diff --git a/CVE-2022/CVE-2022-32xx/CVE-2022-3248.json b/CVE-2022/CVE-2022-32xx/CVE-2022-3248.json index 049e29e7c9f..122edbfb662 100644 --- a/CVE-2022/CVE-2022-32xx/CVE-2022-3248.json +++ b/CVE-2022/CVE-2022-32xx/CVE-2022-3248.json @@ -2,12 +2,16 @@ "id": "CVE-2022-3248", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-05T14:15:09.650", - "lastModified": "2023-10-05T14:15:09.650", - "vulnStatus": "Received", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenShift API, as admission checks do not enforce \"custom-host\" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en la API de OpenShift, ya que las comprobaciones de admisi\u00f3n no aplican permisos de \"custom-host\". Este problema podr\u00eda permitir que un atacante viole los l\u00edmites, ya que no se aplicar\u00e1n los permisos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4132.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4132.json index 34cfc7ac8ec..032ee14fd4a 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4132.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4132.json @@ -2,16 +2,40 @@ "id": "CVE-2022-4132", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-04T12:15:10.230", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:03:54.320", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page)." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en JSS. Una p\u00e9rdida de memoria en JSS requiere una configuraci\u00f3n no est\u00e1ndar, pero es un vector DoS de bajo esfuerzo si se configura de esa manera (presionando repetidamente la p\u00e1gina de inicio de sesi\u00f3n)." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,14 +58,71 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dogtagpki:network_security_services_for_java:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5.0", + "matchCriteriaId": "BAAADD35-9518-4DFC-A486-09B52EE860E1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2022-4132", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147372", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4145.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4145.json index 111ae053a2c..1407274785a 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4145.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4145.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4145", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-05T13:15:09.543", - "lastModified": "2023-10-05T13:15:09.543", - "vulnStatus": "Received", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json index 8127890d181..861bf7c7c86 100644 --- a/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json +++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20109.json @@ -2,16 +2,40 @@ "id": "CVE-2023-20109", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-09-27T18:15:10.860", - "lastModified": "2023-09-27T18:31:27.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:39:30.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash.\r\n\r This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details [\"#details\"] section of this advisory." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la funci\u00f3n Cisco Group Encrypted Transport VPN (GET VPN) del software Cisco IOS y del software Cisco IOS XE podr\u00eda permitir que un atacante remoto autenticado que tiene control administrativo de un miembro del grupo o de un servidor de claves ejecute c\u00f3digo arbitrario en un dispositivo afectado o haga que el dispositivo se bloquee. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los atributos en los protocolos de dominio de interpretaci\u00f3n de grupo (GDOI) y G-IKEv2 de la funci\u00f3n GET VPN. Un atacante podr\u00eda aprovechar esta vulnerabilidad comprometiendo un servidor de claves instalado o modificando la configuraci\u00f3n de un miembro del grupo para que apunte a un servidor de claves controlado por el atacante. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario y obtener control total del sistema afectado o hacer que el sistema afectado se recargue, lo que resultar\u00eda en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para obtener m\u00e1s informaci\u00f3n, consulte la secci\u00f3n Detalles [\"#details\"] de este aviso." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -34,10 +58,5247 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)md:*:*:*:*:*:*:*", + "matchCriteriaId": "498A43E2-5A03-46C9-B60D-8E7CE79F1705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)md1:*:*:*:*:*:*:*", + "matchCriteriaId": "B003515C-B9DD-40D7-9F7E-97AE5FDC984F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)md2:*:*:*:*:*:*:*", + "matchCriteriaId": "D83AF6ED-1704-48B4-B5E4-E32CF0DF07FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda:*:*:*:*:*:*:*", + "matchCriteriaId": "6EB30791-A691-42DD-8714-B173242EDBBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda1:*:*:*:*:*:*:*", + "matchCriteriaId": "E61B059C-5457-42D2-BE37-559B36E7865B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda2:*:*:*:*:*:*:*", + "matchCriteriaId": "50B87F96-2F12-43C4-BABE-13C864838E5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda3:*:*:*:*:*:*:*", + "matchCriteriaId": "A8FCAE0E-F871-4F65-82F2-4690D345298B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda4:*:*:*:*:*:*:*", + "matchCriteriaId": "72F162DF-8131-40A6-BC47-0A71CDD96D49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda5:*:*:*:*:*:*:*", + "matchCriteriaId": "9D982FA3-6473-46A7-8F16-17D7FCE33551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda6:*:*:*:*:*:*:*", + "matchCriteriaId": "37B94C23-763C-4249-AE16-97D17124F5B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "2BD17B45-17BC-43BD-A180-AACEE0888D24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "039F72C1-FCA3-4403-90A0-C4B507D9A85C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "2B83D2BE-762D-4D74-B9C4-BF765DCF31B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "874F3BFC-CC93-42C6-A168-ED554AB1713C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "4479287A-64FD-40A3-8C92-2C52FD902F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t5:*:*:*:*:*:*:*", + "matchCriteriaId": "4C3D5843-A77C-42AB-9A3F-F8F18E2854C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr1:*:*:*:*:*:*:*", + "matchCriteriaId": "8A422DC5-DBED-447C-8E1F-BE75B70EF677" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr2:*:*:*:*:*:*:*", + "matchCriteriaId": "E7837CF7-9CAD-4650-901F-587E3F2F5694" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr3:*:*:*:*:*:*:*", + "matchCriteriaId": "905571F1-D7E7-4266-9DEB-AD45C4EFDA82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr4:*:*:*:*:*:*:*", + "matchCriteriaId": "68DD52B2-811C-4599-8DAF-B990BF6F4135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr5:*:*:*:*:*:*:*", + "matchCriteriaId": "BA7F96A8-8F7B-417F-93E0-9780E9199A19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr6:*:*:*:*:*:*:*", + "matchCriteriaId": "6354ECE9-4B45-4998-BEA9-4F1740FD3759" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr7:*:*:*:*:*:*:*", + "matchCriteriaId": "2FFD59CA-9FB4-4C63-B776-719DCDAC5B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr8:*:*:*:*:*:*:*", + "matchCriteriaId": "AC0E49AF-FEF7-4749-A648-AB2D3F784F37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr9:*:*:*:*:*:*:*", + "matchCriteriaId": "13E6F41A-6C48-415D-8CD2-C73421693158" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr10:*:*:*:*:*:*:*", + "matchCriteriaId": "F136F045-6B90-4E37-9CDF-D84050DD175E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr11:*:*:*:*:*:*:*", + "matchCriteriaId": "AFCCCF8A-ADDE-4E67-B9A1-DEBE6C5E4687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr12:*:*:*:*:*:*:*", + "matchCriteriaId": "63B3E0D4-B335-4597-A482-F60A2C7BF90E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md:*:*:*:*:*:*:*", + "matchCriteriaId": "539454C8-EA90-4146-9429-72465CF555FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md1:*:*:*:*:*:*:*", + "matchCriteriaId": "4E44F5F4-D7FE-4B9C-BA65-2365EF7A8092" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md2:*:*:*:*:*:*:*", + "matchCriteriaId": "9548BCBF-0E01-41F8-A6BA-D70032340C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md3:*:*:*:*:*:*:*", + "matchCriteriaId": "B9BF1BB8-EAB1-46C9-BD36-73E502619C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md4:*:*:*:*:*:*:*", + "matchCriteriaId": "34F23388-1B0B-4708-85F4-5A8B7359C1B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md5:*:*:*:*:*:*:*", + "matchCriteriaId": "F6728EA8-00AC-4BE1-AA48-22D8AA861532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md6:*:*:*:*:*:*:*", + "matchCriteriaId": "10090F0A-645B-451E-ABAA-57DCA9C081E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md7:*:*:*:*:*:*:*", + "matchCriteriaId": "B87BBFE8-2D55-4CDF-B624-6B509411945B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda1:*:*:*:*:*:*:*", + "matchCriteriaId": "CD74F179-FDAB-465D-80D5-65711B34D12C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda2:*:*:*:*:*:*:*", + "matchCriteriaId": "94615285-655F-436B-A967-D8FFCF4B7794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda3:*:*:*:*:*:*:*", + "matchCriteriaId": "491BFBBE-1B48-4F58-96BA-E0B065DF2BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda4:*:*:*:*:*:*:*", + "matchCriteriaId": "59F2AFD4-D5D6-4D4F-9085-6869738B56B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda5:*:*:*:*:*:*:*", + "matchCriteriaId": "D794DE0F-12BF-421E-8E5A-A505501EA0F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda6:*:*:*:*:*:*:*", + "matchCriteriaId": "EF65A6E8-8D58-4537-8AE6-DE4A72FF3A58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda7:*:*:*:*:*:*:*", + "matchCriteriaId": "9622A8CF-0C0A-4CED-B469-CAA868970323" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda8:*:*:*:*:*:*:*", + "matchCriteriaId": "A9746F30-F1AD-4643-8BAD-6FD049B7536F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda9:*:*:*:*:*:*:*", + "matchCriteriaId": "C533F5D8-9C23-4D7E-8C58-56B65AD76AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda10:*:*:*:*:*:*:*", + "matchCriteriaId": "CB531CBC-8EE0-46B0-88C5-2362837729E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda11:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4485F3-AF11-4E2D-AF01-8243D9C8A851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda12:*:*:*:*:*:*:*", + "matchCriteriaId": "F4433412-E849-4040-BAA5-1CE9CE17B924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda13:*:*:*:*:*:*:*", + "matchCriteriaId": "4E9B1DF0-A3D9-4AFD-9305-C156A8CB101C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb:*:*:*:*:*:*:*", + "matchCriteriaId": "1591B1A2-15AB-4226-B0E3-AEA84D0A7928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb1:*:*:*:*:*:*:*", + "matchCriteriaId": "B2D85C68-9A72-4C6F-89C4-CAACFAE7C76A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb3:*:*:*:*:*:*:*", + "matchCriteriaId": "B0CA4EEA-9AE8-4F5A-9FDF-A6CFA503ADF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb4:*:*:*:*:*:*:*", + "matchCriteriaId": "0532182F-A3BB-42EF-A2E5-B3B1C092335B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb5:*:*:*:*:*:*:*", + "matchCriteriaId": "DD686C04-03E3-409B-B92A-D9177924340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb5a:*:*:*:*:*:*:*", + "matchCriteriaId": "32A7C36F-FC21-4BEA-920F-9F3F9CA76C78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb6:*:*:*:*:*:*:*", + "matchCriteriaId": "74487E59-3809-4054-89CA-ED7900A793A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb7:*:*:*:*:*:*:*", + "matchCriteriaId": "B9B174D7-FE10-4416-9572-CE00FF580A5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb8:*:*:*:*:*:*:*", + "matchCriteriaId": "BE654FD0-AC27-49B7-91FD-8F15FE78E97B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb9:*:*:*:*:*:*:*", + "matchCriteriaId": "AB46CA20-CDCA-495E-A4DB-5BDB9AC5BC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb10:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C02086-1473-403B-97AF-8500104E6C96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb11:*:*:*:*:*:*:*", + "matchCriteriaId": "ED2ED2BA-9D3E-412B-86C2-2A0E9588E84D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb12:*:*:*:*:*:*:*", + "matchCriteriaId": "9AC9CBDA-AFED-45E7-91CC-8AFD887122D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb13:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA93FA2-0C10-4809-8EE3-3445DC5B1E05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb14:*:*:*:*:*:*:*", + "matchCriteriaId": "1ED0CFC4-95B0-420B-B6C2-EB953B93628F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb15:*:*:*:*:*:*:*", + "matchCriteriaId": "3E24E081-FF09-4569-B83C-C46F390CD6A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb16:*:*:*:*:*:*:*", + "matchCriteriaId": "50FB8B6D-69F6-4619-8F76-0EB92C785F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb17:*:*:*:*:*:*:*", + "matchCriteriaId": "BF02D7D8-124C-4CE8-BF32-D6C7851B3B8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb18:*:*:*:*:*:*:*", + "matchCriteriaId": "45D741B6-6599-4209-9D6C-06570FBF4B66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb19:*:*:*:*:*:*:*", + "matchCriteriaId": "CA97E52D-1053-4704-B404-B85B99F46CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "4A9C9B9C-2064-4130-95B9-5BCE4BB97789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "2A6AD6E5-EBB0-44D8-A63C-EFF7260E4CC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8B1B14-6FCA-423D-B49B-D07624DAE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "E88A1ADC-A53A-407F-80F7-A0EF5359DDAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t3e:*:*:*:*:*:*:*", + "matchCriteriaId": "775CF994-36BE-4456-99CD-1FDEA5CC9B30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t3f:*:*:*:*:*:*:*", + "matchCriteriaId": "766668CA-B5BF-4D80-811E-B2E6396AC6BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "7937F33C-95A5-4D38-B574-1B04051DC10A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4a:*:*:*:*:*:*:*", + "matchCriteriaId": "5AF7258F-C4A4-4E56-88B0-CF1536AEE9F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4b:*:*:*:*:*:*:*", + "matchCriteriaId": "605EC471-A558-4414-B691-1E852EA7EE63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4c:*:*:*:*:*:*:*", + "matchCriteriaId": "53830355-05F7-4A49-A0D9-731F43870F7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4d:*:*:*:*:*:*:*", + "matchCriteriaId": "A5ED4DEB-4DCF-4660-8D4C-059537A5B144" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4e:*:*:*:*:*:*:*", + "matchCriteriaId": "8294E41A-AE2A-4EEA-A932-45CFB294A48C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4f:*:*:*:*:*:*:*", + "matchCriteriaId": "6EC9B0EA-FDF6-49D0-8118-4F336750E473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4l:*:*:*:*:*:*:*", + "matchCriteriaId": "8CB4F895-D790-4A23-ADDF-5EFCA9B86208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t5:*:*:*:*:*:*:*", + "matchCriteriaId": "07E00079-3EB8-4FE5-A977-CF78673D7AE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t6:*:*:*:*:*:*:*", + "matchCriteriaId": "E36204F5-1257-4A08-8764-8700C4545FBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t7:*:*:*:*:*:*:*", + "matchCriteriaId": "4F288BF4-A550-4807-9C02-F6A93B8D1AAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t8:*:*:*:*:*:*:*", + "matchCriteriaId": "1B1A64DF-83BF-41CA-839F-72C7E8A9A7A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg:*:*:*:*:*:*:*", + "matchCriteriaId": "1971F3C9-8B6A-4211-94E4-441CC4A963B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg1:*:*:*:*:*:*:*", + "matchCriteriaId": "98963D57-18BE-49D2-A3FF-35E86F3AEF12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg2:*:*:*:*:*:*:*", + "matchCriteriaId": "BE1ED725-DEFC-41CC-AF37-753F506B0690" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg3:*:*:*:*:*:*:*", + "matchCriteriaId": "18CD57A0-D85C-4110-B810-4B866475B9A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg4:*:*:*:*:*:*:*", + "matchCriteriaId": "1B6789D8-C2EC-4631-9B72-B645A5C04985" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "B97701A6-F7AE-4D14-A5C1-8F7743256766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "AB788EFF-FB9E-41BC-B8FD-8EE40F657B47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "A801C7F1-7E15-4B40-A2F0-DD