe00d1b501e3e2f2,2024-11-21T09:09:26.393000 +CVE-2024-2289,0,1,986a6fd61be75d14ea18f9e87b211c832246803f4eb69a4eb088900f9086560b,2025-03-06T14:24:40.890000 CVE-2024-22891,0,0,02e131b40d02e30836912251adc1ff415ae3aca9fca1513bfc674a89af8ec37f,2024-11-21T08:56:44.910000 CVE-2024-22892,0,0,990d8f4909c370b6d0d69c8d34e2016866ab32283005a7474e4b7542c3034992,2024-10-01T19:10:13.467000 CVE-2024-22893,0,0,6c6f29a342a1ebb2552ec87422c6d3285e1d93cf37e605a3f0dcdbe25ce58cf6,2024-09-26T14:35:12.920000 @@ -250794,7 +250795,7 @@ CVE-2024-2295,0,0,b1c9b0d97e63019f8386fb1489354d559a699343cfdffce8bb3f3ebff26916 CVE-2024-22955,0,0,368533f40a34e5fae1d8925340aae6f4475eac5e111ca232f404b1633e3b2a3a,2024-11-21T08:56:50.440000 CVE-2024-22956,0,0,8ed39a8e2276e993cad0ea022beb398339ae52c5152920a4fd13b8cd15a5203e,2024-11-21T08:56:50.600000 CVE-2024-22957,0,0,0b4733c79e5e1be4ed27841aeb5f878228f183de770bb18355158b67c6f754fc,2024-11-21T08:56:50.740000 -CVE-2024-2296,0,0,7af82b5fdb248455da7fb25ef4b62cb00c974c11b5588d47d205dc09c17ee318,2024-11-21T09:09:27.147000 +CVE-2024-2296,0,1,357fc0bce2f54fba9d19eca9fcc8280b06af864193e5facf8300343284b70c1f,2025-03-06T15:00:11.560000 CVE-2024-2297,0,0,2c0ce9dc60f722995ab777c3ae885e64f9470bafeeb11ccc3bdfc66dab79a2f5,2025-02-27T06:15:21.477000 CVE-2024-2298,0,0,a85fa7730d2df572068f0e46cf7b1543a1326e3663c97e6671307d8012f9d6f8,2025-01-15T17:47:00.477000 CVE-2024-22983,0,0,9c2fcbd2cfc36625422e4d63e9b3ecc1d9162ca561feb4a7596e502793ecaf86,2024-11-21T08:56:50.910000 @@ -252701,7 +252702,7 @@ CVE-2024-25594,0,0,d2ca0a5d79da05e44ac2d5acee621099738a48fa55851c803b78b71251be4 CVE-2024-25595,0,0,b4e17d09d0f1dc51f7c33882dcae6e7ef76ef7c8af61e8dfb146895abb475440,2024-11-21T09:01:02.643000 CVE-2024-25596,0,0,b21aaa4b4e1be4dae56ecbc8d75145dfe79b75e6d073c74203ebc0c5ec452b65,2025-01-23T19:35:38.047000 CVE-2024-25597,0,0,66c8d673ba87d9e43a0c47da9503b96d1236c99bf50bc7cb4cba42d46af76999,2025-01-23T19:36:04.150000 -CVE-2024-25598,0,0,d1a1805c77bf344303a6352c38a2d681b3301f1209882142cd84bf98bb95feda,2024-11-21T09:01:03.040000 +CVE-2024-25598,0,1,2d1c8383ccb797a0e5587f7db43c12ae86556d39ae61e9d0c96764cad5d89e85,2025-03-06T14:25:09.843000 CVE-2024-25599,0,0,1e405853502d37a32519454e3bbc96a90c793cbcb44778a175a4f144b956282a,2024-11-21T09:01:03.180000 CVE-2024-2560,0,0,43271ba3d968c1299b607dfd85a0caad1fabd1eefbce835e71c67cfc67678a7f,2025-01-22T17:51:20.490000 CVE-2024-25600,0,0,28903babf8e9ad9ce0e5926e98fade9a295a4e34c50bc53f7183dac7a35971aa,2024-11-21T09:01:03.307000 @@ -253049,7 +253050,7 @@ CVE-2024-26036,0,0,c89078d2640557d42002c59b6c23f030456f9cf19ccf42c7bd166a37f62ed CVE-2024-26037,0,0,ee3b187d755281195fea0d34713edfc54bd1e8caad64ffdf4172fb2e73159f5a,2024-11-21T09:01:48.790000 CVE-2024-26038,0,0,99f155613d21632a277dfd118476d120f86467a9f4a5cf62b544fefa8a620499,2024-12-03T14:38:32.390000 CVE-2024-26039,0,0,0758c554d26e899a855564f8b9668eba7e11a31c7d695417bcfe5e8499e97843,2024-11-21T09:01:49.037000 -CVE-2024-2604,0,0,9b96abd65fe71f9bc76911765a179f99be7d2671311a035c832b8d8f7ec1491f,2024-11-21T09:10:06.217000 +CVE-2024-2604,0,1,b1c3e4b38324762aea2226ef3be0b0e822b3eb38c22d18e89386b563f0b703c1,2025-03-06T15:00:11.560000 CVE-2024-26040,0,0,ee064050749987ff4e3490a03c514c88e4f33bf4ea6ceebd750b9b5d4a90fc6c,2024-12-03T14:37:58.917000 CVE-2024-26041,0,0,88991b2be8dfad92ffdc3159342033af65617a54b341f1ea4fba1cde1ba2b7e9,2024-12-03T14:35:05.120000 CVE-2024-26042,0,0,901d79a01b4e04fa43772a4abfbf6e0bb650c9e04e0f866ada0dc0dd8fdd36f0,2024-12-03T14:34:28.220000 @@ -255115,7 +255116,7 @@ CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13 CVE-2024-28595,0,0,66c34ce4bde45fe86231be9499209a487847155b52f1ce03ae9c3349832dd0c2,2024-11-21T09:06:41.353000 CVE-2024-2860,0,0,10251222dd61f264c5573f16801b3605bbe75235d60096fd89f14c7bdd2709e8,2025-02-06T17:54:45.057000 CVE-2024-2861,0,0,c2d3624bb2be1c2521a84faa67c026ea9a14975ce99e1b76831fa573f79b5912,2024-11-21T09:10:42.250000 -CVE-2024-28613,0,0,1e06981ecb1401862be92768d275fb03ab14ccde7887b574aa43591385c5bc3e,2024-11-21T09:06:41.640000 +CVE-2024-28613,0,1,3f853c659da2a93596d569898217fa25c98a37539ae890b9ea26498d83acebdc,2025-03-06T15:00:11.560000 CVE-2024-2862,0,0,14a1762a6c3e20bf3034d91b1b834706f11e22304545cc9e55cbfbe0c8b435d2,2024-11-21T09:10:42.370000 CVE-2024-28623,0,0,6b592373ccc058b15c8f7db49b78bfd3e2635e462da34d22a443dc2b487224fa,2024-11-21T09:06:41.870000 CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000 @@ -256504,7 +256505,7 @@ CVE-2024-3042,0,0,78f0a38bfd2800de1cd5fae87945aee2789e12c3fcbd56c3f22e61830541ad CVE-2024-30420,0,0,403a0bdc356df9601fc5ecf185347c2ed0664384c1bbee678bcce76af9aa6137,2024-11-21T09:11:53.143000 CVE-2024-30421,0,0,7afd28cf0a598ceb77ce8100ff766dd125654c211246f23a4b533003549add26,2024-11-21T09:11:53.343000 CVE-2024-30422,0,0,f01c0a64f32f26d00ebfc1ca76e0b1a2419fd37cf4fbbeb43bb30f715e41b580,2025-02-05T15:44:01.870000 -CVE-2024-30423,0,0,5b1517d395b5f8158dfe3dfb9c31f1c8a0fee969a59141fbef55b4ecb5784516,2024-11-21T09:11:53.597000 +CVE-2024-30423,0,1,662ed19a2d47aa7b82fc512cebc649a9dd37b18985d70a8829443c4d3dcb7ca7,2025-03-06T14:25:09.843000 CVE-2024-30424,0,0,48524e69984a1ed7696a166e148f60ba365f7f7962129b44ff4524ebe85c89bb,2024-11-25T15:07:22.740000 CVE-2024-30425,0,0,d68c222db45dd584e58dce13133847ff4ad6b955db2902ac4a600d2a9429d974,2025-01-31T19:59:44.457000 CVE-2024-30426,0,0,cca737ed45c2f700e4297a282f888b853848134669a65254ac719723adb2bbcf,2025-02-24T12:31:39.620000 @@ -256977,7 +256978,7 @@ CVE-2024-31112,0,0,aed218f78b70f929aad86903ded3145e19f68be2988aed875839fde993f99 CVE-2024-31113,0,0,ba8dd5f2ca619c3121faf694838496be14c42bed4611086e696847636856718c,2025-02-07T02:39:28.647000 CVE-2024-31114,0,0,2bf45ce22b11015c48079df508e179ff057dd898466026ce1d2757f792ffa86d,2024-11-21T09:12:53.057000 CVE-2024-31115,0,0,fd403ed32258bc28edd068a085a1ec4df5de371effb1dc7a7e6b74c9dbc51d65,2024-11-21T09:12:53.177000 -CVE-2024-31116,0,0,1352e29c88a5ff74d5c0dd536972f9006d5baedfaa2c41a2ab9a0506738a082e,2024-11-21T09:12:53.303000 +CVE-2024-31116,0,1,1dce1b73d37e0c0ede2eb0f1c3225917f444a19677d5fa11e7d5297f54dd02e3,2025-03-06T15:00:11.560000 CVE-2024-31117,0,0,20fcfdf5571a9b8e10db8556f08e3f52850f5209cc8498efcef92fa09f4d397e,2024-11-21T09:12:53.417000 CVE-2024-3112,0,0,873763eb9a3ffd38098d71a00f2d396f7e01bf16eaa06c0f4b3a9ffa918eff51,2024-11-21T09:28:55.560000 CVE-2024-31120,0,0,481bba7ab21f49f0b4d3fafa7a2609098f374707953692b2edcd4cacb88e64b9,2024-11-21T09:12:53.523000 @@ -257374,7 +257375,7 @@ CVE-2024-31507,0,0,7fbfd817660ab84cf5450aec1201bdeb4a240d71bce8efbbc3c0e4ce8dd7b CVE-2024-3151,0,0,3abd09f3cd2dde51fd5d70c85f62b41db0f3d9e525370488dec5a9bb4eabe907,2024-11-21T09:29:00.680000 CVE-2024-31510,0,0,81886f3ba02f8fa5d2b3f9541ab3b63f18369a591e7028ab4059f6604bc1ef58,2024-11-21T09:13:40.523000 CVE-2024-3152,0,0,232a7ab8a6c5151aba1982b503cbcc7bcb30e91652e2552e7d49e1b5852760ca,2024-11-21T09:29:00.820000 -CVE-2024-31525,0,0,6627e95037243d06d26b556f0d33b80df89ff9c79a57afbb72a049b67b7aa8a1,2025-03-05T19:15:37.340000 +CVE-2024-31525,0,1,759171032c1bc9cf47a855de87f39514aa78e818ddf68a675edb60a4d95a6e65,2025-03-06T15:15:15.607000 CVE-2024-3153,0,0,9a2bcb2f051678e95973008adc0d482a6778734c6609a6f1cd9e743db5bc63a2,2024-11-21T09:29:00.963000 CVE-2024-3154,0,0,d0e11e707bf549d7b831b8b7a6558cfd09c514bb54bbe90790f96ca21395d852,2024-11-21T09:29:01.100000 CVE-2024-31544,0,0,b0bccc451dcee5903b366441bb39b229e4ec0f92cdbfeddcea663568e3c62a9a,2024-11-21T09:13:40.747000 @@ -257807,15 +257808,15 @@ CVE-2024-3219,0,0,de3f9fd70dd3922206912d5b11848a3b5ec7b145621830b3178421a5ed707f