181F13DB3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "0A735690-4813-486E-929A-2F97F51FDEBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "A6BB6662-6683-4EA7-B2E2-984FB68977AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "5C8720B1-11DF-47E6-90C3-F0D3F77E69D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "50FA81AE-B37E-4F38-ABAD-44EF200FA5CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "3083C5E7-A17A-4744-A700-697FF50B5444" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "3E760F98-3A9B-48BE-83AD-22672B15C619" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "049F7107-B407-4F99-8688-738AF3AF4CBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "97EC3675-6213-4AA2-9C91-73A89AD7D98C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)mr:*:*:*:*:*:*:*", + "matchCriteriaId": "82608B6F-BB73-4A62-881C-636BF1BF1CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "F9B9B664-5B90-4F3A-BD6C-33F0AAC75CEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "54966D6A-5471-4685-9FCC-C3F75297F2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "A6AEE27B-B0A8-486C-8E12-D789047401B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s3a:*:*:*:*:*:*:*", + "matchCriteriaId": "A61A54FC-77F0-4BAB-8AE5-3E8D60EC14E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "57F73E68-CCD1-424E-91BC-5D30241EE797" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2E286E50-601F-4285-ABE0-B829FF9DF0EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "412B45A9-AC1C-4142-81FA-8E60FA189726" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "1F40AF3A-596C-469E-968C-9747042A70A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa:*:*:*:*:*:*:*", + "matchCriteriaId": "5350BD36-86A8-4C33-B638-EF287DA8622F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa1:*:*:*:*:*:*:*", + "matchCriteriaId": "E145F9B7-ECAF-432F-B6FB-7CB5EA97B17C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa2:*:*:*:*:*:*:*", + "matchCriteriaId": "FBC60D5E-0005-4FF6-B55E-FE344C9BC58D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa3:*:*:*:*:*:*:*", + "matchCriteriaId": "984EC0F5-F270-470C-A959-919B0B7A7B26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa4:*:*:*:*:*:*:*", + "matchCriteriaId": "57726EE6-38B3-4F1F-8DFF-0891C85395A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa5:*:*:*:*:*:*:*", + "matchCriteriaId": "017CDE22-7CC3-4EB6-9131-ABBD5F3FC0DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "C04E6B95-5FD2-4C08-BFFC-148096444DB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ea1:*:*:*:*:*:*:*", + "matchCriteriaId": "0CB4363E-49B6-4682-AEF3-6B0AB38A3932" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*", + "matchCriteriaId": "4C5D50E8-99DB-4B15-B0F2-84674A9346A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*", + "matchCriteriaId": "2A101303-CFB2-4EF9-AD68-AF6D8E1E8148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*", + "matchCriteriaId": "114E5F13-3F15-418B-A0AF-038BEABF8445" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*", + "matchCriteriaId": "694AA98F-2705-477E-B2EE-75D2CEDB263B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*", + "matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*", + "matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*", + "matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*", + "matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*", + "matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*", + "matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*", + "matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*", + "matchCriteriaId": "7D00EB0E-92D3-4C5B-B107-730B47BD6E01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*", + "matchCriteriaId": "CF7F6A52-9AA9-4441-A137-7EE3470C155C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*", + "matchCriteriaId": "92CEEA13-0B40-4203-8BAE-09374C9B1FE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*", + "matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*", + "matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*", + "matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*", + "matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*", + "matchCriteriaId": "8422A740-0029-4C05-A7FE-12F12CD73B0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)mr:*:*:*:*:*:*:*", + "matchCriteriaId": "AA091446-13F4-4D87-9E0C-2C3847056C48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*", + "matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*", + "matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*", + "matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*", + "matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*", + "matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*", + "matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*", + "matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*", + "matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*", + "matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*", + "matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*", + "matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*", + "matchCriteriaId": "343F5C35-A0C0-4747-95BA-D4044C64508B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*", + "matchCriteriaId": "713C55A8-F24D-45FE-88AA-1D1EFEC88339" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*", + "matchCriteriaId": "11F7D280-D099-495F-B860-D96F485BAF81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*", + "matchCriteriaId": "B62A7038-EBCF-4996-8795-3BF95CBDE6B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*", + "matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "C90EADDB-435F-4965-8064-E3D102139053" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "4D255E7E-037D-4926-8791-55B962AAA1E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "7F79E255-6198-4251-92C8-90A797F65DF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*", + "matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*", + "matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*", + "matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "5AD483E0-66F9-4DD1-85FA-C125C9617E10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "35C1075B-11F3-453C-957D-834C5D6D8CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "115E901C-94B4-4EC7-AA85-03A20CFA90DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "C97051EE-8C42-4546-8EDC-FAD60B3EE1EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "FB435D9A-FA6C-4CBD-8647-3A61B3DAB338" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "14181F4B-9A5C-40B4-BD15-FED694E9AE8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "B62E402E-5D8B-4261-906C-C5668B4A12BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "85017D3F-5CEF-48BA-847E-7DCB39AC7636" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4DD419-4BA3-4E3F-935C-2A6C9C71BD5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "277D20C6-DAD1-455F-91E8-E5E091C1E7D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "2B33D730-0E80-46AF-8B53-FCEFF457EBAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "BF2D383F-F5A1-4BF6-9334-356E3CEEE897" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t5:*:*:*:*:*:*:*", + "matchCriteriaId": "E3AE0230-D1A0-4A9E-A0A3-037C7977D450" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)xb:*:*:*:*:*:*:*", + "matchCriteriaId": "F7ACB559-F6D1-49B9-A76F-7DCAC88F802B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "3CF70487-4E51-4570-927B-1B74D73E9D58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "242A4DC2-C9C7-4ACB-99F0-317959B0CA2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "ED4ECF5C-1B91-4B54-BAB4-2DF17A1BBF56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "241590D8-0230-4504-BD8D-815C8BC1F0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF1AB59-AC63-49AC-9A5B-8D8987A9E3F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB7A4D4-ADF6-4845-8B5E-A432BF52F0D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*", + "matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*", + "matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*", + "matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*", + "matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*", + "matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*", + "matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*", + "matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "07DCF559-9324-4CE1-A986-EF4A174DCEFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "38CC9728-4E4A-4536-BC81-031AFE1A74E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "F9DECC49-1DF8-4925-9232-04DA748428B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "B736A1E0-89F4-418C-BC12-7E6A7AC7891F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "2BDC0B5A-E59C-454E-AA0E-6EB9C8888480" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2363876E-0E3B-44BA-8157-FA96554302B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D3131A-74F7-4465-826E-5F6C90240C4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "2E0D1E17-9A5C-4B74-B780-F31364FD9F06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "F70ADF53-D937-4CB1-8D17-8B4DB9A5458C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "8B0F30A4-C088-4ECC-ABE0-33D4A7BC8D1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*", + "matchCriteriaId": "73B11B78-1936-42CA-919E-BCD1E0C2A397" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*", + "matchCriteriaId": "A807560F-7111-40AB-BCC8-F3D7A2F92D2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy11:*:*:*:*:*:*:*", + "matchCriteriaId": "AEE56D89-5894-49E9-BDCF-E23AE4159989" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy12:*:*:*:*:*:*:*", + "matchCriteriaId": "EC9347AF-7729-44BD-8E33-610D573C560F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy13:*:*:*:*:*:*:*", + "matchCriteriaId": "14DC014A-2CDD-4294-8AEB-9C0B437C1633" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy14:*:*:*:*:*:*:*", + "matchCriteriaId": "B9AB472D-2158-44DC-A627-8C4D52F476A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*", + "matchCriteriaId": "ACE1712A-1A44-4BD1-B114-318D4EC4977A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy16:*:*:*:*:*:*:*", + "matchCriteriaId": "AC27EED6-7F43-422F-8E61-CDD4E9EDC719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "5D14775C-95F5-4507-9837-CA818489CF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t0a:*:*:*:*:*:*:*", + "matchCriteriaId": "A9895119-8DE1-4D27-A5B6-5FFA46A9B8C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "43CDBE37-FFAF-4EB1-834B-6972D16FA222" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "FFC3E04D-52F8-4C36-9B6C-086FD3BFFD2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t2a:*:*:*:*:*:*:*", + "matchCriteriaId": "B6FE3400-AF89-4A5F-AFF5-3521B1CC1AA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "014EEE0B-4158-49F1-B2B1-692FF481991F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "5A3D239A-CB65-46BA-8048-73439B8DA3E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t5:*:*:*:*:*:*:*", + "matchCriteriaId": "E2A3D04B-CA03-4CAF-8AE6-44B89DDAA104" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra:*:*:*:*:*:*:*", + "matchCriteriaId": "A476A597-31B0-4793-A7DA-174F453691D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra1:*:*:*:*:*:*:*", + "matchCriteriaId": "A48DC394-BBFC-441B-A50C-126AAC0698CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra2:*:*:*:*:*:*:*", + "matchCriteriaId": "944D5FAB-0DE1-4B77-906F-BBD661C316F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*", + "matchCriteriaId": "C71593C6-B365-47D2-958D-A99FFB64101A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra4:*:*:*:*:*:*:*", + "matchCriteriaId": "921D7302-58F2-4033-B3AF-1214F0CE7E4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "A744D47A-1D42-4A98-8120-F1DFC5FD60C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s0a:*:*:*:*:*:*:*", + "matchCriteriaId": "80003271-E86E-48B3-9D06-1484414116C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "A2B70AC2-A5D6-48C2-AA0E-6B2C9B526264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "0ABF43C0-7BAC-4EF6-9772-B5E59656C758" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "8EE3AD11-6E9B-43B2-96E0-14D80F4AF25F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "ADA33681-4F59-4F5C-ADEB-7AD7776427D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "83F0C310-0851-4E83-B893-FD4FF1DE2E66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s5a:*:*:*:*:*:*:*", + "matchCriteriaId": "606E2317-C625-4CDF-BF03-BCA49E7659B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "6D2A3707-FF8D-4A5B-B0C5-5609ECD229F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svb1:*:*:*:*:*:*:*", + "matchCriteriaId": "236945F9-7939-41FA-AC58-7C1A7B9ECADB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svb2:*:*:*:*:*:*:*", + "matchCriteriaId": "534521D7-A868-4910-AB0F-A1FEAB9F9F6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svd:*:*:*:*:*:*:*", + "matchCriteriaId": "982B65F8-F39E-408D-8AAF-7B571B9E3273" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svd1:*:*:*:*:*:*:*", + "matchCriteriaId": "FA539082-8C02-4010-8C83-B75F96539253" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svd2:*:*:*:*:*:*:*", + "matchCriteriaId": "9691730D-2319-40EC-AD31-DDADA8FBBDC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)sve:*:*:*:*:*:*:*", + "matchCriteriaId": "F8189A0E-4521-472D-910C-1675187C9998" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svf:*:*:*:*:*:*:*", + "matchCriteriaId": "C6B660F2-9644-4525-9363-01AAAE75E03A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svf1:*:*:*:*:*:*:*", + "matchCriteriaId": "FD3D154B-5DF4-45CC-B557-A2125E8979BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svg:*:*:*:*:*:*:*", + "matchCriteriaId": "A87F13E5-D1FA-4DB2-B68F-E036C23FF34F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svj2:*:*:*:*:*:*:*", + "matchCriteriaId": "DABF43E8-71EE-496F-8850-C817E89B9D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "855B1020-7FB6-46D1-ABAF-5618590CF329" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DDD05CF-2C4D-484D-AEB0-C5C28F432A7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "485923CB-D5BD-400D-8324-3FA94D11C4C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "A99DA1B7-18E9-43CF-BD77-050B971D75FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "75634752-042C-4E27-972E-E0D5DCD38BE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "1CD00484-39D2-4CD5-ABEA-3C5AD9977BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "5AAD9B95-0D54-49CA-824D-68175D6B4A8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "B082C941-CE02-440F-8DD7-87873504B964" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "8DEBAA67-9C88-48CE-88F7-4B5463B87B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "2B71E784-53C0-46AE-AB6E-9B4CB5FAFFFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "6777AC09-8BA9-4595-89C2-1EAD0310B78B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "C4334D40-9B30-483E-9154-E0956D8849A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "F14897FA-0E55-425C-9048-5987A0A6CE17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C4BCB9-8FE1-4B69-8245-F0F2955CAA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "112C4EA9-2FB4-4C2F-B550-036FCC289DFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "B770E747-517E-42FE-9197-8E654F294B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "B59D6811-BF02-436B-808A-DF21682561CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "7BE752C6-250E-47CE-93EA-536958874386" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "71B3103F-9381-40A5-A7BD-D1251B3EA5A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "B990E413-C863-4613-803F-1E492982C70C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "7CBD931B-9D7F-452A-A567-60ED7EA1D2B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*", + "matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "98EB6A3F-DDAB-4FC6-A857-6E106E815505" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "7741D6E0-2507-44D9-8476-AE11DADEC611" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "0318BB57-8001-4F2A-954C-AD8DB2A94356" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "4BF56A5C-3370-4F64-9F2D-F003B8536CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "78159F0B-2553-41F7-9ABA-38065EB5B23E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "46DC8876-9FC4-451A-996F-71F2B1C35781" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE57C85-794E-405B-841F-A806D32C08EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*", + "matchCriteriaId": "7B91687C-A8F8-45FB-BF03-8534E9230AB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "E082DB05-253F-4C6F-BD0A-524699309D10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B43D4858-AE1C-4372-97F9-5983EEE6ED4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "9678A6F2-0624-4A8A-9991-9DADCDDB2687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "D9F6D655-D3A3-4BEE-9DEF-19ADD41D1663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "8AC0B809-72AD-413F-BE84-73FE2DB33950" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "5F2834B6-AA9D-4FDC-A228-CED66C799849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "B3426024-7199-4B7B-90CB-CE83FD2E0878" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "BF163F6F-1A6D-4AA9-AAC2-52249BB28421" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "CD250CC8-B26A-424E-A737-97F2A7E7C4CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", + "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", + "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*", + "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*", + "matchCriteriaId": "10438F4B-281D-4C2F-B4C3-DC3D47B0033A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*", + "matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*", + "matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*", + "matchCriteriaId": "F7316ED4-FABD-49E0-AA21-394D327435F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*", + "matchCriteriaId": "24A56EF3-4E88-4220-846A-A9BE1E496311" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*", + "matchCriteriaId": "DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "C89D14BC-1718-4AE9-B107-1709C2CE965E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "DC422D76-8337-41F0-98AE-E5D85DF4D0DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0a:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB76F47-8723-4888-8613-AC3273BAB758" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0c:*:*:*:*:*:*:*", + "matchCriteriaId": "13CC5862-F8D0-4184-A29B-AE627680D0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D1CCA5C4-3683-46C9-801B-683E194DDA8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "27D4C7E2-F1F1-43BF-A53E-2A8FF408F4A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "B05373F4-E820-4D22-A86A-904854F04C7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "4C38969D-65EB-4C80-BB2A-A1245C4E718B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "A429CFF2-A288-4CD5-9C06-8D18647C67E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "AB3A9655-9E22-4AEA-BBCF-6C0749D0289E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "D80852CE-8D91-4E85-A97F-C7A9AF5278CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "AF777880-43BF-4D4A-9BA1-B2E925B5DE11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*", + "matchCriteriaId": "B5BDAB63-EA0E-486D-B146-7E0060F70066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*", + "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*", + "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*", + "matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10e:*:*:*:*:*:*:*", + "matchCriteriaId": "CD7EF09E-2D74-4B05-B36E-263E35448FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*", + "matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*", + "matchCriteriaId": "FD5BD905-75C3-47AE-8D19-6225BD808B37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*", + "matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*", + "matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*", + "matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*", + "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*", + "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*", + "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*", + "matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", + "matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", + "matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "E3714E18-9A21-4D04-BB5E-0299AF443E2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "F6FE61C7-3B61-4085-AD91-137459DA29D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "71080D8B-BC81-4CDF-8626-D0F35DA40AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*", + "matchCriteriaId": "CF10596D-457A-4DA8-8037-5E92E1D39232" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "A37D2CBE-2B93-45CB-AB59-AFDF14277E4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "E2911989-D074-42DF-AB58-6849B3E0B72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "34299D29-96EC-4AAA-8137-49B292FC2D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "5092DFCF-FEE9-4BE3-9116-01F3CBCE8A42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "7BCBDFC3-13C3-45D3-80C9-E533082FAF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "B213D7CC-AD3D-4241-AF59-5B4CFC9BA930" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "6E88FA32-5EBE-44BA-979B-60FE8340E8C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CE0E6F-A277-48BE-8F1D-BCA48C57666C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "96FDDD94-40C9-47F0-9D43-0C0267F439C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "4E77BE16-C28C-43C2-B2CC-5AC4F33F7E13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "DF3BBE82-E29A-4FD6-A897-1D80DE6ACA4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "0322D5E9-FE05-49EF-A210-A276D69B9F16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*", + "matchCriteriaId": "F188F2EB-60D2-47BB-8FA8-2F832289345E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1DE401-4E0B-4F72-B59D-1A600624D43E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D59B7F84-4C39-46E1-932C-EE52F22F4C6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A0F9C0-4591-4981-863E-1704FC4A0919" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "AEF56328-A74E-432E-A790-E16C941CA3A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3a:*:*:*:*:*:*:*", + "matchCriteriaId": "5F91421B-F04E-4CA7-8EE3-2F06AC6303C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "C8B6E5BE-2D8B-4BAF-88BE-772F5905875E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4a:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFB827C-E7A9-410F-AE0D-5E31C6B29EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "180C12CE-E9EC-4E86-A18A-E57803232193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "8007004F-7331-48FF-9821-866560F3580A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "61F877F3-C1EB-47D4-BBF2-0D678403A1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", + "matchCriteriaId": "45B80CBC-961F-4EE8-A998-C0A827151EDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", + "matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*", + "matchCriteriaId": "7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2EB46D-16E0-4C31-8634-C33D70B5381A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "7803B445-FE22-4D4B-9F3A-68EFE528195E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", + "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", + "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*", + "matchCriteriaId": "FB2842F6-4CD5-457C-AC75-241A5AB9534B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*", + "matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*", + "matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*", + "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*", + "matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*", + "matchCriteriaId": "AB8C3BBA-4829-4006-B7EB-F552D86922C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*", + "matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "D682D369-AFAA-47D6-B063-95A9FE336FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "21FDD38A-D864-4E73-BEBE-E3545113FA2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "46DC7974-36DA-49AF-BDA3-671EA5F41441" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "249D78EB-A125-4731-A41B-62F8302D7246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "7E599088-5071-469B-980F-4BA3026856C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "21F58CEE-636B-460E-91D1-330965FA7FE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA5302F-0F9E-4E0A-AA59-CB23B9A89F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "F943E4AE-F0EE-4643-B34D-44896C8CBF6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "4E6ED45F-4479-445D-8970-F90413C51B7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "8922A697-63B0-480E-B91F-4C16E2F325B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "6B1EB55A-4D3A-42ED-9EA0-DF31DE62086C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "36979139-66D2-40DD-A865-547BA9D49786" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "815E129B-EB7C-4E67-A50A-38CA19B697AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7E5969-E55B-4EBF-ADDE-8A969174E03D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "3376544F-A13B-4800-952D-08A2F429E9A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "79DA9DD7-A350-4A62-B19A-6AF90CF798F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "7113699B-762C-48BD-AD99-19D1A25995E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "1E178E6C-D717-48B1-B79A-4E071BDFE6AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "6BF7DF14-DD6F-4D24-8F12-AAB145FBDB41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "6E0A47B7-5AD3-4B4C-A2FD-4EE0381B3FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "499C6196-2D34-4312-9C3E-B1A6E8D21112" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "A12F00E7-8134-4CF4-ACD3-1E7E6F1C6332" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AA0-E0B2-4897-AF28-FC80B9FF81BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "9279A96A-43B2-4FD4-97F0-DA331EACF918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "3479B06E-1B67-4399-BA3A-E02331E21BE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "7855CC38-5E3E-486D-9322-7BF0DC1FF623" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "496E2D60-AEEF-4D34-ABE4-9A9B101643D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "A740BDE4-B65E-4F6F-BAB7-BBA64567EC79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*", + "matchCriteriaId": "3F391FDE-A48C-4F59-BC6F-7880B234E3A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "E10916E9-6105-46F9-993D-F09C223003B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "4D2E9E28-64F4-469C-8F01-FC2290B57106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "AB84CE04-F2D0-4A37-B2BA-25126D1824D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "E32C83FA-EBE9-4A84-B34A-25BBA4D47E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1a:*:*:*:*:*:*:*", + "matchCriteriaId": "8957EB38-37CF-47FA-853D-7A1AA6079874" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "63ACFACC-23B7-4EAC-BDC0-E3C403642D88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "0F3A95D5-157D-4335-87B4-8DA080A496FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "5E613BC4-AC20-4E43-8FB3-2EE9F0A2610D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "8D54B325-22D5-4F21-BE28-BE28F6135FBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "0444FAA1-6613-45DF-93E2-B19DF8FE157C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "0BAA5367-F81E-425A-A93C-B9220D1BB37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1ED4F8-3B6C-452D-A3D0-D2F1A24AF994" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8a:*:*:*:*:*:*:*", + "matchCriteriaId": "FAF32BC7-57DF-4BF0-BF97-69E97CC048CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "B3836108-E847-4BB6-BFFE-7C81E9D94A10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "D38466E0-40AC-45C6-9C14-1BE309B079CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*", + "matchCriteriaId": "D962FBA3-CE59-401B-9451-45001775BA66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*", + "matchCriteriaId": "C13F2837-174B-4437-BF3F-CB6BFBF8F64D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "237D305E-016D-4E84-827C-44D04E3E0999" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "E993A32E-D2AF-4519-B4C9-7F576649D20F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "7260A66D-D477-440E-9A87-C05F9BD9E67C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "31059ED1-4D82-43D7-8EF7-042125289CF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "3B813F19-1B37-48F4-99EC-05E0CAA861FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "4220D3B1-BD05-4169-91BA-B1AA45084C46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "84BAF351-4C7F-44F8-812E-9C402CBBB5FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "0595F3D8-8D99-4C82-9EC1-1187C52A6740" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "662ACAD0-7E80-4CB5-8409-03E72A3C59D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "A43EE852-5F22-4387-8332-A12FF3306210" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "C1EE552E-226C-46DE-9861-CB148AD8FB44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "CAF02C8E-9BB2-4DC2-8BF1-932835191F09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "C5AC88EB-7A67-4CDE-9C69-94734966E677" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", + "matchCriteriaId": "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "4151B2B1-B17F-4F1D-A211-34C7DB84E442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "37B550C9-B2E4-44EE-8E0B-54D150C69A0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "BEBBA614-74E7-43C7-8D33-ADF4BD79D477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "A7A852A3-7CAC-4D35-A583-556D17A0F7E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "DBF5D54D-4403-4C5E-AA65-9FD8661E283B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "74E1226B-46CF-4C82-911A-86C818A75DFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "100DA24F-464E-4273-83DF-6428D0ED6641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "063C0C47-25EB-4AA4-9332-8E43CD60FF39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "02866AED-A1B4-4D89-A11F-27089EF935BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "1C85BAAF-819B-40E7-9099-04AA8D9AB114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "ED684DB4-527A-4268-B197-4719B0178429" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "88F41406-0F55-4D74-A4F6-4ABD5A803907" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "7082C083-7517-4CD4-BF95-CC7AF08D4053" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "370EF3DC-151F-4724-A026-3AD8ED6D801C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "2B8FB86F-2A89-413B-BED7-97E3D392804E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "005EAD76-34BE-4E3F-8840-23F613661FE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "2595B3E3-7FD4-4EFF-98A2-89156A657A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "FB998A1F-BAEA-4B8F-BE49-1C282ED3952E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "8AABDAB3-6329-48CF-BB49-DA2046AB9048" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "C96E41FF-DD4B-4D55-8C96-248C9A15226B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "64F7ACB5-4FE5-4B07-8B4D-28DF8D655199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D4408CD8-DC1D-4102-924B-E9E28FC5CECF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "C2A39749-3A95-41B6-850B-4D388E6242B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "67B663F9-DBF4-4EEE-836D-C83BF99A682A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "55E780F3-D378-4201-AC69-79C356EE9CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "28FE5158-FA37-476B-8289-11733BB9AFF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "24AE7F08-FB39-4E35-81AD-0186F2A539D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*", + "matchCriteriaId": "447FAF3B-8E93-4A2C-A8B1-1A2F7D958754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "08E2628F-456D-4471-A914-D92157725CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "CCA37E61-7EA5-45F3-87F6-432B591A79BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "4AE143DA-B2AA-47C3-BA8D-F0C02AFF36BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1F539B-8422-43AD-8BFB-E57622035B9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "9613EE90-A90A-4817-A5A1-F78A9F3BA571" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "87A96A92-02E7-440C-9E46-0FBE8CE75E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "03F1AEF3-08BD-4CC0-A36A-D26D550853E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD9FF45-C8C2-42E2-B329-48C037A10521" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "36CBB93A-A8C8-477E-B530-B0058C3D15B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "6465E3DA-90F0-4DD6-82B1-C9DF9FAEBDD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "346BD6D0-AAF2-4C9A-8DD3-8C710302DCA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "5A5B7053-7F9C-432C-B6F1-DAC00B0C9619" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "0D029D52-65E5-4129-AB47-E873F53799CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "31605A68-9398-4239-A137-DD0516BD2660" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "727E596A-295D-4D70-810A-436FC6A4415D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "368210A0-CC15-4FB9-8334-4ED475523C2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "D37EF429-EE6B-4A72-9D76-4FC1E6E19E01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy9:*:*:*:*:*:*:*", + "matchCriteriaId": "1C258F34-C557-4586-A8D0-590EC37E252E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy10:*:*:*:*:*:*:*", + "matchCriteriaId": "AD456B15-1AFC-470A-9750-E6D152869FB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy11:*:*:*:*:*:*:*", + "matchCriteriaId": "3B940A51-E9B1-430B-A732-F1B65F54CD2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "0340EC20-7099-4F13-8DE6-84475B2A52CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "6994F100-864F-4512-9141-F7D1050F9DD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "FC0CC364-FF3A-4FB3-8004-6628400BC7DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "67A1BC08-28AF-4583-BE21-0D85CA2D7B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "3A259566-AA04-4DE8-900D-865384E56C8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "6CF70F3C-FAC8-4691-AF95-1B5B828A9D41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "AF08E7CE-DE01-43B2-A9F0-1CE657E79260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "BC500D08-0DE1-4AA8-AE97-0CF17A706430" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "7A4E00DF-60FD-48F2-A69A-D709A5657F6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F5D3761-16C8-413A-89AD-C076B9B92FF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "F690BEC9-FAE9-4C02-9993-34BF14FA99EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "B0B8565B-3EE6-48DC-AE92-9F16AFFC509C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "716EC9AA-0569-4FA7-A244-1A14FA15C5AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "39166A66-859D-43A7-9947-3F3C32FBFAAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "097D1950-6159-45A2-8653-D3F90044D0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "F421AC3C-B0BC-4177-ACDB-87792C1636EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "09CD336D-1110-4B0C-B8D4-7C96293CBADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "C7809674-4738-463E-B522-FC6C419E2A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "FFD51F00-C219-439F-918E-9AF20A6E053A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "57BCB671-7ED0-43D5-894F-8B3DBF44E68E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "D4802BC7-F326-4F6E-9C74-04032FF35FEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "DEDE3BCF-B518-47B0-BD3B-0B75515771E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "1A5C9BF5-0C29-4B50-9A86-29F0ECD44F1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "B1B0621A-D7A2-415B-91ED-674F2FB4227B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*", + "matchCriteriaId": "CB52603C-CED4-4330-BB53-DDDFEA83882A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "F40A87C1-5EDB-4B50-84CF-729F5037E870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "42C9B84C-F9DC-4F9E-82F2-04004D539C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "5E246B9E-F93F-4BB2-9BA4-438FCC4A711B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE884ADE-FD51-4F10-89A8-D871E7407C83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "AC22B2CD-5154-4055-A6A7-4C31B84B032B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*", + "matchCriteriaId": "10082A46-7AD3-4533-9A15-267953D9E642" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*", + "matchCriteriaId": "7ED8D1FE-5880-484E-810B-B1CDC2C9F7CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADD1575-BB35-40CE-8452-3D34E25995B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "67FE59A3-5BA1-4C68-8959-A5B0CA61CDB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "B6B02867-F082-4A57-9E2E-12B0F4C77526" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9a:*:*:*:*:*:*:*", + "matchCriteriaId": "E8389200-0585-456E-8D0B-D725266ADBBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "EFEF03FA-FBF2-477F-A5E2-67F47610897A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*", + "matchCriteriaId": "C84498B4-7002-44D1-B2B7-B43F3081D258" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "0F61B07A-7933-476F-951A-AD0019D2443D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "41939712-5075-4924-ABF2-467430B37197" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CBC8C7-E3B2-4659-9B47-C0F16817F46A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "945363EE-FE7A-44ED-A4A0-942A1F9B2702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*", + "matchCriteriaId": "679DCA8C-F64B-4716-BCC9-9C461A89CB29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "700D0D31-138B-4F9A-8C76-3AF8B9D2C59C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "B843CEE5-4D53-414D-95C7-4BA515818E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "72480900-6E08-425F-965D-143B348E374A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBA0926-E790-4B1C-A549-5B7D2F040E5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*", + "matchCriteriaId": "12D439A6-E8A8-4389-A7C8-2F4BCB7C3854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*", + "matchCriteriaId": "4E903D9F-530D-4597-ABA9-4C1CFB79814B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*", + "matchCriteriaId": "5060BAEA-DF8F-4B85-84F5-1410FD45C733" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*", + "matchCriteriaId": "CB56857D-029C-4DA8-B439-F1B89EA32074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*", + "matchCriteriaId": "7F91AC2D-86F7-4618-A31B-DE081D4C21BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*", + "matchCriteriaId": "D25B94F9-F10F-47CE-8340-CE56E7ED31E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C32C536-640C-468D-872F-442697DB9EE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp7:*:*:*:*:*:*:*", + "matchCriteriaId": "38DE4F33-A677-4848-BB33-10C4A4655735" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8:*:*:*:*:*:*:*", + "matchCriteriaId": "BF0A4820-F737-4A3A-8A08-E2C3EE6F6E66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp9:*:*:*:*:*:*:*", + "matchCriteriaId": "0894FC09-880C-44D5-B67D-81C92D96D790" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp10:*:*:*:*:*:*:*", + "matchCriteriaId": "81713C7A-EADE-4722-B61C-3BA1671748B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", + "matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "686FD45C-7722-4D98-A6D7-C36CAC56A4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "871E33AC-B469-47BA-9317-DC9E3E9BF5C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "C4091CAC-BFAA-404C-A827-4DA9EADDF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*", + "matchCriteriaId": "369A99E0-3451-41D1-8C56-5352EA689950" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "33D4A7FA-E4E0-49C2-97FD-A547A1612F75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "DA0B918F-A28C-4B5A-A566-6E588B4F6696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "436114F2-D906-4469-99C4-10B75253B3D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "64404B00-4956-47B8-ACDB-88E365E97212" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "6FE6A696-5CBC-4552-A54E-55C21BC74D7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "41237041-1D82-4C6C-BF48-ECEDF9DB08C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*", + "matchCriteriaId": "CAB72CA3-088E-4EFE-BE1C-190C64101851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "FA584AC4-96AB-4026-84DF-F44F3B97F7E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "22EB41FD-4DE2-4753-A18C-C877B81B51D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "158EDE62-04C9-471B-B243-309D49583E67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "D8609F10-2B43-4BDC-AAF1-80D589910EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "270A1FF4-8541-4026-AE2D-7D500DC401E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "5A58C01B-459E-432F-A49F-68EC45EE6E14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*", + "matchCriteriaId": "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*", + "matchCriteriaId": "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "198FF520-7631-49D9-B8A8-2E64F6237CC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*", + "matchCriteriaId": "94E067E8-552B-4691-9F6A-C5E8766287BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "405CC56E-574F-4983-B492-C8811FAF06E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*", + "matchCriteriaId": "B1829074-66F9-4B3B-A084-B88D838CFC44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "6715A135-61A7-4E56-948D-8A8D5F7C98C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "B2CC4602-D1F5-4843-991A-2903C8336251" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "7BCCD64D-D73C-45FE-B49C-F79E23431B37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "7561E37E-E7B9-419F-949F-B8EF52DF00DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "4FAF397C-C67F-488A-8346-CF37F9B7305C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "EAAA9DAA-E11A-4DBE-AB78-6A6E341DB351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "0807458A-2453-4575-AE19-0DE15E04B88C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*", + "matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*", + "matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "730D29C4-2BC5-478C-AAFD-E8CF598A5CFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "B1CCCEF9-1956-41BA-8E82-925BA98A4874" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "5D0F9F49-F517-4646-B94B-A0BF4F9D6315" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6b:*:*:*:*:*:*:*", + "matchCriteriaId": "C1A31DB6-3A66-408C-8E36-2E4EE7C62E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "68A9E030-2999-4881-8EDE-4F6DED01DD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7a:*:*:*:*:*:*:*", + "matchCriteriaId": "98368F1D-5B9E-4A8A-B210-227FA95A555A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", + "matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", + "matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*", + "matchCriteriaId": "6893B368-D3C1-416D-A4E8-6484AF91C7CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*", + "matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*", + "matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*", + "matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*", + "matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*", + "matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*", + "matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*", + "matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*", + "matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*", + "matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*", + "matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*", + "matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*", + "matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*", + "matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*", + "matchCriteriaId": "87687169-312C-41E6-9557-B2536A4CCA01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "312FDFDD-7612-4E79-A12E-7B1540324696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*", + "matchCriteriaId": "D8A56292-386C-4FC8-BC54-EF9E465F891B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "036DAA45-B363-47BB-ADBA-992F381572EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*", + "matchCriteriaId": "86176257-7075-476E-BE09-B0E469392BD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "CCB1EA1E-D995-4732-9685-75AC9042D484" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "5EA68978-C42E-4A5E-A0D6-7887FA0318B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF06D7B-A239-4046-A704-01C54D534F35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "4622910B-5459-4FA4-A8D0-239AF2EFFE06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "8E1040AF-A087-4791-BFC3-36CA3F3208E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "7F95B900-12A3-4488-BB50-20C972BEE169" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*", + "matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*", + "matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*", + "matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10ee:*:*:*:*:*:*:*", + "matchCriteriaId": "9D497018-2ED5-4A0C-9E1E-1441C7F596D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "BC3B6D68-DA31-45EB-ACFD-AE703B2FA2D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "6352A220-8F3E-4E08-8DD3-50E366434333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "513675B5-D62C-442D-8754-DC4F221942B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*", + "matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "D9D9F45C-E71F-4425-A0C7-DFFEEC93C152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "26FB3B1A-FB8C-4371-A6D2-AB83ECF17F96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*", + "matchCriteriaId": "48B351B3-3A18-4068-A95D-68942955070E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "2A005E0C-A744-4AFA-A1D1-2E3228E093FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*", + "matchCriteriaId": "DED25B1B-C47A-45E9-8235-081550FB0AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "86B7EC67-B431-4284-8781-9090D134B781" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "3598539F-0EEB-45D6-8BA5-A2A3F69D556C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "4CF349D4-BF1C-4127-B6FA-7AD379F62A3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "B6ABE123-BBA5-46CD-8578-4A1F3CB8BA08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "CD674BF9-16F6-4817-9ADE-564A402A5F06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", + "matchCriteriaId": "8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DA3731-E719-4DB7-9783-1C00481141EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "483A3F03-F5CC-45BD-AEB7-83E23601BB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "1692889D-BD16-41C6-A226-A9BAF6F64603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "6DAC081C-9A22-4CBC-A9D0-DD9995801791" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*", + "matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "F43F819E-3072-430F-8C52-B43FF28D4687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*", + "matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", + "matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", + "matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", + "matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", + "matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", + "matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", + "matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", + "matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", + "matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", + "matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", + "matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", + "matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", + "matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*", + "matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