CVE-2024-3220,0,0,732a955e3212f8f0fbbf2ff48ca938d8346e490659a1a4ed992439e5c452d39c,2025-02-14T19:15:13.770000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,82de9fd2512155ee1b039d671013d0c708a38fc533bf235bc5023a60a9960005,2024-11-21T09:14:35.290000 -CVE-2024-3221,0,0,37c469ccfcd488c2405edea3944c4cece27262f26ce3acd8ae4229b31da0296c,2024-11-21T09:29:10.600000 +CVE-2024-3221,0,1,d91fd0461f025fbd8c12f0fca3967b0d10ddfdcca8513eb164c6bde1411d5bbe,2025-03-06T15:00:11.560000 CVE-2024-32210,0,0,175315f9813fd6f2ac4a742dbd54281d7bee9ff41ab24185218217ee2af870be,2024-11-21T09:14:35.530000 CVE-2024-32211,0,0,7aeac149ce230244d2b917a1cbedf2ade22ef2010393663a9a7c7fa147fe421a,2024-11-21T09:14:35.807000 CVE-2024-32212,0,0,7cd205f7167ada2f68e262de4294c6c67108c8ee8cd5d0da8a582987800d41d7,2024-11-21T09:14:36.050000 CVE-2024-32213,0,0,19c43429bb818652ab99bbe37809d02ce3f96c90b91ce1bde49a718b22b44a4a,2024-11-21T09:14:36.277000 -CVE-2024-3222,0,0,dd1dcb4ccaee8a19b7cfdd2503d4d5ff1e79ccbeb78be83e9952b909fd924fa4,2024-11-21T09:29:10.753000 +CVE-2024-3222,0,1,ea21da0e0ce8e50c42b5835350addbb630d3c54552cde1b63c19e7b5c0edc047,2025-03-06T15:00:11.560000 CVE-2024-32228,0,0,e57d95e8f71189130c733a36f368f79ef579cdde5db0685584478be60c584dcb,2024-11-21T09:14:36.510000 CVE-2024-32229,0,0,1d4f889ca9079678836d30c226b4e93776fba7e81888461dc8750343cc23771a,2024-11-21T09:14:36.740000 -CVE-2024-3223,0,0,56722c9e76a9b0ffdca94ec5b76f1f953f848c3f14af14ebb6c407a466218ac2,2024-11-21T09:29:10.893000 +CVE-2024-3223,0,1,3fa1d78faefd06b2440dc30550305550de903871794e6149d466efed5a6a15cd,2025-03-06T15:00:11.560000 CVE-2024-32230,0,0,3a6294b82cd700b32f94546a71177093b3ea39c8512a95b325e1336833ebc65a,2024-11-21T09:14:36.963000 CVE-2024-32231,0,0,d1de02a20304f8a2541a989359910105e9a5fbaf303edcdd97dc7ff7c4722cb9,2024-11-22T21:15:17.970000 CVE-2024-32236,0,0,fc34b21c4f3444da90a31820b43bcfe52e5dd20b58b8287749526e7c509dae7e,2024-11-21T09:14:37.230000 @@ -258019,7 +258020,7 @@ CVE-2024-32530,0,0,714d8e4b8a2f870b91d467083dc345fa4045c6e5c97e5997870aa400b0c25 CVE-2024-32531,0,0,d6e694dee55e9595143f871a819a45e7418b0ea32f4aef2da1e5eba224dc980d,2024-11-21T09:15:06.883000 CVE-2024-32532,0,0,37ceaff06bae1bab6fd7ad5bf9bbd2c07c5ccf9cabe1bc2255d830c1f345df64,2024-11-21T09:15:07.017000 CVE-2024-32533,0,0,47b3148105196abd5e8ac806a2c046f18cda49e591b6cff94170bfc5212e9c36,2024-11-21T09:15:07.160000 -CVE-2024-32534,0,0,c55699a713e74a439e3d5fa18c355070f61a0e165541509d26bf4c225f8ae6a5,2024-11-21T09:15:07.357000 +CVE-2024-32534,0,1,04ce69d9c927363f3e06e47a8e02014f70279a7af426dd61e3b4719f433824a3,2025-03-06T15:00:11.560000 CVE-2024-32535,0,0,990861e75217abb6cf8250bb6dfee907e8edaa819acec12b9879bff2a119a782,2024-11-21T09:15:07.590000 CVE-2024-32536,0,0,39b189ee7670bc04c84733d776f150c31d0b68d542e75be22f2f5dfaf2fa155e,2024-11-21T09:15:07.730000 CVE-2024-32538,0,0,3cdfb9be8cf53704e8b63bc91466b4b95043016997f60cdd45dc13e37e91c430,2024-11-21T09:15:07.870000 @@ -258043,7 +258044,7 @@ CVE-2024-32553,0,0,75731ebafc6623d1310a34a2800e9f80a87ac1b537ecad73da9626a152179 CVE-2024-32554,0,0,d93f4dc49dd5e1eecd69949134cc6162762a6c2eb4110f961a584b3b2139291d,2024-11-21T09:15:10.120000 CVE-2024-32555,0,0,f73833eed7fc01ee0c4ae149905923f02957299bcc93ef594f1b09529337209f,2025-01-21T14:15:07.027000 CVE-2024-32556,0,0,833c498991a81001e8dedc535c7af786b23214181fc8b84190b72772b7e45498,2024-11-21T09:15:10.260000 -CVE-2024-32557,0,0,5b0ec57f637488f201cfe87382c0a1fa7b19c9f62d1e0f85ef3c809e5fc5ea28,2024-11-21T09:15:10.397000 +CVE-2024-32557,0,1,824654e7418a25ba58925c70614c9aa6ddfd2e711183bebeca2c9f40f078a9d3,2025-03-06T14:25:09.843000 CVE-2024-32558,0,0,164493ea9547d065ff20d36c66bda23d26ede0bfb266fb54b0d2b6423e912600,2024-11-21T09:15:10.530000 CVE-2024-32559,0,0,4c6146a0c4965792d4fc2fd5b21f5b18a08c6c8bb1d9c41e92a200cbf920c21d,2024-11-21T09:15:10.700000 CVE-2024-3256,0,0,2b7ce95c09bc0afd565568f4330237441fefea7c4a0659acae56d7d646832bc4,2025-02-10T23:04:39.443000 @@ -258066,13 +258067,13 @@ CVE-2024-32574,0,0,a89670989500cfd40178f80a09a009fb32c147beb8969ca4c49a42decaf90 CVE-2024-32575,0,0,a8bdade79839921d06b06781cd842ffb8d80698bcc05ba62c83fd0e2bfe4e7c6,2025-02-05T15:44:54.393000 CVE-2024-32576,0,0,d926863b95cd6fd7e294900c6c8ad6a7513f5bd75dc7eee94b7cd1476bdf387a,2024-11-21T09:15:13.060000 CVE-2024-32577,0,0,d4cf9274f36efdf9a934f2419d22ac1d14bbabb2233baf7486d9b15702d3fa74,2024-11-21T09:15:13.190000 -CVE-2024-32578,0,0,dd56dba86414bf2e360c901c9bf8041517f40b03a068e9f541feeaa3a91d5fef,2024-11-21T09:15:13.360000 +CVE-2024-32578,0,1,050d3a1a6f5f9ed3a607d39d5b27181fb1338a157dc472aa47d8ccec36629704,2025-03-06T15:00:11.560000 CVE-2024-32579,0,0,e3e01cbf94c7cd1b2a0a4ad60868ea9eaaec1ad18bc05779a15c1011cbad401d,2024-11-21T09:15:13.507000 CVE-2024-3258,0,0,c893d22ae6ed4d21d85ffb5998dfb0f71d0872539aeaddbe43a52da5c06cfe41,2025-02-10T23:04:14.047000 CVE-2024-32580,0,0,b4e3f6b6496cc625cf77f5b050381f56a7e1c34b1f08ed81b31fb6b20f9509e8,2024-11-21T09:15:13.640000 CVE-2024-32581,0,0,e80522a118298483830242753847ceef7c7bbc962e7cf9d3ddfa998313dfec76,2024-11-21T09:15:13.787000 CVE-2024-32582,0,0,a6084d9b53060aea950cfd3272b979a362bf912dc30a7a48c463ae5c089c04b7,2024-11-21T09:15:13.933000 -CVE-2024-32583,0,0,24da453d9ee27d812a2e4adbade5a7ee4eb2971588f5c0f2f64d8bed39cf34cb,2024-11-21T09:15:14.077000 +CVE-2024-32583,0,1,ed787f64e7a2596ca6770a8bd5045f47009608968aea5d4545866d3d81bfb022,2025-03-06T15:00:11.560000 CVE-2024-32584,0,0,c983708392498545dea5e27cf127ca84e5b54e448421f7cf6922b8454aa37db7,2025-02-05T15:04:03.760000 CVE-2024-32585,0,0,7a32c25ba62b7843c34a892783d46e5a60915dc8c33e023613a205524ac3e78b,2024-11-21T09:15:14.377000 CVE-2024-32586,0,0,320ce37cbc41d52b25d2dad2ca04a73065c0e9196d7ad2be5dea0edbb699bcdd,2024-11-21T09:15:14.513000 @@ -258082,7 +258083,7 @@ CVE-2024-3259,0,0,aa18334e7cab048a2517f3c3c3fa2d9483f78a6b473b61aecac0963f3938e8 CVE-2024-32590,0,0,eb1de886511f18f5af92693e9d7922546488d5a0e5e68f2c3d44b4f386d3185e,2024-11-21T09:15:14.917000 CVE-2024-32591,0,0,f2b620bf7b82384f49bc227192e656f2cba33b772655c5632e2877c1b74ed891,2024-11-21T09:15:15.053000 CVE-2024-32592,0,0,26a5d3630a626b1025b1bb0bd9b6ac445c2ca55c8dd636d7e0e326616d68db26,2024-11-21T09:15:15.187000 -CVE-2024-32593,0,0,77d34b3384fc7335197ecd2b5bbe12136514e1c68ccfbf753fdd8cd34dfca72e,2024-11-21T09:15:15.383000 +CVE-2024-32593,0,1,45fb50615a8fdc0b2be9e0a6967961b6b85e8f23bc2903ac2e26c3f185ce22d5,2025-03-06T14:24:40.890000 CVE-2024-32594,0,0,25c202082d83e69c0bde2a0065eaaa5dff2dc026a7d3d96bff487314a0d66e55,2024-11-21T09:15:15.517000 CVE-2024-32595,0,0,2cba5c2778a34acbd481bc4d92fadd07ad009128184c00b0aca19123ae63e96a,2024-11-21T09:15:15.657000 CVE-2024-32596,0,0,81609f727d526bec5ce5c3f408290751982efab4c6fe93a03772ee7275357cea,2024-11-21T09:15:15.830000 @@ -258129,7 +258130,7 @@ CVE-2024-32637,0,0,4b193937fa95691f6dbe0f21f86d9434adf6ade12f9359b09d63b59bf4008 CVE-2024-32638,0,0,b8ac4576abb7155461076b92e8605bcece6ffe42604eb0ad5dcb6a4bda594713,2025-02-13T18:18:02.733000 CVE-2024-32639,0,0,a9abcb78ad2e1a50e469749c677b545600654083fb498f3ca95e4bbd53ca4cd8,2024-11-21T09:15:22.857000 CVE-2024-3264,0,0,2aa7e39affd508257ed5d8cb89fc0bcaed4757ebdebb450a6aba1165ded3813f,2024-11-21T09:29:16.480000 -CVE-2024-32644,0,0,cf18b82a2ee0639e4ce071d9d79e55e98980120a8e0bb4160a373268890d5fbd,2024-11-21T09:15:22.997000 +CVE-2024-32644,0,1,1017b80ca8ee004386ca52b65c52f115e9e53cf7f15be373fd2e1353cb73110d,2025-03-06T15:00:11.560000 CVE-2024-32645,0,0,0e7114e8f35e6eb3557a3e702f060f0eee7cb8be400e81f0e66d606a5010d93a,2025-01-02T22:52:27.117000 CVE-2024-32646,0,0,9f068873df996b66427a44035d136924da09d4161054ad330979705c19ebcd27,2025-01-02T22:52:15.927000 CVE-2024-32647,0,0,1186401905d8611219ac7b0ee648ecc84aa4e8c0981d6764995ca4768fd08e82,2025-01-02T22:46:37.853000 @@ -258804,7 +258805,7 @@ CVE-2024-33538,0,0,6031543c1e8f7332b27767ffba7d7f283b2edc0d54e78085e9719185cf928 CVE-2024-33539,0,0,72c3542aa8d8725beca7d8a6e44230a2c468bc762c740741c2c54a91a6f142de,2025-02-03T21:14:03.657000 CVE-2024-3354,0,0,a22aafde8baca50a3a3bb122a67ea285eea8d3013fad8b2d80eb9edfd7ed4447,2025-02-11T14:49:51.667000 CVE-2024-33540,0,0,757c59563d6d7999151106a5d086f394dda6b9ed32a0a12c94f07a25768805ac,2024-11-21T09:17:06.720000 -CVE-2024-33541,0,0,8422811b196b3d6374bcdecea7093e1a6243ebcebb4e62fbeb4cc91e4075157d,2024-11-21T09:17:06.837000 +CVE-2024-33541,0,1,d1e08bfe1af10326ca1866da3861cd9ff740202dc7ab9e12b111c7eb770bfc75,2025-03-06T14:25:09.843000 CVE-2024-33542,0,0,391f717ab6df439bb5609b749e8072f81847c1c6655f801ed95dec443f3189e8,2025-02-05T22:15:29.690000 CVE-2024-33543,0,0,63797616ab7a39b146f722c6c44190261d0464349f39646ae3b90f2a9366096b,2024-11-21T09:17:07.083000 CVE-2024-33544,0,0,cd39eba8ecbbcada14f1c97935868f46e3ab4c53a2bf0020042c2391bef6eed0,2024-11-21T09:17:07.223000 @@ -258853,7 +258854,7 @@ CVE-2024-33582,0,0,50dd26640975958fc4d7408bd8e774d7953ff921629cdc4c3e467c688b427 CVE-2024-33583,0,0,36fa70679fe4f1c855ece492e630c34adeee209adb44bbec5f4eefb674e8ccdf,2024-11-21T09:17:12.020000 CVE-2024-33584,0,0,24e0d67d3b2016365e849deb059cd84cc573f7709abf5955da24c7d36eaef020,2024-11-21T09:17:12.153000 CVE-2024-33585,0,0,0101c7c78f8068e827533bfe68d8e54801afbe289fa7beaec7c70899882e1b30,2024-11-21T09:17:12.270000 -CVE-2024-33586,0,0,d6e909901249fdfa2692cc8e61786adb88a760a4189eed8280d3ca6094c080c3,2024-11-21T09:17:12.380000 +CVE-2024-33586,0,1,1567b0f8991c0af6102e7e09dcd1592ff7c9df5ea54152ce26923323d13af10d,2025-03-06T15:00:11.560000 CVE-2024-33587,0,0,3bd69058b0173f3dc9212fec569e34d362e4b7d65593aeda300ac0d18a6e9bcc,2024-11-21T09:17:12.490000 CVE-2024-33588,0,0,3a081a591381eef53d887b6d98db2d9d458e540c56daf424ac951937d3ee6325,2024-11-21T09:17:12.600000 CVE-2024-33589,0,0,6d5648a78e54d1e42e3d982acc9a16479dbeb81212300323d361c7993a3f96d2,2025-02-10T15:20:25.980000 @@ -259510,7 +259511,7 @@ CVE-2024-34429,0,0,f21839848bcd5931c3a04d267b6e34a68af6c72d880811a24e1f722eab739 CVE-2024-3443,0,0,f807f6b357ffc42a1f0bef94ddcf6780fde3610735714b00c99d031d435a84d0,2025-02-10T16:11:08.587000 CVE-2024-34430,0,0,cb8e123ee870d0ae89dcb364b82927e6d901e132d937011b7ad6ee7e86ab2b4d,2024-11-21T09:18:39.460000 CVE-2024-34431,0,0,66ab1d2dd8d93fb7cee43d9211bad6e473354e479eb13f9021fbfc509b3bf56d,2024-11-21T09:18:39.577000 -CVE-2024-34432,0,0,ecf4e991293aec6ee45864b48b7ba8c334672d8633a3876c85434cefb333f695,2024-11-21T09:18:39.700000 +CVE-2024-34432,0,1,0da8b72924f5d0664d8341e47be0bd240687d257d29506f56b1c3527ae64a42a,2025-03-06T14:25:09.843000 CVE-2024-34433,0,0,d7e888513ff0c09afdacd9ea2e3a72da4e6d670d8ed55cb7f7dbd78948a08387,2024-11-21T09:18:39.817000 CVE-2024-34434,0,0,24065908aeeb0e3598cd5b17cbecb828decf9d2c1fb786080b8992ae95e57f54,2024-11-21T09:18:39.933000 CVE-2024-34435,0,0,71a1145b72cc4faa12fd4b02c097c9bcc91a4d5d67f8bf5c43e35bc8c1193b38,2024-11-26T15:29:59.840000 @@ -261750,7 +261751,7 @@ CVE-2024-3725,0,0,34d39c7b9693ec8c6efa678fe19062ca5b94e8a7e742349df96826c3edfdb2 CVE-2024-37250,0,0,162a7b18dc3b3934e704845f5211211f8c1a8ee9037e336cce22b77790194428,2024-11-01T20:24:53.730000 CVE-2024-37251,0,0,1a7d74d496329aa3c11ac748d3bbf68a0a379e2b311ff9f219b0aaff96fec426,2024-12-16T15:15:06.970000 CVE-2024-37252,0,0,352abc05f60f2e4fbc6355cda6bac20bf4066a5734bd84d216e40d333c970822,2024-11-21T09:23:28.390000 -CVE-2024-37253,0,0,ee8f6824f492f5d0ab64956cefaecc26c74237bb8d0cd88151ac1ff3ac272e4e,2024-11-21T09:23:28.510000 +CVE-2024-37253,0,1,e400ae595d23e49a12ed799b16c37e9bc0285b919201b7e5b35e9bdb2653c211,2025-03-06T14:24:40.890000 CVE-2024-37254,0,0,7d8e71419a3130a86567c36341c002c59c1fc9f1c27411c09dfcb40f68500996,2024-11-01T20:24:53.730000 CVE-2024-37255,0,0,5ff589b9a84d540c2ffa9c796e02489e09def4e6ec66e434f1846217aea9fe9b,2024-11-01T20:24:53.730000 CVE-2024-37256,0,0,c007ad97dd9ccf366101b8df62602e00f8963cfcca3fcb372fc1f3bac3ad769d,2024-11-21T09:23:28.830000 @@ -262028,7 +262029,7 @@ CVE-2024-37513,0,0,d0bdc814a11e9a23902da654b5838b30392488394721377007e11c4ae0194 CVE-2024-37514,0,0,fe2ffa44d7d18f72b116c084c5c19179a8d350b5a958692e6fdf1436e7c5cf82,2024-11-21T09:23:58.753000 CVE-2024-37515,0,0,582164ec1fd25d4ba342bab313332ca8898667a47350909b25f12fec1c53277c,2024-11-21T09:23:58.913000 CVE-2024-37516,0,0,8c4832eee7b3c11fff61b00c167dc198dfe7dae4dc8bdde45e8fcb3088425590,2024-11-01T20:24:53.730000 -CVE-2024-37517,0,0,1e7470b476f91748b2066ecdf3d0fe9391361773d0b47a9ca6f92bf9eb4d44fe,2024-11-01T20:24:53.730000 +CVE-2024-37517,0,1,b628aef6623afe6211019c0f0c05100ed16939a96586bb6a95774f6690bdac66,2025-03-06T14:25:09.843000 CVE-2024-37518,0,0,ce7c58efe47b9e076492f32e21e638775c6331aac5cd80237af403e7534e367b,2025-01-02T12:15:21.910000 CVE-2024-37519,0,0,0c54d2d985a28e4dc95e6d58ab1b69c81bb80ba8fec548888f5876dbc59874a5,2024-11-21T09:23:59.260000 CVE-2024-3752,0,0,e88ebf8ccceb210daae1e9d6482672b0fa2cb8af7aea3e8caf75e1d55ab2e9c9,2024-11-21T09:30:19.150000 @@ -262663,7 +262664,7 @@ CVE-2024-38308,0,0,1baa56b2e3fdd13244d0b9df4f23464d3904d173da05d6eee250ad40c0e7a CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000 CVE-2024-3831,0,0,5e708a1e6973c6b70cfbb375324ac255e6a5b9f7cfb486bea916fa269c4f84cf,2025-01-28T03:13:30.017000 CVE-2024-38310,0,0,6659b53a28a05a037a22232686eb9e98f1c5c7d893b655725e2374a7009bc039,2025-02-12T22:15:35.630000 -CVE-2024-38311,0,0,369eff6a0ba7445ff178358722ea77f1fec89a19709c21a4fcf2a228cd4abcc6,2025-03-06T12:15:34.157000 +CVE-2024-38311,0,1,4124e712074ee4bd0a37c6fed9149de6efa7f82637bcff38ce418e880a2d1ab8,2025-03-06T16:15:45.760000 CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f709156c,2024-11-21T09:25:21.193000 CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000 CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000 @@ -262760,7 +262761,7 @@ CVE-2024-38422,0,0,bfdba1d938ae37fbdc4aeaa4ca34e4d56d3f71678329a442fe959d2d4aa00 CVE-2024-38423,0,0,e3498351b7b8492cd7d51fadce9265d5c0051da243d515627a591fd74aa6daa7,2024-11-07T19:46:41.697000 CVE-2024-38424,0,0,b20bddb1e41e4ece23219feec728eb8910763624d1ea2621b5bde813700fd52a,2024-11-07T19:51:32.117000 CVE-2024-38425,0,0,e32a925c31eb52f678b53ceda419af6344b1d99e71a719366ec4341ee3e4c249,2024-10-16T17:34:41.633000 -CVE-2024-38426,0,0,b6440f8ec7de6c911e71e8d9b3f83668350c56836ade028f9017ae263d99703c,2025-03-03T11:15:11.260000 +CVE-2024-38426,0,1,079a7f2200cb9496f592e5fe590c864a04bf1a003e2ccb51cb41d591bf0f5995,2025-03-06T15:21:24.387000 CVE-2024-38427,0,0,e03f18230b0965ff85c2447bdfa04160304b37189e7d46e85ccfd347184198b3,2024-11-21T09:25:48.097000 CVE-2024-38428,0,0,ca429ab8620e857c2740a8b8cc185755a533a3afb8ba56ac4468e697f6bb9392,2024-11-21T09:25:48.560000 CVE-2024-38429,0,0,b538fc48e96d9ea292e38fa094ab837d9c16ca39e46b7d2aa04f5879b36ef5a5,2024-11-21T09:25:48.997000 @@ -263014,7 +263015,7 @@ CVE-2024-38670,0,0,11289b1e126db881fff6325a04005fba01d66c0840611a3daa8a2f5fd39b5 CVE-2024-38671,0,0,5d50fd9e1c570917821065504ecb319e8b02e06f223be90658a4cbfafdc35853,2024-11-21T09:26:36.047000 CVE-2024-38672,0,0,32d2514af33a08839da3f6e05aa3d7b746bd3d95cb01082177cd9591d0ff0b37,2024-11-21T09:26:36.183000 CVE-2024-38673,0,0,ecf40623048b1ac82d6d9fd4d148b84fd573742c9b4bd91c953ab236c186d17b,2024-11-21T09:26:36.320000 -CVE-2024-38674,0,0,13ff50f47422e8528ddf9d40a36bfd1a57d8a5402e39460ed5a0aa003f31d475,2024-11-21T09:26:36.457000 +CVE-2024-38674,0,1,eda1c857c640c91760139028d67e0ec9bcacda7acaa12f0c800ba6e1f1c5bec1,2025-03-06T14:25:09.843000 CVE-2024-38675,0,0,fecec25a3945857f61410ccea7577cf558cc75d680ecd09822f4f4f76185e4a9,2024-11-21T09:26:36.593000 