*", + "matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*", + "matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", + "matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", + "matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", + "matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", + "matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", + "matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", + "matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*", + "matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*", + "matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*", + "matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*", + "matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*", + "matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*", + "matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*", + "matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*", + "matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "296636F1-9242-429B-8472-90352C056106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*", + "matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*", + "matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", + "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", + "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", + "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*", + "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*", + "matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", + "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", + "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", + "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*", + "matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*", + "matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*", + "matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", + "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", + "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*", + "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*", + "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "BDEDC7A0-D031-433B-ABF5-4EC0A43D80CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*", + "matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*", + "matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2b:*:*:*:*:*:*:*", + "matchCriteriaId": "91A099C9-0C81-4819-BE4A-FE59144C55BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*", + "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22647.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22647.json index 98097224daa..30d7cd1b7be 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22647.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22647.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22647", "sourceIdentifier": "meissner@suse.de", "published": "2023-06-01T13:15:10.467", - "lastModified": "2023-06-09T17:55:10.893", + "lastModified": "2023-10-05T16:28:13.250", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "CWE-281" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22648.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22648.json index 20527ea7c2b..1ef12254411 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22648.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22648.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22648", "sourceIdentifier": "meissner@suse.de", "published": "2023-06-01T13:15:10.553", - "lastModified": "2023-06-09T17:23:02.350", + "lastModified": "2023-10-05T16:27:57.587", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "CWE-384" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2306.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2306.json new file mode 100644 index 00000000000..7263cb67f74 --- /dev/null +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2306.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-2306", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2023-10-05T17:15:11.373", + "lastModified": "2023-10-05T17:15:11.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\n\n\nQognify NiceVision versions 3.1 and prior are vulnerable to exposing sensitive information using hard-coded credentials. With these credentials an attacker can retrieve information about the cameras, user information, and modify database records.\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-278-02", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25788.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25788.json index 06cf8b6643a..d87464c71dc 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25788.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25788.json @@ -2,16 +2,40 @@ "id": "CVE-2023-25788", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-04T11:15:09.997", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:06:48.483", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Saphali Saphali Woocommerce Lite plugin <=\u00a01.8.13 versions." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Saphali Saphali Woocommerce Lite en versiones <= 1.8.13." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,7 +60,7 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +68,43 @@ "value": "CWE-352" } ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:saphali:woocommerce:*:*:*:*:lite:wordpress:*:*", + "versionEndIncluding": "1.8.13", + "matchCriteriaId": "27172017-F844-4B1A-B5D3-199489DBF9B8" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/saphali-woocommerce-lite/wordpress-saphali-woocommerce-lite-plugin-1-8-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25980.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25980.json index 8f7361bad57..5c3719d22a7 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25980.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25980.json @@ -2,16 +2,40 @@ "id": "CVE-2023-25980", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-04T11:15:10.077", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-05T17:06:25.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in CAGE Web Design | Rolf van Gelder Optimize Database after Deleting Revisions plugin <=\u00a05.1 versions." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en CAGE Web Design | Rolf van Gelder Optimice Database en el complemento Deleting Revisions en versiones <= 5.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cagewebdev:optimize_database_after_deleting_revisions:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.1", + "matchCriteriaId": "A66FB2C6-AC92-4C57-8105-AD9919DFB174" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/rvg-optimize-database/wordpress-optimize-database-after-deleting-revisions-plugin-5-0-110-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2681.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2681.json index 506f7dff703..7f4d89f3ced 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2681.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2681.json @@ -2,16 +2,40 @@ "id": "CVE-2023-2681", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-10-03T13:15:09.937", - "lastModified": "2023-10-03T13:52:20.283", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:43:37.583", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the \"/leaves/validate\" path and the \u201cid\u201d parameter, managing to extract arbritary information from the database." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad de inyecci\u00f3n SQL en la versi\u00f3n 1.0.0 de Jorani. Esta vulnerabilidad permite que un usuario remoto autenticado, con bajos privilegios, env\u00ede consultas con c\u00f3digo SQL malicioso en la ruta \"/leaves/validate\" y el par\u00e1metro \u201cid\u201d, logrando extraer informaci\u00f3n arbitraria de la base de datos." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -46,10 +80,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jorani_project:jorani:1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "00665EA7-7D22-4226-801E-ABA4BD94D0D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/jorani-sql-injection", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2809.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2809.json index a09daf7c9c8..8777f88e04c 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2809.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2809.json @@ -2,16 +2,40 @@ "id": "CVE-2023-2809", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-10-04T11:15:10.223", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:06:16.657", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext." + }, + { + "lang": "es", + "value": "Vulnerabilidad de uso de credenciales de texto plano en Sage 200 Spain versi\u00f3n 2023.38.001, cuya explotaci\u00f3n podr\u00eda permitir a un atacante remoto extraer las credenciales de la base de datos SQL de la aplicaci\u00f3n DLL. Esta vulnerabilidad podr\u00eda estar vinculada a t\u00e9cnicas conocidas para obtener la ejecuci\u00f3n remota de comandos de MS SQL y escalar privilegios en sistemas Windows porque las credenciales se almacenan en texto plano." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -46,10 +80,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sage:sage_200_spain:2023.38.001:*:*:*:*:*:*:*", + "matchCriteriaId": "C2BE3A89-92DE-408B-B288-B6DB86D1C8D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3037.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3037.json index a670f187136..a85f9037e60 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3037.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3037.json @@ -2,16 +2,40 @@ "id": "CVE-2023-3037", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-10-04T12:15:10.373", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:02:55.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper authorization vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to access the platform without authentication and retrieve personal data via the jsonGrid parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n incorrecta en HelpDezk Community que afecta a la versi\u00f3n 1.1.10. Esta vulnerabilidad podr\u00eda permitir que un atacante remoto acceda a la plataforma sin autenticaci\u00f3n y recupere datos personales a trav\u00e9s del par\u00e1metro jsonGrid." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -46,10 +80,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:helpdezk:helpdezk:1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F56C0CE5-F456-4817-AB6B-4401577AA5DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3038.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3038.json index 93d8eb4b479..832107188f4 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3038.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3038.json @@ -2,16 +2,40 @@ "id": "CVE-2023-3038", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-10-04T12:15:10.437", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:02:04.223", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the rows parameter of the jsonGrid route and extract all the information stored in the application." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en HelpDezk Community que afecta a la versi\u00f3n 1.1.10. Esta vulnerabilidad podr\u00eda permitir a un atacante remoto enviar una consulta SQL especialmente manipulada al par\u00e1metro de filas de la ruta jsonGrid y extraer toda la informaci\u00f3n almacenada en la aplicaci\u00f3n." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -46,10 +80,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:helpdezk:helpdezk:1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F56C0CE5-F456-4817-AB6B-4401577AA5DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33035.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33035.json index 605f08cc5e7..a8ff08f4797 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33035.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33035.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33035", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-10-03T06:15:27.787", - "lastModified": "2023-10-03T12:51:44.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:21:44.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -38,10 +58,3916 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA42F2EA-5D00-42B8-B020-C27675B72915" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFCF207D-B8C8-4860-89C7-673C821F0237" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A35ECF-B12E-42DE-A74B-2C3BE03639A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B283D6-B2D2-49B6-98A8-08EDB54C1F15" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19013619-9B73-4A4F-B5B2-2A7D9A41D81E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9523ACC9-9D2F-4A40-9CEF-9A9676176867" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34AB9074-97A3-43F0-B829-CDB4E3066AC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", + "matchCriteriaId": "362252ED-1DB3-4CF6-86DD-14919826D75E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8EE21BA-7178-4D69-852D-2322844FC6B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9BACB28-F6EA-445A-B74F-0C3881FE59CB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96FBD6DF-F174-4690-AA3D-1E8974E3627F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BF86E1-3FAC-4A42-8C01-5944C6C30AE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A3CF46D-E1CB-447E-8371-15C3F49B1AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B74FDAF1-82D0-4136-BF97-25C56FCEE77C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A07C2049-B227-4849-85D0-B53D690C7697" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn685x-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88D2DB07-B72B-4D44-A373-0C7EAB35F388" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C41266FF-5555-4522-AD55-6A7CF8BA33D5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn785x-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E9C428C-7470-4178-9029-3234086D93F1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04EA12D4-24E2-4FE9-8CD6-06A8E36DEB2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn785x-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AED978B-0330-4B9B-B662-AA8E9E621996" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89A1AAD0-9336-4657-8E1E-74E8F490C06E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386F2F37-974B-40F2-9B23-ABD49C60E32D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB1F0FA-25F3-4304-A3BC-5264E55CC092" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "214A053F-D80C-4AD9-B4F1-83384095A3F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7FFB96-53E7-41A2-BC99-7ACD853214A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74EBA77E-69A5-4145-9BEC-CD39BA132309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93CDB7BC-89F2-4482-B8E3-9DDBD918C851" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76E03AE9-2485-449B-BCFD-3E452BB01FC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06789CB9-E6FA-400D-90B6-C2DB6C8EF153" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB9F22-57F2-4327-95B9-B2342A02E45E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F18CD1F1-C36A-4840-88CD-8F00BD68EF1A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A01800E-994E-4095-AD86-F02DC9D9C86E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F357160-9EF0-4150-893B-746289C071AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc5_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3429F7D-C5C7-488E-8E32-518838C51621" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3991C516-4FBE-43D8-835F-413FE45BF73E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CF5EBB-B25A-4A76-B522-951F108263CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2B93301-AFE8-409B-A8C8-6754BE5A0C14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B185412C-177F-48E2-87F9-1269E0FB8E31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq5053-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35953900-1F81-49B4-B2F4-A0FEEF0E4F08" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq5053-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21E3FCA2-6CD3-4C63-9EFB-783FEF08D170" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117FAAF8-4E79-4BA8-BF6B-4572C114890F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "233283A4-193F-430A-8019-EE1B83668E36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4250-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8615FCF8-2AEB-4820-A0F8-DFCE50DFB465" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4250-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "977DF595-DA7A-48E0-BD7D-2CD89F63D037" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D4BDA33-248D-4040-B07D-2A9D80C64709" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DB9382-CF2F-4690-ABCA-145CDA12F4AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4350-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86F03E3C-CDEE-46AF-9CD6-4C58BAA4514E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4350-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "887B369C-4398-4D8F-A95A-B9A8E9B1C1B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "873CD3BE-2098-4328-B350-A14453C44F1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE294B26-BBD0-455F-82B0-4605987B7DDC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37DF4D73-3ACC-41B3-8CA4-20DAECE6BFB7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE08D23A-2D0D-4472-8847-27B955F55165" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6225_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC2668D5-623D-4E13-AF37-6F7040A14007" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6225:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72B0F4C7-CA0F-4B9C-A6AA-60934B2AB2C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6225-ad_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E089DC83-3849-4671-95B9-E4C958EC79FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6225-ad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E38F8F04-F841-492B-A555-96DBD7461380" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E5A7CE-9356-4E00-8458-52C60CB34753" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "571CC514-7B65-4769-9921-149ABFF2FE74" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "737807F6-F62C-4EC5-903A-0BA996834164" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B79990C-AAD2-4A91-A806-E449838054BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7225_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34E2940C-5D85-4D05-A1B1-41E20DF01626" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7225:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD2B248-B205-4D7A-B03B-9AC3CEFF8760" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250-aa_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6809F530-FA3C-455E-AF16-41F57AC3F5D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250-aa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "464E833D-9FCA-4407-88A2-EDE7D4FAEA28" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "437D618B-FE47-4DF6-9174-B1335501862D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4616FA92-3DB7-4ABC-A804-92B9FC7D57AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A51EAC73-7C74-4ABC-A964-8FE2CCB1C930" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DF142AB-6BB0-43BE-B2F1-679A4BD123D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A6874DE-6D72-4CE6-A78D-674257178B8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7E2BA4E-3CCC-4C35-B915-DC16E6F976DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325-ae_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "973C7278-EA56-425A-933E-30906763A978" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325-ae:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02698564-E791-4057-A4CB-E22075B76E1F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7350-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14FD6D80-8DC4-4E6D-A492-537413DA1D56" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7350-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFADAF33-D40E-4686-A028-84ADCE43DC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325-af_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4C78936-5B8A-440F-A083-01AB6089209F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325-af:-:*:*:*:*:*:*:*", + "matchCriteriaId": "367B4E71-1390-4C89-9495-A30138B36667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:s820a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "482F1C72-713F-4D3A-805C-D6BCA2E9D519" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:s820a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD783AA-2CAD-448E-9C4D-4AA6D4C95A55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8250-ab_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2723E7F4-1381-4542-83BA-E65728F6CA5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8250-ab:-:*:*:*:*:*:*:*", + "matchCriteriaId": "918F0BEB-A38E-4801-ADE2-280D26F9A87C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8250-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "056F1BD3-A44D-4876-86DA-1B864C60DAE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8250-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F2C602C-8D7C-4B3D-BC49-B5C36DFA8B63" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B0798E6-68B1-4C0E-BF5B-5BC8033351A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E70D909-40D1-4B66-AEA3-034F2C53FB0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8350-ac_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D77AA64D-A9B5-473F-98FC-E5859142881D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8350-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "066C3D8A-DC4C-415C-AFC1-0400325B0B10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88AF39A5-F44E-4B14-AA6E-4F80D9EEB017" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A25FE8F-555A-4D85-8A94-A808B62EAE86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05396B5E-C70F-4D83-84AA-7A7DB1B7B0E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x12_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E180EE7-5254-4C57-B4EE-BF2A9C21CA94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2\\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF9740EB-F82E-42EA-993E-A393B05CC6BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2\\+_gen_1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "022A5532-03F7-4FB8-BA0D-4221178C9486" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28717583-463A-468A-8073-ECF0F90585F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D1A7188-7D5D-4D46-AEAB-08BA84FFF539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F0D7B24-D567-479A-B4F1-595FAA053418" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33A8FAA1-F824-4561-9CCC-7F0DF12F740F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2744A053-5BD9-45A9-A2FC-791BCA0CCD4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F28E29-520F-469E-B048-62DE2EF07ADD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33200.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33200.json index bb11894e27e..01e9318eb24 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33200.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33200.json @@ -2,16 +2,53 @@ "id": "CVE-2023-33200", "sourceIdentifier": "arm-security@arm.com", "published": "2023-10-03T17:15:09.727", - "lastModified": "2023-10-03T18:09:47.093", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:01:00.040", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A local non-privileged user can make improper GPU processing operations to exploit a software race condition. If the system\u2019s memory is carefully prepared by the user, then this in turn could give them access to already freed memory.\n\n" + }, + { + "lang": "es", + "value": "Un usuario local sin privilegios puede realizar operaciones de procesamiento de GPU inadecuadas para aprovechar una condici\u00f3n de carrera del software. Si el usuario prepara cuidadosamente la memoria del sistema, esto a su vez podr\u00eda darle acceso a la memoria ya liberada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "arm-security@arm.com", "type": "Secondary", @@ -23,10 +60,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r17p0", + "versionEndExcluding": "r44p1", + "matchCriteriaId": "1EE39C8C-96C8-464A-8B66-5BB9E7F585FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:mali_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r44p1", + "matchCriteriaId": "98C22206-CB3A-465D-84A4-082664E2D0C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r19p0", + "versionEndExcluding": "r44p1", + "matchCriteriaId": "F651A77B-0F0B-4C6D-9D87-37027762C251" + } + ] + } + ] + } + ], "references": [ { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", - "source": "arm-security@arm.com" + "source": "arm-security@arm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3361.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3361.json index 2ed21089508..d8436aa73e7 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3361.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3361.json @@ -2,16 +2,40 @@ "id": "CVE-2023-3361", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-04T12:15:10.567", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:01:42.423", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Red Hat OpenShift Data Science. Al exportar un pipeline desde Elyra notebook pipeline editor como Python DSL o YAML, lee las credenciales de S3 del cl\u00faster (servidor de pipeline ds) y las guarda en texto plano en la salida generada en lugar de un ID para un secreto de Kubernetes." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,18 +58,73 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opendatahub:open_data_hub_dashboard:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.28.1", + "matchCriteriaId": "6767C5AA-B34C-40E7-9885-C09AA446D8BF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F5FF1E-5DA3-4EC3-B41A-A362BDFC4C69" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3361", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216588", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/opendatahub-io/odh-dashboard/issues/1415", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34970.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34970.json index c629a426ecc..1b008747fc4 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34970.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34970.json @@ -2,16 +2,53 @@ "id": "CVE-2023-34970", "sourceIdentifier": "arm-security@arm.com", "published": "2023-10-03T17:15:09.790", - "lastModified": "2023-10-03T18:09:47.093", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:59:07.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A local non-privileged user can make improper GPU processing operations to access a limited amount outside of buffer bounds or to exploit a software race condition. If the system\u2019s memory is carefully prepared by the user, then this in turn could give them access to already freed memory\n\n" + }, + { + "lang": "es", + "value": "Un usuario local sin privilegios puede realizar operaciones de procesamiento de GPU inadecuadas para acceder a una cantidad acotada fuera de los l\u00edmites del b\u00fafer o para explotar una condici\u00f3n de ejecuci\u00f3n del software. Si el usuario prepara cuidadosamente la memoria del sistema, esto a su vez podr\u00eda darle acceso a la memoria ya liberada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "arm-security@arm.com", "type": "Secondary", @@ -23,10 +60,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:mali_gpu_kernel_driver:r44p0:*:*:*:*:*:*:*", + "matchCriteriaId": "5515E35C-EBB2-45BA-9566-27B6CC2FF654" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:r44p0:*:*:*:*:*:*:*", + "matchCriteriaId": "3AFC2A7A-EA16-4F93-95CD-3442BE2CD3C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", - "source": "arm-security@arm.com" + "source": "arm-security@arm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3512.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3512.json index b62f1dcb9b7..aff72b82610 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3512.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3512.json @@ -2,16 +2,40 @@ "id": "CVE-2023-3512", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-10-04T11:15:10.363", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:04:39.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Relative path traversal vulnerability in Setelsa Security's ConacWin CB, in its 3.8.2.2 version and earlier, the exploitation of which could allow an attacker to perform an arbitrary download of files from the system via the \"Download file\" parameter." + }, + { + "lang": "es", + "value": "Vulnerabilidad relativa de path traversal en Setelsa Security's ConacWin CB, en su versi\u00f3n 3.8.2.2 y anteriores, cuya explotaci\u00f3n podr\u00eda permitir a un atacante realizar una descarga arbitraria de archivos del sistema a trav\u00e9s del par\u00e1metro \"Descargar archivo\"." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -46,10 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:setelsa-security:conacwin:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.8.2.2", + "matchCriteriaId": "AECA3302-4A34-45AA-A68E-A8CDEC89526A" + } + ] + } + ] + } + ], "references": [ + { + "url": "https://github.com/advisories/GHSA-v6jm-v768-76h2", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, { "url": "https://https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-setelsa-security-conacwin", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37995.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37995.json index 58529c4467b..9a871f13a92 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37995.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37995.json @@ -2,16 +2,40 @@ "id": "CVE-2023-37995", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-04T11:15:10.297", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:04:25.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Chetan Gole WP-CopyProtect [Protect your blog posts] plugin <=\u00a03.1.0 versions." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Chetan Gole WP-CopyProtect [Protect your blog posts] en versiones <= 3.1.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-copyprotect_project:wp-copyprotect:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.1.0", + "matchCriteriaId": "7092CB5F-E587-4544-A897-A512E0EBE0FC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-copyprotect/wordpress-wp-copyprotect-protect-your-blog-posts-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3701.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3701.json index 5ba878b5984..c2d3f609fdd 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3701.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3701.json @@ -2,16 +2,40 @@ "id": "CVE-2023-3701", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-10-04T11:15:10.430", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:04:18.250", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Aqua Drive, in its 2.4 version, is vulnerable to a relative path traversal vulnerability. By exploiting this vulnerability, an authenticated non privileged user could access/modify stored resources of other users. It could also be possible to access and modify the source and configuration files of the cloud disk platform, affecting the integrity and availability of the entire platform." + }, + { + "lang": "es", + "value": "Aqua Drive, en su versi\u00f3n 2.4, es vulnerable a path traversal. Al explotar esta vulnerabilidad, un usuario autenticado sin privilegios podr\u00eda acceder/modificar los recursos almacenados de otros usuarios. Tambi\u00e9n podr\u00eda ser posible acceder y modificar los archivos fuente y de configuraci\u00f3n de la plataforma de disco en la nube, afectando la integridad y disponibilidad de toda la plataforma." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -46,10 +80,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aquaesolutions:aqua_drive:2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "0E1B3974-783A-4BAC-8101-A502F05A841F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-aqua-esolutions", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39989.