CVE-2024-38676,0,0,c46d64340d15411180cdbc104fb65b65494db2caaff121e58204f10be21178e0,2024-11-21T09:26:36.717000 CVE-2024-38677,0,0,9f8da79047970ac5249733e9049507872458c7c7ae1c2369a655da730169cd86,2024-11-21T09:26:36.843000 @@ -263028,7 +263029,7 @@ CVE-2024-38683,0,0,63c6d4e877991e2d6717aa912580ec7ca9f53556f1b0a57bd38c61d64dda8 CVE-2024-38684,0,0,4dc101606cca6227da51b10dcac1d771f7a4e63489c034f8ad02ebacae3dcfe6,2024-11-21T09:26:37.723000 CVE-2024-38685,0,0,5f3f894c35d1d4495ab4dd53f6e5e457a4e1e1ee341464bdf651440f3cfdbeaa,2024-11-21T09:26:37.853000 CVE-2024-38686,0,0,c96b17eac27a682ab4213c517ddf37e22e7d25601c67b123cce362e18a1ac4c9,2024-11-21T09:26:37.983000 -CVE-2024-38687,0,0,9e0b44a41a9cb62b866e67d2988c1f310eb99eed9050e5aff26a6c9e7a624a81,2024-11-21T09:26:38.103000 +CVE-2024-38687,0,1,488e9bd51c0b31efd30893472a284e54811a587904ff2880a63d57213028cd5b,2025-03-06T14:24:40.890000 CVE-2024-38688,0,0,c5b30a411c671b0fd64a758fbbc25ac95f365e054aa5766ce55f55714b200b96,2024-09-12T07:15:04.813000 CVE-2024-38689,0,0,d3cfe121c75d04c62d411dc78570e6cff30ffbfd7916d881eaeb0ffadd59cccb,2024-11-21T09:26:38.243000 CVE-2024-3869,0,0,b323001a48c948cf28ad984da5ff0468fd820c1c2cd9a50678a4aa352a0f9dfe,2025-02-05T14:42:53.307000 @@ -263086,7 +263087,7 @@ CVE-2024-38736,0,0,a4a0e7551ccf08c40e3a0251d8e9df9d25b16d2ae1e6ea167da7384c83d4a CVE-2024-38737,0,0,272c537e787516228559675125042a32e157f5f7f3dd6bb091a03f651a6b7a05,2024-11-01T20:24:53.730000 CVE-2024-38738,0,0,681a31ac0d890191a94ee0c52633a9f22e2d5d877607012d6f31181e5ba4b648,2024-11-21T09:26:43.407000 CVE-2024-38739,0,0,2f2f06533dc5e0bc7e221f761f7e9f44369c832e49ab26d0480b537cd8224bd1,2024-11-21T09:26:43.520000 -CVE-2024-3874,0,0,83f4d41b7936783ae1a906f5dd166f3324307243ef81d82d7c6e2c373cd2f0b3,2024-11-21T09:30:36.440000 +CVE-2024-3874,0,1,857a647a9dd20fedfa070dd9efcbf1724ddeadac2bce8b9e7811926eea055307,2025-03-06T15:00:11.560000 CVE-2024-38740,0,0,417de0d64318c211f331aaf9cfa23fb87cd5f0eae2f519eb62c599e0b7742d76,2024-11-01T20:24:53.730000 CVE-2024-38741,0,0,4e32c22480717bccd389575637ad581a6957b4cbb2234a3b654d4e5e784fe9d0,2024-11-21T09:26:43.700000 CVE-2024-38742,0,0,cb6819ef3c013026d9db883fe60262ac535b622c3a4f6a88b1a87ce37673afeb,2024-08-13T12:58:25.437000 @@ -264093,7 +264094,7 @@ CVE-2024-4014,0,0,d8dd467295cab371719c2ac00bec372a23c25ce5af28e8afcb8f0ac49be4dc CVE-2024-4017,0,0,f783a50d5ec6473e72572840dca331e1122c5a318b2eddc5c5296323941583be,2024-11-21T09:42:02.240000 CVE-2024-4018,0,0,e93d494ed70b12bf00fdfbf61d8137e8f4288becf4316d18479d4e42d5b1bc41,2024-11-21T09:42:02.410000 CVE-2024-4019,0,0,3aea9791ae6e9b7233884532fbd0a9983fbad081e331a0aa1b6a93ec2e0d9097,2024-11-21T09:42:02.523000 -CVE-2024-4020,0,0,aadaf10c72ec95ec88ee3d6fe43b87c2902cc2c3fe85cdb0e9aa2093c718fe2d,2024-11-21T09:42:02.677000 +CVE-2024-4020,0,1,2cb4e57edc63794c4db7aa16de626df786cb786f8465a515b3e0fce24b221f5c,2025-03-06T15:00:11.560000 CVE-2024-4021,0,0,141a8c3549b72a2e6fc7167017c78fe404ecf5a3430c27e6b0d3092ae59f1574,2024-11-21T09:42:02.813000 CVE-2024-4022,0,0,fc9a26e5d3e5ced31626c5738c88a31e66ac2841e407fae1707db2d65aabbd6c,2024-11-21T09:42:02.967000 CVE-2024-40239,0,0,ae12c56ee9941f755c16494c8dd5bdda020fbac80ab12acdfb5936223e53ed78,2024-11-13T20:04:37.887000 @@ -265680,7 +265681,7 @@ CVE-2024-42355,0,0,80a7bd5f5817bbf415d1aab8ee6950d0339815afbbd84c18d5377d0f843e0 CVE-2024-42356,0,0,22279046f7872ffdac778193c9fd6c031166d742a139782c37ef93d5c77078bc,2024-08-12T15:34:08.190000 CVE-2024-42357,0,0,c5e92ffd59b0e9191971aca64f69a954b24ff944138a6c931d44c0bc25c1d6fb,2024-08-12T15:26:19.520000 CVE-2024-42358,0,0,b5f732816ac1a8939f06ad612c3f8f4d2dda6ece5f4a7fd7b79f1c9550e79f96,2024-08-12T18:50:20.967000 -CVE-2024-4236,0,0,511783c0bd8452fb25c49405ed681ccc19e7e285461e993995161bc287359a44,2024-11-21T09:42:26.613000 +CVE-2024-4236,0,1,95dec8a41cdbd3dd4d0abf1c44301221637d57daabc3cdb76e21cf3cf7b087f6,2025-03-06T15:00:11.560000 CVE-2024-42360,0,0,390bcd4ba07d0113e5cc1876055cf731e5696a8e10d83f8808c96d256abcdda2,2024-08-16T20:00:10.467000 CVE-2024-42361,0,0,1daa164bd07876aff6fc67538fd666d8eb1a60b0103a2d90bf72f256b951cbf3,2024-08-28T13:49:50.457000 CVE-2024-42362,0,0,e5f7993ae1a555399b9faa1e5dd8167625d216c7bd9fd1aa394a527949190b72,2024-08-28T13:49:47.967000 @@ -266021,6 +266022,7 @@ CVE-2024-42834,0,0,4682a7643f4f1c0d32c2822f9fd1a1c021fa496bbb8846e29948873617922 CVE-2024-42835,0,0,22a6f739b93aacf1745ceb89b53a8f50b01769e067cdb25293fef7ccf249d315,2024-11-01T12:57:03.417000 CVE-2024-4284,0,0,78f6e6bd631db92106983a80d2af17b1ce9aee6f8799b7d845b4a68ba7f16cc6,2024-11-21T09:42:32.463000 CVE-2024-42843,0,0,ff9fe7d40ac7d40e1ac640d2b984df3686e2b8fb167f41b98a9e8430915f9584,2024-08-19T19:35:09.180000 +CVE-2024-42844,1,1,4c47eabbf97cb8a70ae35a02fdd2333479ff33f7d7424c6e0482edf907587daf,2025-03-06T15:15:15.800000 CVE-2024-42845,0,0,9b5c61583f167788abce82e6afb0b505f7db99254d9ef509083483fc304c8d3d,2024-08-28T16:35:23.650000 CVE-2024-42849,0,0,c66070e6231ba1d77eff858a1ed19124639e16c363eab861a1ca84d9d7b0aa3e,2024-08-19T13:00:23.117000 CVE-2024-4285,0,0,d88ae73b3a1728178791a9277a690a4c488f4499a452379ab5fa50a282469f93,2025-02-11T02:15:35.033000 @@ -266125,7 +266127,7 @@ CVE-2024-43048,0,0,aa462510e6501f1c68792d4463cb05868dde51c2c7f830d9a1911363c50be CVE-2024-43049,0,0,396d2f1d473f42654eb07e32ffbaf51737e64004525269d29bf446d276b04cfd,2024-12-12T15:28:13.420000 CVE-2024-4305,0,0,b12513f5175c0f4629b88ab9716e6b0a0f60c8e17fe5755afa78f7b7a5ed53a1,2024-11-21T09:42:35.147000 CVE-2024-43050,0,0,42271ce6ad3806c1a44b603d2bbc55cdacd28a664360bd8e0ae1272488c011f9,2024-12-12T15:28:32.960000 -CVE-2024-43051,0,0,3895815fd714d4cd909668a11845f75c941aa19b0e2942c7cbabfb3e978bee4f,2025-03-03T11:15:11.453000 +CVE-2024-43051,0,1,a32eb75159144fc0400f4a3fd843070d06a761b09ec2ffb1df7f4ea71fd6c6a8,2025-03-06T15:21:24.387000 CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b9d5,2024-12-12T15:28:54.787000 CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000 CVE-2024-43055,0,0,f1e527a3020db36b83a4085bce3603ba4821d3466fea47fcc96aa727049dc57a,2025-03-03T11:15:11.637000 @@ -270011,7 +270013,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000 -CVE-2024-48246,0,0,d8aa8bbee68eda7776a3808bf3d9b15998cb2b79ac3a38a6ecaa4e7ac7ab27f7,2025-03-05T19:15:37.453000 +CVE-2024-48246,0,1,06e74a25fc7dc4e82f663349598aa6890dc105ce6250318dd386fe2bcf87e56a,2025-03-06T15:15:15.917000 CVE-2024-48248,0,0,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 @@ -270143,7 +270145,7 @@ CVE-2024-48594,0,0,d5a52e0d152b31106cf7b89cec0f7550cdb6375f901b4c018ce4b1c02e80a CVE-2024-48597,0,0,dbc3f2eb04f06991684cd7c9c46a9fb0207e1947f5c88a8f399960e50271d80d,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,731d4e23354be097812d72b15d7e6992968e209a4c37edc22419fab0e7ae3b67,2024-11-21T09:43:44.947000 CVE-2024-48605,0,0,5cf16ecb0c12b2d510ecd90565f906c729f66381b22aa58921368411648c90af,2024-10-30T21:19:40.027000 -CVE-2024-4862,0,0,37f8a80974a70aaedc79fa0f728205eaeef8d997920eb7ab617bc152e547efa1,2024-11-21T09:43:45.060000 +CVE-2024-4862,0,1,0fb4333c4d8321efd7112105807f24da20cf6282fe6e66dfccaeb99658e04e7c,2025-03-06T14:24:40.890000 CVE-2024-48622,0,0,7b5734fdf710218dd18d04eccbe27f1ea32dc572aaf26b2fbfe91cd5543b9021,2024-10-16T16:38:43.170000 CVE-2024-48623,0,0,5cea775385f6ce5ebba2cd449299789230da6b7f1dc9f4a14dddcec3dde7198b,2024-10-16T16:38:43.170000 CVE-2024-48624,0,0,b59b0332a99ebf3cde2350cd4a8321152317b6a93e251b6b8063e9f34ddc5f48,2024-10-16T16:38:43.170000 @@ -270619,7 +270621,7 @@ CVE-2024-49289,0,0,6cb496d659f9f90f3ce5ef368cf9bd61a0afc8abc1a111b8e9264d674e8b4 CVE-2024-4929,0,0,446a90d02b622eb1fd99d257d3325e858c1bfe45905163fda72091124f0a7f2c,2024-12-09T22:46:06.657000 