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39989.json index 288d43bd547..b89627ed24e 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39989.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39989.json @@ -2,16 +2,40 @@ "id": "CVE-2023-39989", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-03T12:15:10.627", - "lastModified": "2023-10-03T12:51:39.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:22:06.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in 99robots Header Footer Code Manager plugin <=\u00a01.1.34 versions." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento 99robots Header Footer Code Manager en versiones <= 1.1.34." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:draftpress:header_footer_code_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.34", + "matchCriteriaId": "2A3A69CC-CBE2-4322-9155-E0CC41EBACE1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/header-footer-code-manager/wordpress-header-footer-code-manager-plugin-1-1-34-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40210.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40210.json index 07b2befe171..3c764acb1f3 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40210.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40210.json @@ -2,16 +2,40 @@ "id": "CVE-2023-40210", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-03T12:15:10.700", - "lastModified": "2023-10-03T12:51:39.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:21:59.883", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sean Barton (Tortoise IT) SB Child List plugin <=\u00a04.5 versions." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Sean Barton (Tortoise IT) SB Child List en versiones <= 4.5." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sean-barton:sb_child_list:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.5", + "matchCriteriaId": "3A9EE5FD-964A-40E2-9E77-B6D0B0086160" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sb-child-list/wordpress-sb-child-list-plugin-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40519.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40519.json index 26a9dbfc678..bca9c0c3e08 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40519.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40519.json @@ -2,19 +2,88 @@ "id": "CVE-2023-40519", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-03T21:15:10.283", - "lastModified": "2023-10-03T23:55:59.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:48:09.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the bpk-common/auth/login/index.html login portal in Broadpeak Centralized Accounts Management Auth Agent 01.01.00.19219575_ee9195b0, 01.01.01.30097902_fd999e76, and 00.12.01.9565588_1254b459 allows remote attackers to inject arbitrary web script or HTML via the disconnectMessage parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el portal de inicio de sesi\u00f3n bpk-common/auth/login/index.html en Broadpeak Centralized Accounts Management Auth Agent 01.01.00.19219575_ee9195b0, 01.01.01.30097902_fd999e76, y 00.12.01.9565588_1254b459 permite a atacantes remotos inyectar scripts web arbitrarios o HTML a trav\u00e9s del par\u00e1metro disconnectMessage." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadpeak:centralized_accounts_management_auth_agent:00.12.01.9565588_1254b459:*:*:*:*:*:*:*", + "matchCriteriaId": "DBDA1BEB-8FB9-414A-9FE6-72F1D1E5B3B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadpeak:centralized_accounts_management_auth_agent:01.01.00.19219575_ee9195b0:*:*:*:*:*:*:*", + "matchCriteriaId": "5EFF21E2-254E-4057-95BF-15A92438C6C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadpeak:centralized_accounts_management_auth_agent:01.01.01.30097902_fd999e76:*:*:*:*:*:*:*", + "matchCriteriaId": "4FAEAB5F-A1AD-4FE5-A652-FAC0E5FBDA9F" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43176.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43176.json index 88e92e6c454..5a9f7b5ecb2 100644 --- a/CVE-2023/CVE-2023-431xx/CVE-2023-43176.json +++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43176.json @@ -2,31 +2,104 @@ "id": "CVE-2023-43176", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-03T21:15:10.330", - "lastModified": "2023-10-03T23:55:59.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:47:03.923", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A deserialization vulnerability in Afterlogic Aurora Files v9.7.3 allows attackers to execute arbitrary code via supplying a crafted .sabredav file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de deserializaci\u00f3n en Afterlogic Aurora Files v9.7.3 permite a los atacantes ejecutar c\u00f3digo arbitrario proporcionando un archivo .sabredav manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:afterlogic:aurora_files:9.7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "B2DF2E3B-326A-42B9-AAB5-02A7A78A99DB" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "http://afterlogic.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://aurora.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Not Applicable" + ] }, { "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "US Government Resource", + "VDB Entry" + ] }, { "url": "https://sec.leonardini.dev/blog/cve-2023-43176-rce_aurora_files/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44390.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44390.json index 34156d2b606..f2590df1fcb 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44390.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44390.json @@ -2,12 +2,16 @@ "id": "CVE-2023-44390", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-05T14:15:09.737", - "lastModified": "2023-10-05T14:15:09.737", - "vulnStatus": "Received", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. The vulnerability occurs in configurations where foreign content is allowed, i.e. either `svg` or `math` are in the list of allowed elements. In the case an application sanitizes user input with a vulnerable configuration, an attacker could bypass the sanitization and inject arbitrary HTML, including JavaScript code. Note that in the default configuration the vulnerability is not present. The vulnerability has been fixed in versions 8.0.723 and 8.1.722-beta (preview version)." + }, + { + "lang": "es", + "value": "HtmlSanitizer es una librer\u00eda .NET para limpiar fragmentos y documentos HTML de construcciones que pueden provocar ataques XSS. La vulnerabilidad ocurre en configuraciones donde se permite contenido externo, es decir, \"svg\" o \"math\" est\u00e1n en la lista de elementos permitidos. En el caso de que una aplicaci\u00f3n sanitice la entrada del usuario con una configuraci\u00f3n vulnerable, un atacante podr\u00eda eludir la sanitizaci\u00f3n e inyectar HTML arbitrario, incluido c\u00f3digo JavaScript. Tenga en cuenta que en la configuraci\u00f3n predeterminada la vulnerabilidad no est\u00e1 presente. La vulnerabilidad se ha solucionado en las versiones 8.0.723 y 8.1.722-beta (versi\u00f3n preliminar)." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44828.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44828.json new file mode 100644 index 00000000000..83348d363d8 --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44828.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44828", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.550", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the CurrentPassword parameter in the CheckPasswdSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/CheckPasswdSettings_CurrentPassword", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44829.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44829.json new file mode 100644 index 00000000000..4619f0077d6 --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44829.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44829", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.610", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the AdminPassword parameter in the SetDeviceSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetDeviceSettings_AdminPassword", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44830.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44830.json new file mode 100644 index 00000000000..cfe66c3b21c --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44830.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44830", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.657", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the EndTime parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetParentsControlInfo_EndTime", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44831.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44831.json new file mode 100644 index 00000000000..266a8fe8109 --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44831.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44831", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.700", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Type parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSettings_Type", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44832.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44832.json new file mode 100644 index 00000000000..78756cb4ac5 --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44832.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44832", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.753", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the MacAddress parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWanSettings_MacAddress", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44833.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44833.json new file mode 100644 index 00000000000..312bc972044 --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44833.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44833", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.807", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the GuardInt parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSettings_GuardInt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44834.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44834.json new file mode 100644 index 00000000000..9ddf3718f9e --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44834.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44834", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.863", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the StartTime parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetParentsControlInfo_%20StartTime", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44835.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44835.json new file mode 100644 index 00000000000..1fb6e9d8bc8 --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44835.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44835", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.917", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Mac parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetParentsControlInfo_Mac", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44836.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44836.json new file mode 100644 index 00000000000..ab4fb9c9aa4 --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44836.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44836", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:11.973", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the SSID parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSettings_SSID", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44837.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44837.json new file mode 100644 index 00000000000..e92cc1f199c --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44837.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44837", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:12.020", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Password parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWanSettings_Password", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44838.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44838.json new file mode 100644 index 00000000000..b7e36f2422d --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44838.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44838", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:12.067", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the TXPower parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSettings_TXPower", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44839.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44839.json new file mode 100644 index 00000000000..8644516f2eb --- /dev/null +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44839.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-44839", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-05T16:15:12.117", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Undergoing Analysis", + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSecurity_Encryption", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json new file mode 100644 index 00000000000..5ce48b0c489 --- /dev/null +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-45160", + "sourceIdentifier": "security@1e.com", + "published": "2023-10-05T16:15:12.167", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. This has been fixed in patch Q23094 as the 1E Client's temporary directory is now locked down\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@1e.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@1e.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://www.1e.com/trust-security-compliance/cve-info/", + "source": "security@1e.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json index a73b33c85bf..3bdee1ff649 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4527", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-18T17:15:55.067", - "lastModified": "2023-10-04T19:15:10.547", + "lastModified": "2023-10-05T16:15:12.250", "vulnStatus": "Modified", "descriptions": [ { @@ -113,6 +113,14 @@ "url": "http://www.openwall.com/lists/oss-security/2023/09/25/1", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5453", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5455", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4527", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4570.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4570.json new file mode 100644 index 00000000000..70bd8139cb5 --- /dev/null +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4570.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4570", + "sourceIdentifier": "security@ni.com", + "published": "2023-10-05T16:15:12.357", + "lastModified": "2023-10-05T16:22:20.787", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An improper access restriction in NI MeasurementLink Python services could allow an attacker on an adjacent network to reach services exposed on localhost. These services were previously thought to be unreachable outside of the node. This affects measurement plug-ins written in Python using version 1.1.0 of the ni-measurementlink-service\u00a0Python package and all previous versions.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-420" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/documentation/supplemental/23/improper-restriction-in-ni-measurementlink-python-services.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4732.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4732.json index d01415ecd1d..a015304bdfc 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4732.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4732.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4732", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-03T17:15:09.853", - "lastModified": "2023-10-04T12:15:10.