CVE-2024-49290,0,0,96e76b27a181dc096cfd832ba5b2be4d826e178057417e0d837c9408f6a4ca74,2024-10-22T18:35:55.413000 CVE-2024-49291,0,0,249dc671b72ac546a6c5c29c6da882835446fe95844bab5700ec27796ce85169,2024-10-18T12:52:33.507000 -CVE-2024-49292,0,0,4d7f035bdbc17c54c66913bbb4437e27e133be56065732023f8dac91223c3b43,2024-10-18T12:52:33.507000 +CVE-2024-49292,0,1,af629185d374e4be2800c1bf63b5f2d37841421023ada721633e525a27930b32,2025-03-06T14:25:09.843000 CVE-2024-49293,0,0,2d53402d532cd283b635562c0a1d47cc207eea6245a05010c9022145b2413c0d,2024-10-29T15:07:39.407000 CVE-2024-49294,0,0,93d4db74b4f77bcd1a4525c7c80b4b37436a519667df0c47a3e499278b0371de,2025-01-07T11:15:07.400000 CVE-2024-49295,0,0,93cf95834b6245279ffc7131566626d99288891705acd63ad80fc783ba87c120,2024-10-18T12:52:33.507000 @@ -271016,7 +271018,7 @@ CVE-2024-49803,0,0,dce2571c74ef2a0370fd776967085d9deabfc567ee6d4ba12e558c5f495e1 CVE-2024-49804,0,0,ac9e0f55577ef9257227b614ccd7a1b01a15602bfa23a61ff3bdb6906b004a44,2025-01-29T21:24:00.387000 CVE-2024-49805,0,0,8c1aaacc8d12be331d70aab0e8f7279b981c807cbe4aba5debb78bc30d6f0d29,2025-01-29T21:24:36.337000 CVE-2024-49806,0,0,1e9e7366d429bfe4288411d8922c4ce74b00945547b83f0b9b47dea0218eb8ae,2025-01-29T21:25:06.310000 -CVE-2024-49807,0,1,fa93f519f28a27fa1a6f3184ddd160494536ae94aaeccfdd0ab3674a1ea7fc28,2025-03-06T13:30:34.893000 +CVE-2024-49807,0,0,fa93f519f28a27fa1a6f3184ddd160494536ae94aaeccfdd0ab3674a1ea7fc28,2025-03-06T13:30:34.893000 CVE-2024-49814,0,0,73913b2547105d571411ec726289dcdf22a5171ac9632e1edb82b0e05878de6d,2025-02-06T01:15:08.230000 CVE-2024-49816,0,0,29fec4881722e27e4de58cfa345cd2fbdffa0b4c8c7096fb575d64021d438094,2025-01-07T17:25:58.430000 CVE-2024-49817,0,0,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96260,2025-01-07T17:23:31.817000 @@ -272085,7 +272087,7 @@ CVE-2024-51139,0,0,3b86e869f5ecb53ca24ff4fbeb657240c1119cc435967f16a049b12c38655 CVE-2024-5114,0,0,a53116e5e8fe86fcce70c98ac21ade21bff509be03067f69ee971c3f0fde0f62,2025-02-21T21:10:08.983000 CVE-2024-51141,0,0,5382dd00ba9b2f385fa6fd2013258c1bdfe06c898acc0f9612f7d27a92e2f8b2,2024-11-18T17:11:56.587000 CVE-2024-51142,0,0,0966095e36208a7f8cbe7da74b14de21dba15e2b1fd23a5e1fde16bca38e370e,2024-11-18T17:11:56.587000 -CVE-2024-51144,0,0,f2e1949f146dc411e1404659a7d6dca2cc1e604e82f47916b3953b73dc6e41a9,2025-03-05T20:16:05.603000 +CVE-2024-51144,0,1,bbc8b5010821098c4b5b6514582c7652728a7ebda8207c1cb336b76ff774cdc5,2025-03-06T15:15:16.080000 CVE-2024-5115,0,0,63ee4189b26772fc1ce56914807ff994899a5055d7b3d38de495f2ee77931e2d,2025-02-21T20:51:40.910000 CVE-2024-51151,0,0,6043d48b8e54694a9f5dd0791c6e07ebb911ecfc7547aac1163aaf1a70efd3d4,2024-11-22T17:15:09.190000 CVE-2024-51152,0,0,967cbcfc73dbc16287d55b13cbb722195fe5f82a6511062fdf0ca56b7f9037d5,2024-11-13T20:03:06.083000 @@ -272704,27 +272706,27 @@ CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9 CVE-2024-51941,0,0,99e7c2ec210b1b461bcd0a5c19e2f109b9f77e87df47efb160f27ffa568291f1,2025-01-22T15:15:14.247000 CVE-2024-51942,0,0,8b161189d0d45cb0bf63bd465c92a2e8ee75c81f4791280570986eb3c455233b,2025-03-06T12:29:08.017000 CVE-2024-51944,0,0,f8c98d1793f9787c17c7c73cfd2debb113898aecd312f3c77a685c088878faaf,2025-03-06T12:29:08.017000 -CVE-2024-51945,0,1,38f5a32d001f0190ef98670af553cf8909de1cdbe13a8644d47acb1a89844580,2025-03-06T14:23:26.167000 -CVE-2024-51946,0,1,374690e9df38794b94ca4b4d59d90dab7831490073d30a4221e31c258c9b8934,2025-03-06T14:23:26.167000 -CVE-2024-51947,0,1,e86d80d8ac1ca36d9cfee6310112fc4344a741f349117c7760dbe0154aa86ed5,2025-03-06T14:23:26.167000 -CVE-2024-51948,0,1,9b932a0aa110b7e3984a33d1efe3da4d75583774b2026f209391f1bc6c55b912,2025-03-06T14:23:26.167000 -CVE-2024-51949,0,1,0e53f287752c336e888822b58d1dcda00ac87123548cecb923834dd8f676d2d2,2025-03-06T14:23:26.167000 +CVE-2024-51945,0,0,38f5a32d001f0190ef98670af553cf8909de1cdbe13a8644d47acb1a89844580,2025-03-06T14:23:26.167000 +CVE-2024-51946,0,0,374690e9df38794b94ca4b4d59d90dab7831490073d30a4221e31c258c9b8934,2025-03-06T14:23:26.167000 +CVE-2024-51947,0,0,e86d80d8ac1ca36d9cfee6310112fc4344a741f349117c7760dbe0154aa86ed5,2025-03-06T14:23:26.167000 +CVE-2024-51948,0,0,9b932a0aa110b7e3984a33d1efe3da4d75583774b2026f209391f1bc6c55b912,2025-03-06T14:23:26.167000 +CVE-2024-51949,0,0,0e53f287752c336e888822b58d1dcda00ac87123548cecb923834dd8f676d2d2,2025-03-06T14:23:26.167000 CVE-2024-5195,0,0,fa8698da02fa582ea365b08f4fecc73e615774ea2cc6020b120dbb6e842cd656,2024-11-21T09:47:10.100000 -CVE-2024-51950,0,1,9aeda626b1a73a36d836b337ddb6e2f40b2ec04d820e0927b810933191b2c93f,2025-03-06T14:23:26.167000 -CVE-2024-51951,0,1,45b279c60f428072e4a402c59a266fa8a9671d6ad374ada6dcbc6685b3a0f85b,2025-03-06T14:23:26.167000 -CVE-2024-51952,0,1,4fdf2c2b2af227b55576eabd7dbee3c57f6dcd0e1262b5ff98f342cbc4e4b89a,2025-03-06T14:23:26.167000 -CVE-2024-51953,0,1,2e4d40eea33b0bca63db4d7c6b7ecea597d0e1d849214f0978d201b82c0795fc,2025-03-06T14:23:26.167000 -CVE-2024-51954,0,1,e1d46ee4c71df9ca356fa427b044a377fecda6d84414278b7f3044764cb8f13c,2025-03-06T14:23:26.167000 -CVE-2024-51956,0,1,8a1cff218519e698bd7ab4cc64d9391ec72ec4a9b841ec9e0ec4b1297b2aa570,2025-03-06T14:23:26.167000 -CVE-2024-51957,0,1,8f0fa1ce82029e78611a7f2084c1cbb2c6a120c4ee8520adba3e121ce1c2487d,2025-03-06T14:23:26.167000 -CVE-2024-51958,0,1,fec30b06696b6bb28ee38c30f7890ac0c60ac9f1cba574ddcc27a0495dc0d22e,2025-03-06T14:23:26.167000 -CVE-2024-51959,0,1,a00f7484f54002cf0451ae5d3d18f94fbb0197136c77d7c4af6efbdc21752116,2025-03-06T14:23:26.167000 +CVE-2024-51950,0,0,9aeda626b1a73a36d836b337ddb6e2f40b2ec04d820e0927b810933191b2c93f,2025-03-06T14:23:26.167000 +CVE-2024-51951,0,0,45b279c60f428072e4a402c59a266fa8a9671d6ad374ada6dcbc6685b3a0f85b,2025-03-06T14:23:26.167000 +CVE-2024-51952,0,0,4fdf2c2b2af227b55576eabd7dbee3c57f6dcd0e1262b5ff98f342cbc4e4b89a,2025-03-06T14:23:26.167000 +CVE-2024-51953,0,0,2e4d40eea33b0bca63db4d7c6b7ecea597d0e1d849214f0978d201b82c0795fc,2025-03-06T14:23:26.167000 +CVE-2024-51954,0,0,e1d46ee4c71df9ca356fa427b044a377fecda6d84414278b7f3044764cb8f13c,2025-03-06T14:23:26.167000 +CVE-2024-51956,0,0,8a1cff218519e698bd7ab4cc64d9391ec72ec4a9b841ec9e0ec4b1297b2aa570,2025-03-06T14:23:26.167000 +CVE-2024-51957,0,0,8f0fa1ce82029e78611a7f2084c1cbb2c6a120c4ee8520adba3e121ce1c2487d,2025-03-06T14:23:26.167000 +CVE-2024-51958,0,0,fec30b06696b6bb28ee38c30f7890ac0c60ac9f1cba574ddcc27a0495dc0d22e,2025-03-06T14:23:26.167000 +CVE-2024-51959,0,0,a00f7484f54002cf0451ae5d3d18f94fbb0197136c77d7c4af6efbdc21752116,2025-03-06T14:23:26.167000 CVE-2024-5196,0,0,6d90077174f7697bbfa31bc4f0436f8c9f218990f5eb59e7edd22cabda3ff370,2024-11-21T09:47:10.230000 -CVE-2024-51960,0,1,4fc5cb483e8866725dcb2c62b316f692664ccac493913ae82ea7ff308291f324,2025-03-06T14:23:26.167000 -CVE-2024-51961,0,1,fcfb4dc7c6437182d6d1b78ca82922bcadca2fb75db9e2b12a36cde2849df2d0,2025-03-06T14:23:26.167000 -CVE-2024-51962,0,1,17f37fb9fb87587a68332c2ceae76372d40c06cabef66c0137bdccaba1220562,2025-03-06T14:23:26.167000 -CVE-2024-51963,0,1,c61743d3b34745847f281194e9ab430d9bc91fb42f597d40e2492c3bd4146653,2025-03-06T14:23:26.167000 -CVE-2024-51966,0,1,57235b2ae25a1c9bc7f244c2ebe0c2ff6ca0135bbb9202f4691d03357fd1f7db,2025-03-06T14:23:26.167000 +CVE-2024-51960,0,0,4fc5cb483e8866725dcb2c62b316f692664ccac493913ae82ea7ff308291f324,2025-03-06T14:23:26.167000 +CVE-2024-51961,0,0,fcfb4dc7c6437182d6d1b78ca82922bcadca2fb75db9e2b12a36cde2849df2d0,2025-03-06T14:23:26.167000 +CVE-2024-51962,0,0,17f37fb9fb87587a68332c2ceae76372d40c06cabef66c0137bdccaba1220562,2025-03-06T14:23:26.167000 +CVE-2024-51963,0,0,c61743d3b34745847f281194e9ab430d9bc91fb42f597d40e2492c3bd4146653,2025-03-06T14:23:26.167000 +CVE-2024-51966,0,0,57235b2ae25a1c9bc7f244c2ebe0c2ff6ca0135bbb9202f4691d03357fd1f7db,2025-03-06T14:23:26.167000 CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000 CVE-2024-5198,0,0,0cb0dbc1ecb18e948c4424650c67decdfcc909aef2c2c929df2436f4b9fa7302,2025-01-15T15:15:13.607000 CVE-2024-51987,0,0,de42f826ffc8f667098d9b9c812cdb24c061b4d91dd2f98cf12cb5febe98a72f,2024-11-08T19:01:03.880000 @@ -274305,7 +274307,7 @@ CVE-2024-54266,0,0,d444be4e1ee22dd451822fabc010f4ef86c2b038c294a565a8a8c51aef896 CVE-2024-54267,0,0,76f7008cb7e3a38e8545f73bbc644c092c440137c92b5ce9caceadf7f166993c,2024-12-13T15:15:30.923000 CVE-2024-54268,0,0,2ce0a46606ea8570aabcf0f5ef556af89297e04399b9637bbdfc8644e181a39a,2024-12-13T15:15:31.080000 CVE-2024-54269,0,0,80ac095d31433aafabf7debefee962a6f6c2eac87daa457c3fe90f17fcc9678f,2024-12-11T10:15:07.790000 -CVE-2024-5427,0,0,0e5a4a243a6c356d48858411e10959c0d2b5ef3e2a4a055bc1bad76f470ca7d5,2024-11-21T09:47:38.020000 +CVE-2024-5427,0,1,44911ea7ed1c88304a9767aca8126a7830013da7597a25ddf702b109f92ab924,2025-03-06T14:25:09.843000 CVE-2024-54270,0,0,4ff2a32fb0b8766616f6de47e9eb91a9703be9f024b88fd7ec9559d6b3384e5b,2024-12-18T12:15:10.570000 CVE-2024-54271,0,0,c27662fb9968b9725bc778a9d9144b52ef438a3ce319f321fd17e81c32f1277a,2024-12-13T15:15:31.230000 CVE-2024-54272,0,0,f5a3261052d9bdef13af95bafcaf81a95248149d03f918ded2479469dd46cf4b,2024-12-13T15:15:31.367000 @@ -274347,7 +274349,7 @@ CVE-2024-54306,0,0,48683bd2c710a44bffe7e8451e473462910ffacefecb9bc4333588398f856 CVE-2024-54307,0,0,dc693bb275745794b58e99ee9aacf2eb31a3a335e7a9f1bd965e0c1a695d4f8d,2024-12-13T15:15:35.313000 CVE-2024-54308,0,0,93acb47da6c89852056fa481b260a065439831599dc83b02db9b901f9f23159f,2024-12-13T15:15:35.470000 CVE-2024-54309,0,0,cf9f58b5557f17ebec587419bd79b391398e088a671792c51d132749158d2320,2024-12-13T15:15:35.663000 -CVE-2024-5431,0,0,35facb44b30437f1ba8d91b7933e9b8e6b4036da6f0fcc4ae925d7f75ce6f23d,2024-11-21T09:47:40.293000 +CVE-2024-5431,0,1,acc34c060591ffeb1c88b3b0c033eafa92c98e0e8c5894a39af5ad3771fe0ffe,2025-03-06T14:25:09.843000 CVE-2024-54310,0,0,655cfcdbd31640390fa19d4d2aa88102cde1596774c1eace9c6a217792cb7872,2024-12-13T15:15:36.820000 CVE-2024-54311,0,0,23e18809018d617173c3e7133cbacbabfa3b93e6c408d127bc955e1b7887eee0,2024-12-13T15:15:37.580000 CVE-2024-54312,0,0,8aa5c0b192af992ddb207253021c55edb5df573bd13889e3493f5bc52128fbe3,2024-12-13T15:15:37.713000 @@ -275116,7 +275118,7 @@ CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366 CVE-2024-56060,0,0,d52c48295d0dbb3abfdc5dccd1daa1a43773049add0bc86c3cdd22c212f008f3,2025-01-02T10:15:08.643000 CVE-2024-56061,0,0,a028e486e70270644a1996649c2c3b8450478b85bb5ddc1825cc066d2525f2f5,2024-12-31T14:15:24.970000 CVE-2024-56062,0,0,0710d5a9eeb90721a35932b9d93096a40330ad3819456d48d0db54e95031a5c0,2024-12-31T23:15:41.237000 -CVE-2024-56063,0,0,f969cbbbe4f804f01855ef4fc34fe03eea1ede78610feed6970fdb5011c8ef72,2024-12-31T23:15:41.393000 +CVE-2024-56063,0,1,81a7b7a2d78bc29a5f5fcce3a74b9d8a0b1c655402262c170b63dcca2ef85513,2025-03-06T14:25:09.843000 CVE-2024-56064,0,0,0d85e693a6ee180923e3bd9bf5f6c4beff2647e62cc73ae1ee472d7fcb52494b,2024-12-31T13:15:08.157000 CVE-2024-56065,0,0,1e7e79ad901a249cf3b84fdd4f95f74b4dc3e18729cca8dceb16fa0af04fe16f,2025-01-13T14:15:09.117000 CVE-2024-56066,0,0,4b41a7e13e2d31a70f1527d8d2fafeb73707725a422cde8f675c73ee0c2f217a,2024-12-31T14:15:25.117000 @@ -275175,15 +275177,15 @@ CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 -CVE-2024-56195,0,0,5061972a1cb73878137e3bd459e010e89d1c1704b622db6ed4fbc91bfa8ff13b,2025-03-06T12:15:35.373000 -CVE-2024-56196,0,0,b46ae86c15fd0353a72c49b206ddbd52d33b27b1eae894036c9613fbfa8f4b28,2025-03-06T12:15:35.523000 +CVE-2024-56195,0,1,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000 +CVE-2024-56196,0,1,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000 CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 CVE-2024-56198,0,0,3b67ef470891f025afa6af0da137e788f43839b85f759fed43bf437c7d57fc06,2024-12-31T16:15:27.247000 CVE-2024-56199,0,0,b62df53baa8d4848a6f31e2b0b1f49a9a24a4405c740c5c1ac552cd60e35a283,2025-01-02T18:15:20.427000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 CVE-2024-56201,0,0,fcf381b194171b51a5229bbac53f5e329fb502829416a1a37abaece0e20f4002,2025-02-18T22:15:12.910000 -CVE-2024-56202,0,0,56b4a87f440cecd788b6a9dd57890c9c4416d61ca169d201a38d8af53065d0ed,2025-03-06T11:15:11.423000 +CVE-2024-56202,0,1,f3e5c2e821f482d33cfcbcb7036987bf3a680947a5b32918fe42e63be16b5439,2025-03-06T16:15:50.053000 CVE-2024-56203,0,0,e99e9de74c83a36dbb17a843377a1378f7cef98ac1909cf2366fcf78cc18f19f,2024-12-31T14:15:25.400000 CVE-2024-56204,0,0,6a6e8f022625febdb1ce3a481d0a8e2bb1f1902592ae6e2bfa4e06cd41426aed,2024-12-31T14:15:25.547000 CVE-2024-56205,0,0,8369f1bc37e0dcf8f712f3109d50a2811210639fc84cb65dbb5b1dd98af12e24,2024-12-31T13:15:08.803000 @@ -275358,8 +275360,8 @@ CVE-2024-56408,0,0,937b0b6dcb8b7e22700c52d825204d5a29fd9d235db7298d220870025b8b9 CVE-2024-56409,0,0,5308d88426ba47579b9e4814446ee52648c1ad6c1efaeac0ba2c7848d693aa32,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 CVE-2024-56410,0,0,773584879180f8e91ff1c4d215aa7e545e4564d5fb6f40fae69849530878b183,2025-01-03T21:15:13.723000 -CVE-2024-56411,0,1,8a8f707c7bfe42da58c26531de0000f76c5a24eb783381a2a81a1a9fef0dc05b,2025-03-06T13:30:34.893000 -CVE-2024-56412,0,1,ffbda529bc4b3d5376fc38b6bb3dbb9527a4234f16921504f6f0df51d478a8ed,2025-03-06T13:30:34.893000 +CVE-2024-56411,0,0,8a8f707c7bfe42da58c26531de0000f76c5a24eb783381a2a81a1a9fef0dc05b,2025-03-06T13:30:34.893000 +CVE-2024-56412,0,0,ffbda529bc4b3d5376fc38b6bb3dbb9527a4234f16921504f6f0df51d478a8ed,2025-03-06T13:30:34.893000 CVE-2024-56413,0,0,379dc229ccabdf364af9829d579c8a73e199b5e7c66cddebda4706bf51009015,2025-01-02T16:15:08.570000 CVE-2024-56414,0,0,8d131c69616c062c73dec88651a9a991bc9ee2aa5d8bfac07e8125110c170173,2025-01-02T16:15:08.693000 CVE-2024-5642,0,0,272b3c46f017079f5e7a4c3a57dae457f6d7a543b129faf9804cec24715f8735,2024-11-21T09:48:04.713000 @@ -276369,8 +276371,33 @@ CVE-2024-58048,0,0,25e6d05d2f9c2c4ba042691b58c9f3e9065aaf46adac4143fd8a3d39edf19 CVE-2024-58049,0,0,531a2aeb3dcb148691f97d407abd92031eaaab2d4984c8e46b10cde9f4a78f8c,2025-03-04T08:15:35.593000 CVE-2024-5805,0,0,fce2cd9169116102e5375089f5975fe2795253d6c4b763ab35cc7d32ac26b7a6,2024-11-21T09:48:21.803000 CVE-2024-58050,0,0,60d665e6d95162cbf269cc1b75f990da5ff91503a4492b952e5f609a234ef33e,2025-03-04T08:15:35.767000 +CVE-2024-58051,1,1,2cafa3538f5782d14f7a6c4c30044d26afd61b54039234039199c15f43d17921,2025-03-06T16:15:51.247000 +CVE-2024-58052,1,1,8a11e0d4b9d9c8bd5a90f8715a8d4a8e062e314e07d857c92a7cd7c02f80adc5,2025-03-06T16:15:51.367000 +CVE-2024-58053,1,1,1e6728899803d01331497875cf6ddbf3e95fc62f1d01597d611fcdf32c586a87,2025-03-06T16:15:51.490000 +CVE-2024-58054,1,1,22ab24f419023ba44f6ff97c84cbf401afb50a6b1598b274e44dcc7c356ef215,2025-03-06T16:15:51.600000 +CVE-2024-58055,1,1,e3a96e3ea7e4131281b56e3139a5d181bb664b1ba32bd80fec7368349ece3ee0,2025-03-06T16:15:51.730000 +CVE-2024-58056,1,1,86fb9d3ea1708b10267c022b9fa8df899fa4cc401f71403a759c2316424eceea,2025-03-06T16:15:51.837000 +CVE-2024-58057,1,1,cca7e05d64ab673ef86829ca3c15e2c9223dd80c3436e89f6cfe56cfa836f67c,2025-03-06T16:15:51.940000 +CVE-2024-58058,1,1,8e0ce81daf5893833bafcc9b8b09339f9532a057cc65cf9b31e2003e9944c78e,2025-03-06T16:15:52.037000 +CVE-2024-58059,1,1,40160e71985a337acefb34ce5c5702e0f63950ff0118dc40fa8161a328890384,2025-03-06T16:15:52.140000 CVE-2024-5806,0,0,5ac9637d8c764ba881b38672e3b3265f75ae0c44c191480b6554928fc9eb1283,2025-01-16T16:57:19.660000 +CVE-2024-58060,1,1,b6c2623ac2f1f69028a55e8bdffbf555ad1ff84f1780a805cdc81c9f0d84eec7,2025-03-06T16:15:52.230000 +CVE-2024-58061,1,1,168f37efb41f94c7bd3667ba879d8c3814558375cf700a08ca6b07aa9f32a13a,2025-03-06T16:15:52.390000 +CVE-2024-58062,1,1,01d9003a7d1b91faf0bd7090d4198f86dbdd96c5b2193d63d848996ca3a9ad42,2025-03-06T16:15:52.490000 +CVE-2024-58063,1,1,ba32b1beaf14f4724437d0a976de0bce2c42efeac678196663123a9f63a1028f,2025-03-06T16:15:52.583000 +CVE-2024-58064,1,1,72b8fa96a79b2382a3c37624697e92848ecb20a8956da290497772b8c4904b74,2025-03-06T16:15:52.733000 +CVE-2024-58065,1,1,66ced7b7adee37b8356e0226335230bd17e9d3878d7c1fe032451829bf324b6f,2025-03-06T16:15:52.830000 +CVE-2024-58066,1,1,27e9283377d7bad95517767530204bfb4b58b39aa1bbc6f576fe83352c152683,2025-03-06T16:15:52.997000 +CVE-2024-58067,1,1,4ca3b0f67931e81284dc1e243a4e189cc599b000ce83375fd7daa528fd5838d9,2025-03-06T16:15:53.150000 +CVE-2024-58068,1,1,8ea6ab314c3b17c7e4a14c9aad5d2e0082daad6a1ba7d268cad8c0d1a14f0f6a,2025-03-06T16:15:53.257000 +CVE-2024-58069,1,1,1d9a02b4d03e870fd2b8b9f894c9f2805c870ad01ccc12c490bff6faaf689da3,2025-03-06T16:15:53.373000 CVE-2024-5807,0,0,bcd7f1773756c308216942ed74fe8b63dad936ebebf2c4e22c08a44714f2e7fd,2024-11-21T09:48:22.057000 +CVE-2024-58070,1,1,4e96941870f19160ee0abf4a8dc11f2d652ccb3f2fd2e07c00c4f60da545bfc1,2025-03-06T16:15:53.480000 +CVE-2024-58071,1,1,e2187308a3c54651be755875a9cfa8feb71b8649c44e0baeb126c8142553f3bb,2025-03-06T16:15:53.593000 +CVE-2024-58072,1,1,24d89844d6f1493212431ad264fcbbbb1973872706eac6c214cfaf903e3d1cc3,2025-03-06T16:15:53.703000 +CVE-2024-58073,1,1,109fadd3201cf47ca89f9a569fc60b9a69b2ee83d751aa8631e712ab45aeb7f0,2025-03-06T16:15:53.833000 +CVE-2024-58074,1,1,883e6ff7932d7cffafc87fdaad452ce3afa9cc5ba5a81459b9802774df1ecc0c,2025-03-06T16:15:53.943000 +CVE-2024-58075,1,1,a06e38c607e2bc80efcf58b48a2e1ae65450ec85e29b0d8b484a5f78766e8877,2025-03-06T16:15:54.040000 CVE-2024-5808,0,0,8544bff4c0ab9040235b040d590c0013468843f3e678f1770e3c92d0e5bbd73b,2024-11-21T09:48:22.213000 CVE-2024-5809,0,0,d3a3cb96d02b3d9c2efd17f0531d777c80fde692d386c7f6a56c47f2ca5601d8,2024-11-21T09:48:22.387000 CVE-2024-5810,0,0,1cfa1d347c98633461d8a7b5c70e7a88c8da42418f63ef991acf03eb3681102e,2024-11-21T09:48:22.557000 @@ -276449,7 +276476,7 @@ CVE-2024-5884,0,0,24e1fe9ab75bc45d011f2c93b35363e43ca5195883e3393db1f5efead25de5 CVE-2024-5885,0,0,b65202b515cb4c17dcef9eccc68059bfcadafe010b595b3c7fd55558fc1eb55a,2024-11-21T09:48:31.420000 CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000 CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000 -CVE-2024-5888,0,1,20f59e0814c65babf2f0e66d48a127098726020f44ce6e0309b928c6093d5daf,2025-03-06T14:23:26.167000 +CVE-2024-5888,0,0,20f59e0814c65babf2f0e66d48a127098726020f44ce6e0309b928c6093d5daf,2025-03-06T14:23:26.167000 CVE-2024-5889,0,0,b7da0432a39a45529584a1b2f747e31f7e73bfff06d966025659d00202e054f6,2024-11-21T09:48:31.583000 CVE-2024-5890,0,0,50a5a9d6ce6b94fe3e5714721a54c52cb0baf0048b9af07fdeef8cdcefb5efd7,2024-12-02T19:15:12.357000 CVE-2024-5891,0,0,ae9d57cc1702609e0862660090fa56b838e4604ff46aac9331af1fa5a8086c71,2024-11-21T09:48:31.703000 @@ -277579,7 +277606,7 @@ CVE-2024-7145,0,0,073fb8bd11ab6d990bf0288270f3cedbc70b03e2b8ff14d66dd5aab6d49885 CVE-2024-7146,0,0,8f6ca05a9fea983190c8addbeaa39313a66f259ac7953d365b6f9189d7b6dba6,2024-08-19T13:00:23.117000 CVE-2024-7147,0,0,94abc8269d5a4f00fc784c28fd49cb9b2fbe37ba41a15dd2c74e76e3a1853b87,2024-08-19T13:00:23.117000 CVE-2024-7149,0,0,c86cfa919d57d34d7626da5ae14ef34b0edf743fc6f1819ce7d81f44917bfb16,2024-10-04T18:23:09.863000 -CVE-2024-7150,0,0,4e21cdaf42a02514eae40da20de62c4241107747abee1176771dac5f93e8a5b0,2024-08-08T13:04:18.753000 +CVE-2024-7150,0,1,826b1f3434ee584fd91b81b0b0a1a657ee613a55b9e843861dedac81c273e91a,2025-03-06T16:24:25.053000 CVE-2024-7151,0,0,a39066a22f3ca2691a8f1f3869bdd777155eb7d16b87d37d779f96c76e45afc0,2024-11-21T09:50:56.890000 CVE-2024-7152,0,0,2c79e5cedce115553f9a68c452426c0aa90911e85b8a061e8e743b0ba30283de,2024-11-21T09:50:57.067000 CVE-2024-7153,0,0,f685cba3a1683f23a92455bb0f61b078efcb65f29dfc887aab4fbaaf76350a76,2024-11-21T09:50:57.230000 @@ -278699,7 +278726,7 @@ CVE-2024-8415,0,0,a3f2afcdb21ce0b2fec98fcdaaedb1ab2896ee674056c7b38a39175cf31ca9 CVE-2024-8416,0,0,ed361759131ec3ab2e5148127fe9616f5a5b0a2edff3c1fd1a11d8ddfbdb5947,2024-09-06T16:38:44.053000 CVE-2024-8417,0,0,4eb083c52357c79e9c6a91150d505026d09535b3fb55042da1248e6dd7a6adbb,2024-11-21T09:53:11.207000 CVE-2024-8418,0,0,13014cb10bf2076fdd98d7e7307a7de55e2e6a5c70285579360946d216816d18,2024-09-17T20:15:06.710000 -CVE-2024-8420,0,0,ea5022a359dce7e54c310a8e4a463f6170d2c6e2d53163c491680ffcf3cf05d2,2025-02-28T09:15:10.910000 +CVE-2024-8420,0,1,e5b34eba9759f64190d5368c0038dd88344afb756085f618381e7952d1be6f07,2025-03-06T16:36:34.470000 CVE-2024-8421,0,0,6800675b8d580f62fefe249f14070dd1be7b0d76f26f1a650e36706f5d41a8e4,2024-10-30T22:15:03.503000 CVE-2024-8422,0,0,595c3a4c4569e5d22b76db5956453d2a1a1a701b00065efde8acf9a79c387cf0,2024-10-16T18:00:10.507000 CVE-2024-8424,0,0,70e0efba1b7474fd71ae798ee933fd249d2e6d2cb69d7469e257caaac30ab429,2024-11-08T19:01:03.880000 @@ -280529,7 +280556,7 @@ CVE-2025-0843,0,0,350d60ad76c1f5c9df007c9b8ac9d858c4b3349609463c740dca46afb5143f CVE-2025-0844,0,0,071e9d4f5de1eed9b63c09ffd0ea19a371d7cff2071b2b278c26d7f50a60a457,2025-02-04T17:17:18.457000 CVE-2025-0846,0,0,2f157ad7524f9611de30718adef5bf4f9523f0c2e3fd3595be8e6b55eaf2b5c7,2025-02-04T16:49:08.027000 CVE-2025-0847,0,0,ea927878808932b75502c7906c4cc6399e2fb275f98c51b7493b1bd399022943,2025-02-04T16:36:19.400000 -CVE-2025-0848,0,1,ca6d630f71f0e762dfc43d0d857c8db3999e805cb355c08f22ff4610c1a9e475,2025-03-06T13:30:34.893000 +CVE-2025-0848,0,0,ca6d630f71f0e762dfc43d0d857c8db3999e805cb355c08f22ff4610c1a9e475,2025-03-06T13:30:34.893000 CVE-2025-0849,0,0,c1571bb2b5b492c6f92204c6e608b11f867312e7feddc38eeea3bee1b20e34e6,2025-02-04T16:27:36.197000 CVE-2025-0851,0,0,62423acde853af0a12a4aec10e4529f32bf957e75f81daf2b9cb54a67a3c55a5,2025-01-29T22:15:30.463000 CVE-2025-0858,0,0,f891231954c92d22a87eae2f502f820f9d12773d9f7834eea219f8626f292204,2025-02-05T15:15:21.580000 @@ -280548,7 +280575,7 @@ CVE-2025-0871,0,0,a9db8232db94718d41bf6e96d50fc960e1fc11044b43405a9641244f217c6b CVE-2025-0872,0,0,e07508ceef8393fa75d891955449dc691af8810cd495d3336262099110723cda,2025-02-07T14:07:40.797000 CVE-2025-0873,0,0,5aa4d6fb1c3a8eb595c4da8c3d69b8728e6fd89d36901ed8245170c7f8b81c38,2025-02-07T14:05:17.653000 CVE-2025-0874,0,0,125dbc60ce30bbccf3019f6512261a2e3942682e065309657be2653037ecf35f,2025-02-21T21:36:58.723000 -CVE-2025-0877,1,1,9abd91ef8daaee0e2c940a8a18ca67cbbbc22c8da6225fc8641235a410cbacf7,2025-03-06T14:15:36.107000 +CVE-2025-0877,0,0,9abd91ef8daaee0e2c940a8a18ca67cbbbc22c8da6225fc8641235a410cbacf7,2025-03-06T14:15:36.107000 CVE-2025-0880,0,0,77e515b74976a5dc3eae29ea5053c11b5ba4746b76e1c02c2445f07f8eff78da,2025-02-25T19:20:49.193000 CVE-2025-0881,0,0,db910fe9bbcd2f0479a83598ac8b27c8e73be02c1af8fa69430d4bd0072a10a7,2025-01-30T22:15:09.950000 CVE-2025-0882,0,0,5c1edbc7dbbc3f98ebcedbafebdf2aeff716655934824b3ca1dcdd38b6a04fd3,2025-02-25T19:08:48.593000 @@ -280809,7 +280836,7 @@ CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b CVE-2025-1306,0,0,1ee42c9c738fb719918d183e21eaf97d7c5ffad4c1efdf287d4d8d62c7af94e4,2025-03-05T16:39:32.083000 CVE-2025-1307,0,0,772431524fea13dc6d4f62c6ce6ee7e302de8db818ceb219340d02b934bfb44b,2025-03-04T05:15:14.233000 CVE-2025-1316,0,0,f932f98d5a32b1e0c223e88762610c5952375892982b9e178aa7ca013cbd0ec3,2025-03-05T00:15:35.057000 -CVE-2025-1319,0,0,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000 +CVE-2025-1319,0,1,33bda93fd3980ba7b6a91272d6a6ae7036010f8fa7bdd3f4dc099ca7b24e3ab8,2025-03-06T15:00:16.447000 