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:58:45.243", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -38,14 +58,66 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.13.19", + "matchCriteriaId": "AB17AA82-730C-476D-952C-FC8A35009997" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-4732", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236982", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json index ff7c9ce3be9..830c1379a27 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4806", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-18T17:15:55.813", - "lastModified": "2023-10-04T19:15:10.623", + "lastModified": "2023-10-05T16:15:12.443", "vulnStatus": "Modified", "descriptions": [ { @@ -129,6 +129,14 @@ "url": "http://www.openwall.com/lists/oss-security/2023/10/03/8", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5453", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5455", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4806", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json index 648f372777b..76534d26c48 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4813", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-12T22:15:08.277", - "lastModified": "2023-10-04T00:15:12.163", + "lastModified": "2023-10-05T16:15:12.537", "vulnStatus": "Modified", "descriptions": [ { @@ -128,6 +128,14 @@ "url": "http://www.openwall.com/lists/oss-security/2023/10/03/8", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5453", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5455", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4813", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json index 5c045e7e73e..974c1e497b4 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4911", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-03T18:15:10.463", - "lastModified": "2023-10-05T03:15:20.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:51:14.533", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -38,54 +58,196 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68D5A70D-5CEE-4E19-BF35-0245A0E0F6BC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/10/03/2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/03/3", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/10/05/1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5453", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5454", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2023:5455", + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4911", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.gentoo.org/glsa/202310-03", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5514", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit" + ] }, { "url": "https://www.qualys.com/cve-2023-4911/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4997.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4997.json index 5f86c225693..ff454802165 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4997.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4997.json @@ -2,16 +2,40 @@ "id": "CVE-2023-4997", "sourceIdentifier": "cvd@cert.pl", "published": "2023-10-04T11:15:10.563", - "lastModified": "2023-10-04T12:56:02.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:04:09.880", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper authorisation of regular users in ProIntegra Uptime DC software (versions below 2.0.0.33940) allows them to change passwords of all other users including administrators leading to a privilege escalation.\n" + }, + { + "lang": "es", + "value": "La autorizaci\u00f3n inadecuada de usuarios habituales en el software ProIntegra Uptime DC (versiones inferiores a 2.0.0.33940) les permite cambiar las contrase\u00f1as de todos los dem\u00e1s usuarios, incluidos los administradores, lo que lleva a una escalada de privilegios." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -46,14 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prointegra:uptimedc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0.33940", + "matchCriteriaId": "1A397FB7-BC1F-414F-A37B-6DFE6B2C434A" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2023/10/CVE-2023-4997/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2023/10/CVE-2023-4997/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5255.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5255.json index 02d20ab060a..34ac178cba2 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5255.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5255.json @@ -2,16 +2,40 @@ "id": "CVE-2023-5255", "sourceIdentifier": "security@puppet.com", "published": "2023-10-03T18:15:10.577", - "lastModified": "2023-10-03T23:55:59.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T16:48:26.820", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "For certificates that utilize the auto-renew feature in Puppet Server, a flaw exists which prevents the certificates from being revoked. " + }, + { + "lang": "es", + "value": "Para los certificados que utilizan la funci\u00f3n de renovaci\u00f3n autom\u00e1tica en Puppet Server, existe una falla que impide que los certificados sean revocados." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@puppet.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + }, { "source": "security@puppet.com", "type": "Secondary", @@ -46,10 +80,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:puppet:puppet:2023.3:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "8E4196F0-B1C3-46EF-A17C-6404E9E34CB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:puppet:puppet_server:8.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5463CE94-DD76-4DBE-B124-3B87B8627A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:puppet:puppet_server:8.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B7891ED2-94F2-4017-8172-BD04E66CB792" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates", - "source": "security@puppet.com" + "source": "security@puppet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5368.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5368.json index c94f35fd979..26e9e1ed8ef 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5368.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5368.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5368", "sourceIdentifier": "secteam@freebsd.org", "published": "2023-10-04T04:15:14.143", - "lastModified": "2023-10-04T12:56:06.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:08:04.260", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,8 +14,41 @@ "value": "En un sistema de archivos msdosfs, las llamadas al sistema 'truncate' o 'ftruncate' bajo ciertas circunstancias llenan el espacio adicional en el archivo con datos no asignados del dispositivo de disco subyacente, en lugar de cero bytes. Esto puede permitir que un usuario con acceso de escritura a archivos en un sistema de archivos msdosfs lea datos no deseados (por ejemplo, de un archivo previamente eliminado)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + }, { "source": "secteam@freebsd.org", "type": "Secondary", @@ -27,10 +60,88 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.4", + "matchCriteriaId": "A7F6C8B0-9D75-476C-ADBA-754416FBC186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.2", + "matchCriteriaId": "BA49E374-9F1A-4F62-B88D-CD36EDEA6060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:*", + "matchCriteriaId": "24920B4D-96C0-401F-B679-BEB086760EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "3CE32730-A9F5-4E8D-BDA4-6B8232F84787" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "552E81DE-D409-475F-8ED0-E10A0BE43D29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "251CAE22-C3E6-45AD-8301-F36BEE5C6860" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "85D94BCA-FA32-4C10-95CD-5D2A69B38A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:12.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "8C950F97-40B4-43BF-BB81-C49CE00A468B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A87EFA20-DD6B-41C5-98FD-A29F67D2E732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "2888B0C1-4D85-42EC-9696-03FAD0A9C28F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "A3306F11-D3C0-41D6-BB5E-2ABDC3927715" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "9E584FE1-3A34-492B-B10F-508DA7CBA768" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-23:12.msdosfs.asc", - "source": "secteam@freebsd.org" + "source": "secteam@freebsd.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5377.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5377.json index c61e8bc6d64..fe45118c8e1 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5377.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5377.json @@ -2,15 +2,41 @@ "id": "CVE-2023-5377", "sourceIdentifier": "security@huntr.dev", "published": "2023-10-04T10:15:10.353", - "lastModified": "2023-10-04T12:56:06.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-05T17:07:40.813", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to v2.2.2-DEV." + }, + { + "lang": "es", + "value": "Lectura fuera de l\u00edmites en el repositorio de GitHub gpac/gpac anterior a v2.2.2-DEV." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -36,7 +62,7 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,16 +70,51 @@ "value": "CWE-125" } ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.2.1", + "matchCriteriaId": "047BC15F-5E51-48D9-B751-9DC9311FEBCF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/gpac/gpac/commit/8e9d6b38c036a97020c462ad48e1132e0ddc57ce", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 2d889a299c9..0523645ec96 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-05T16:00:26.322119+00:00 +2023-10-05T18:01:45.342648+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-05T15:52:29.633000+00:00 +2023-10-05T17:39:30.237000+00:00 ``` ### Last Data Feed Release @@ -29,46 +29,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -227034 +227049 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `15` -* [CVE-2022-3248](CVE-2022/CVE-2022-32xx/CVE-2022-3248.json) (`2023-10-05T14:15:09.650`) -* [CVE-2023-44390](CVE-2023/CVE-2023-443xx/CVE-2023-44390.json) (`2023-10-05T14:15:09.737`) +* [CVE-2023-44828](CVE-2023/CVE-2023-448xx/CVE-2023-44828.json) (`2023-10-05T16:15:11.550`) +* [CVE-2023-44829](CVE-2023/CVE-2023-448xx/CVE-2023-44829.json) (`2023-10-05T16:15:11.610`) +* [CVE-2023-44830](CVE-2023/CVE-2023-448xx/CVE-2023-44830.json) (`2023-10-05T16:15:11.657`) +* [CVE-2023-44831](CVE-2023/CVE-2023-448xx/CVE-2023-44831.json) (`2023-10-05T16:15:11.700`) +* [CVE-2023-44832](CVE-2023/CVE-2023-448xx/CVE-2023-44832.json) (`2023-10-05T16:15:11.753`) +* [CVE-2023-44833](CVE-2023/CVE-2023-448xx/CVE-2023-44833.json) (`2023-10-05T16:15:11.807`) +* [CVE-2023-44834](CVE-2023/CVE-2023-448xx/CVE-2023-44834.json) (`2023-10-05T16:15:11.863`) +* [CVE-2023-44835](CVE-2023/CVE-2023-448xx/CVE-2023-44835.json) (`2023-10-05T16:15:11.917`) +* [CVE-2023-44836](CVE-2023/CVE-2023-448xx/CVE-2023-44836.json) (`2023-10-05T16:15:11.973`) +* [CVE-2023-44837](CVE-2023/CVE-2023-448xx/CVE-2023-44837.json) (`2023-10-05T16:15:12.020`) +* [CVE-2023-44838](CVE-2023/CVE-2023-448xx/CVE-2023-44838.json) (`2023-10-05T16:15:12.067`) +* [CVE-2023-44839](CVE-2023/CVE-2023-448xx/CVE-2023-44839.json) (`2023-10-05T16:15:12.117`) +* [CVE-2023-45160](CVE-2023/CVE-2023-451xx/CVE-2023-45160.json) (`2023-10-05T16:15:12.167`) +* [CVE-2023-4570](CVE-2023/CVE-2023-45xx/CVE-2023-4570.json) (`2023-10-05T16:15:12.357`) +* [CVE-2023-2306](CVE-2023/CVE-2023-23xx/CVE-2023-2306.json) (`2023-10-05T17:15:11.373`) ### CVEs modified in the last Commit -Recently modified CVEs: `48` +Recently modified CVEs: `33` -* [CVE-2023-43656](CVE-2023/CVE-2023-436xx/CVE-2023-43656.json) (`2023-10-05T15:14:13.843`) -* [CVE-2023-30735](CVE-2023/CVE-2023-307xx/CVE-2023-30735.json) (`2023-10-05T15:15:31.130`) -* [CVE-2023-33034](CVE-2023/CVE-2023-330xx/CVE-2023-33034.json) (`2023-10-05T15:15:46.267`) -* [CVE-2023-30737](CVE-2023/CVE-2023-307xx/CVE-2023-30737.json) (`2023-10-05T15:15:57.547`) -* [CVE-2023-44973](CVE-2023/CVE-2023-449xx/CVE-2023-44973.json) (`2023-10-05T15:16:23.883`) -* [CVE-2023-39645](CVE-2023/CVE-2023-396xx/CVE-2023-39645.json) (`2023-10-05T15:16:41.543`) -* [CVE-2023-43976](CVE-2023/CVE-2023-439xx/CVE-2023-43976.json) (`2023-10-05T15:17:11.293`) -* [CVE-2023-39648](CVE-2023/CVE-2023-396xx/CVE-2023-39648.json) (`2023-10-05T15:17:30.923`) -* [CVE-2023-39646](CVE-2023/CVE-2023-396xx/CVE-2023-39646.json) (`2023-10-05T15:17:38.827`) -* [CVE-2023-44974](CVE-2023/CVE-2023-449xx/CVE-2023-44974.json) (`2023-10-05T15:17:48.087`) -* [CVE-2023-39649](CVE-2023/CVE-2023-396xx/CVE-2023-39649.json) (`2023-10-05T15:17:55.947`) -* [CVE-2023-37404](CVE-2023/CVE-2023-374xx/CVE-2023-37404.json) (`2023-10-05T15:18:33.150`) -* [CVE-2023-35905](CVE-2023/CVE-2023-359xx/CVE-2023-35905.json) (`2023-10-05T15:19:06.307`) -* [CVE-2023-39647](CVE-2023/CVE-2023-396xx/CVE-2023-39647.json) (`2023-10-05T15:19:55.307`) -* [CVE-2023-33029](CVE-2023/CVE-2023-330xx/CVE-2023-33029.json) (`2023-10-05T15:28:09.890`) -* [CVE-2023-33028](CVE-2023/CVE-2023-330xx/CVE-2023-33028.json) (`2023-10-05T15:28:33.267`) -* [CVE-2023-33027](CVE-2023/CVE-2023-330xx/CVE-2023-33027.json) (`2023-10-05T15:33:11.150`) -* [CVE-2023-36628](CVE-2023/CVE-2023-366xx/CVE-2023-36628.json) (`2023-10-05T15:33:32.560`) -* [CVE-2023-32572](CVE-2023/CVE-2023-325xx/CVE-2023-32572.json) (`2023-10-05T15:38:20.757`) -* [CVE-2023-28373](CVE-2023/CVE-2023-283xx/CVE-2023-28373.json) (`2023-10-05T15:39:04.883`) -* [CVE-2023-36627](CVE-2023/CVE-2023-366xx/CVE-2023-36627.json) (`2023-10-05T15:39:20.327`) -* [CVE-2023-31042](CVE-2023/CVE-2023-310xx/CVE-2023-31042.json) (`2023-10-05T15:46:26.893`) -* [CVE-2023-28372](CVE-2023/CVE-2023-283xx/CVE-2023-28372.json) (`2023-10-05T15:50:10.483`) -* [CVE-2023-39923](CVE-2023/CVE-2023-399xx/CVE-2023-39923.json) (`2023-10-05T15:50:28.930`) -* [CVE-2023-28406](CVE-2023/CVE-2023-284xx/CVE-2023-28406.json) (`2023-10-05T15:52:29.633`) +* [CVE-2023-39989](CVE-2023/CVE-2023-399xx/CVE-2023-39989.json) (`2023-10-05T16:22:06.307`) +* [CVE-2023-44390](CVE-2023/CVE-2023-443xx/CVE-2023-44390.json) (`2023-10-05T16:22:20.787`) +* [CVE-2023-22648](CVE-2023/CVE-2023-226xx/CVE-2023-22648.json) (`2023-10-05T16:27:57.587`) +* [CVE-2023-22647](CVE-2023/CVE-2023-226xx/CVE-2023-22647.json) (`2023-10-05T16:28:13.250`) +* [CVE-2023-2681](CVE-2023/CVE-2023-26xx/CVE-2023-2681.json) (`2023-10-05T16:43:37.583`) +* [CVE-2023-43176](CVE-2023/CVE-2023-431xx/CVE-2023-43176.json) (`2023-10-05T16:47:03.923`) +* [CVE-2023-40519](CVE-2023/CVE-2023-405xx/CVE-2023-40519.json) (`2023-10-05T16:48:09.507`) +* [CVE-2023-5255](CVE-2023/CVE-2023-52xx/CVE-2023-5255.json) (`2023-10-05T16:48:26.820`) +* [CVE-2023-4911](CVE-2023/CVE-2023-49xx/CVE-2023-4911.json) (`2023-10-05T16:51:14.533`) +* [CVE-2023-4732](CVE-2023/CVE-2023-47xx/CVE-2023-4732.json) (`2023-10-05T16:58:45.243`) +* [CVE-2023-34970](CVE-2023/CVE-2023-349xx/CVE-2023-34970.json) (`2023-10-05T16:59:07.947`) +* [CVE-2023-33200](CVE-2023/CVE-2023-332xx/CVE-2023-33200.json) (`2023-10-05T17:01:00.040`) +* [CVE-2023-3361](CVE-2023/CVE-2023-33xx/CVE-2023-3361.json) (`2023-10-05T17:01:42.423`) +* [CVE-2023-3038](CVE-2023/CVE-2023-30xx/CVE-2023-3038.json) (`2023-10-05T17:02:04.223`) +* [CVE-2023-3037](CVE-2023/CVE-2023-30xx/CVE-2023-3037.json) (`2023-10-05T17:02:55.337`) +* [CVE-2023-4997](CVE-2023/CVE-2023-49xx/CVE-2023-4997.json) (`2023-10-05T17:04:09.880`) +* [CVE-2023-3701](CVE-2023/CVE-2023-37xx/CVE-2023-3701.json) (`2023-10-05T17:04:18.250`) +* [CVE-2023-37995](CVE-2023/CVE-2023-379xx/CVE-2023-37995.json) (`2023-10-05T17:04:25.617`) +* [CVE-2023-3512](CVE-2023/CVE-2023-35xx/CVE-2023-3512.json) (`2023-10-05T17:04:39.053`) +* [CVE-2023-2809](CVE-2023/CVE-2023-28xx/CVE-2023-2809.json) (`2023-10-05T17:06:16.657`) +* [CVE-2023-25980](CVE-2023/CVE-2023-259xx/CVE-2023-25980.json) (`2023-10-05T17:06:25.153`) +* [CVE-2023-25788](CVE-2023/CVE-2023-257xx/CVE-2023-25788.json) (`2023-10-05T17:06:48.483`) +* [CVE-2023-5377](CVE-2023/CVE-2023-53xx/CVE-2023-5377.json) (`2023-10-05T17:07:40.813`) +* [CVE-2023-5368](CVE-2023/CVE-2023-53xx/CVE-2023-5368.json) (`2023-10-05T17:08:04.260`) +* [CVE-2023-20109](CVE-2023/CVE-2023-201xx/CVE-2023-20109.json) (`2023-10-05T17:39:30.237`) ## Download and Usage