CVE-2025-1321,0,0,fe193fa44353594440aac216be48f78f1d1914788baa79c358bb03fb8eb369f9,2025-03-04T04:15:11.547000 CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000 CVE-2025-1332,0,0,04253da72e8edd91cac77b4f2ad8533b669f4d496d09ec3f2573f85295be125b,2025-02-16T01:15:20.440000 @@ -280909,9 +280936,9 @@ CVE-2025-1553,0,0,d96596568d35a79921cd22eb566581d3e14afd9146a9b30f63868f25354407 CVE-2025-1555,0,0,cf4f7ec4c7f22b94f8768d59c9ac2dc8d623655b78ea6887e44ed58b3a34f68a,2025-02-24T15:15:12.810000 CVE-2025-1556,0,0,49cf967daea174b937b57c499bcc0c58b27409b32832009c453b7af5b3d38409,2025-02-22T13:15:12.010000 CVE-2025-1557,0,0,3e42539e3278629613c7b2eda2c607604ec0199542e2ce94bd1310750af51221,2025-02-22T13:15:12.247000 -CVE-2025-1560,0,0,94ea0392f231db4bf68a65aff70aa4324f399504541076f334dc955e4571374b,2025-02-28T09:15:12.040000 +CVE-2025-1560,0,1,ba11227614899d3056761ea4c890190d97fc89170a767994ef7607faca65ce17,2025-03-06T15:00:16.447000 CVE-2025-1564,0,0,645d5d3c72d90d98c848dad749bda526f296bef655490c72ec6d985301cb81b4,2025-03-01T08:15:34.007000 -CVE-2025-1570,0,0,b46b74003a884bfde248d1f55d464c09d2edda3a9f89316fe0cc50da512e923b,2025-02-28T09:15:12.203000 +CVE-2025-1570,0,1,9c53718a1eed240e02a569965a467342bf3a80fb8b884074af55a034defd9df2,2025-03-06T15:00:16.447000 CVE-2025-1571,0,0,2ff9d1871ce4b294af235897d1f180d1853e1f37cf780d6e8da053f8773e82c8,2025-02-28T07:15:34.227000 CVE-2025-1572,0,0,1320b2f727383676da6c73261af1868478cf6dd12bf50e5bdd5ba7a431e21124,2025-02-28T08:15:35.810000 CVE-2025-1575,0,0,295612ec0ffb6cc1f5a98b01cca7e60e463451cd2e098b1e5038c15250f15467,2025-02-23T04:15:24.980000 @@ -280965,7 +280992,7 @@ CVE-2025-1644,0,0,11dc7631b000d67798bd397f7a51f560854b084da5ab0dd69b1cdb2c0ab76f CVE-2025-1645,0,0,04ec87d98beb60cc953f9d19acf54f139fb80161a3db0460324c4b28ab5996d3,2025-02-25T02:15:16.123000 CVE-2025-1646,0,0,82269c59d8fff978173814c505cbeb09d268e21305971283c38395c7897fc304,2025-02-25T14:15:31.320000 CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000 -CVE-2025-1662,0,0,65cfd856306d889617e3038fc6a8c795bc27be9c444f1a9c5df3c4ffdd828a0f,2025-02-28T09:15:12.373000 +CVE-2025-1662,0,1,f747ba4edfe81f2cc6bd228a54a69ac8ef31e80bbf16aa2517aaed153638e887,2025-03-06T15:00:16.447000 CVE-2025-1666,0,0,ea2a7fe153b3bd999a528b5a5c12f9cc09134d2f6112f43b8b3a66a17753fd12,2025-03-06T12:15:36.117000 CVE-2025-1671,0,0,dfe1ff393d446d4a55c0e76e273c07a93a52c6ac6df15c5814731fbc40a9a1ea,2025-03-01T08:15:34.320000 CVE-2025-1672,0,0,7a20675a12af4d2fa4d4625b3c2a44c55632de2b78981cd05f1c08d4059e6b7d,2025-03-06T10:15:11.897000 @@ -281142,7 +281169,7 @@ CVE-2025-1965,0,0,72705674a561d6056f4e54dfd5d2fda7d9f6e486812e38d2b199633b788552 CVE-2025-1966,0,0,6ccd782fa14c79bfb085da504344a1de6f9901dce1ffefcf87ba1c9f56a60487,2025-03-05T15:15:17.260000 CVE-2025-1967,0,0,42e655fe49f6762d0d9e1e0fe0e87e8caffe391f86ae92c278c36c149b534595,2025-03-05T15:15:17.410000 CVE-2025-1969,0,0,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000 -CVE-2025-1979,0,0,ab6ebd8432729f4d1f89f60a1b5f33ac4641f195a8abf7cc03358d6bf3593a07,2025-03-06T05:15:16.213000 +CVE-2025-1979,0,1,019eff2dd7a8f2f66ae0ab75abcd57bcffb91213915f9f59c4cd22328ef04c34,2025-03-06T16:15:54.187000 CVE-2025-20002,0,0,2bccd9ef008596859abc4b0349462cb16836a7cb045dcda2e77e2e2faea7a70c,2025-03-05T00:15:37.910000 CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000 CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000 @@ -281207,7 +281234,10 @@ CVE-2025-20206,0,0,8f347189fdbb6b6be2d99d03467464262d7ee95d567831fc25e6871bb3686 CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000 CVE-2025-20208,0,0,1dec4a67abad93b4e30bff99a42e85d57a7d0f10ed0df9df2a04fceabe83cdcb,2025-03-05T17:15:14.610000 CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000 -CVE-2025-2045,1,1,5f954a149cde3c0670007c2686ef3ff487d6b9cfe276e63999bff89b33566b76,2025-03-06T13:15:12.553000 +CVE-2025-2029,1,1,93023c22912987564123e39309d24758527c12f0e9ccb8c0c3ff604f1965ea96,2025-03-06T15:15:17.943000 +CVE-2025-2030,1,1,45c9009752edf05edc8391d031a81451ba0bee5f88f8e7315cd270279d6ba239,2025-03-06T16:15:55.593000 +CVE-2025-2031,1,1,cb856a144a364b791dd0b09a5ac0e0bef2d2dbf1de9f7793206b24aca3365494,2025-03-06T16:15:55.727000 +CVE-2025-2045,0,0,5f954a149cde3c0670007c2686ef3ff487d6b9cfe276e63999bff89b33566b76,2025-03-06T13:15:12.553000 CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8805,2025-02-13T22:15:11.590000 CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 @@ -281871,9 +281901,13 @@ CVE-2025-21821,0,0,fd6efc5d1ffad2a00aa09e345a704277d9daeb9e6fddc1a42c293b6132b6a CVE-2025-21822,0,0,20ef27da51fd71ed1bc2f3085ac0746fabc8aa34de630fd5cf985e239376c55c,2025-02-27T20:16:04.707000 CVE-2025-21823,0,0,3efea7bac95b4dbad864718b239ff2d7650371b6562540e3b6bd50e2065204cc,2025-02-27T20:16:04.793000 CVE-2025-21824,0,0,33d9372ff5aeb8119ad7223eccd8dac7a53a751809ee1b0f1514d0ff91718cbe,2025-03-05T14:05:15.387000 +CVE-2025-21825,1,1,8870dfd89a416f2d4819ebc7dda8e31caac49b07c149c21ec32a3a7d987beda7,2025-03-06T16:15:54.753000 +CVE-2025-21826,1,1,d8d55921ef1e36df7091e5de134407839b84b0822bba50536183d3f97f7ce0cf,2025-03-06T16:15:54.863000 +CVE-2025-21827,1,1,798ad67445b56cee9d7e2654d461c72d1706e81ca338689a6a6b575e66e62661,2025-03-06T16:15:54.967000 +CVE-2025-21828,1,1,1d423c38cfc3b27519324f42fcfede2fa1caf4961cb465a838aa6e06d0f9b7b8,2025-03-06T16:15:55.070000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 -CVE-2025-22131,0,1,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000 +CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000 CVE-2025-22132,0,0,8f2a17f80eb849275738cca93335a0536605ff289b1fa4e5b349c43fa2cad954,2025-02-13T18:55:14.053000 CVE-2025-22133,0,0,32df1a7a06703aea1606771b300b1836f84903a2a4b183527a9471791c589465,2025-01-08T15:15:21.727000 CVE-2025-22134,0,0,3c2fd591225b705584c74bda8da9b9be07bc4fac46ac5a8cbc29997594d0c4cf,2025-01-13T21:15:14.333000 @@ -283692,7 +283726,7 @@ CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6 CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000 CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000 CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000 -CVE-2025-25362,0,0,5c20b711ac79c6c4af2730be6aa1167252eca84ac8131f5fab860a3a20cb8bc1,2025-03-05T21:15:19.803000 +CVE-2025-25362,0,1,42d98817ecbf18ddccabd4b792aadf3e08587d530c768960c95c682806a1813b,2025-03-06T15:15:17.277000 CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000 CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000 @@ -283702,6 +283736,9 @@ CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0ed CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000 CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 CVE-2025-25431,0,0,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000 +CVE-2025-25450,1,1,aa4833b6644c3dd5960a0ce2b32c1809568594c111878547965e7753c3a3e64d,2025-03-06T15:15:17.443000 +CVE-2025-25451,1,1,9a00d9588ff78fdad113f032ac06c8c05ea1e58a9277ce3535667ac0c4e0fc27,2025-03-06T15:15:17.553000 +CVE-2025-25452,1,1,7cbb267f940e24fd6826e8276f8a69f8095a90b9586be4c674267b8cf033d3b6,2025-03-06T15:15:17.667000 CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000 CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000 CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000 @@ -283741,7 +283778,7 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 -CVE-2025-25632,0,0,2837e6eed05a75825d3a0a65aeefc087cd911ab22aba5f61b34c77158f2cb8fb,2025-03-05T21:15:19.890000 +CVE-2025-25632,0,1,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,ba7c6e4c7202e5cc51c3a3e35603315845cc8c4c900719372b556ce21832c21b,2025-03-05T21:15:19.980000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000